8de4fd9ed935d150d139e6d7add348dd1751a54fc2cee1ba69beeef3bef11c8d044dc071ba050555bc88c1d3f9e861aa09a0668a08832db17a1e8cfb6e0537bca333b1d63e1f72689dbc34a7eba519460052a99257f322e8a6fa2bc04a407a0c8b6f117e3b889b395c8acc64939083038fea28214e88a4ef2e389fb94957f2dfed0397c8a8e98b566786c1e2ea9861d2fd2de8489c9ae6f807b70423fd2de6591c003f55d3369c76e83dbec91c6efada4e3dbef96c7b6f20598b465fefcec9d1b4ec643d3e3223178dd69da2f8a58a97b33acbc16c9e962b420bd2704cc9fdb6fa671e2f4fdbb06a128ce29f31af018079d8972f9da731f91b0cdea599afd422dadb22fef3e721cc14d085cd5632a1019e562779b8ea74c6df4cf4a06eb29254ef108c2349a1acdef5cf1b1bf7ce821c7742113c2497900075f63c231c1da613d3ff7aed6e7eccf0c3a4654c5fb9ccb30fa69de08a006f10d8c2ceb7b9e2ee000bf9e9c6a7c590992a32ee3efd674bedb7e35302dd9be2ea19ec27299c57e9adf591a5989ffe685cddd879cfe7eb6d825d038d856ec32b154f262035695508f02427bd32e08387923abcd6b6fcde725e4453a92b21105de853bde1f64a464f868eb26595fe8e41aaf4510485f83d5184c2b0fcaa3bec9c99c970db4d19f94ec815fae88948d16c26f86c257c014390e85f4d08c1058f346b255b4f9edce16291e9e9b833df6ff6968b6904dfd0e1b994938b19cb670e1903b0e8720eb5aaaa9b98ef64d96208b74392d753f6340dd51e0ee21c28326dbfce23357215cade57fc53630f6d9ab7c94c272ea3817e51bc777bee9f0915bdf177ce5acd014650135a980c4477155c504049be9a7b8a01bf0652b049ab948980fa571925ad3019f5503a77540d08e3f09f72dbbf2011fe02f34e5b1cad1cccb0e37a69d4e8d51fa810b50ed9cca4e12bc9d184cd0cdb829b0843ceba1426036c2e8d657c21f777eafdce55d1e4b3bd4ab9721f227587ce49de71b7d4b31da27e70e2930a4dddea1d3f885978a493c74304208a52c6e67acc4bf6fd4385242fca74defc8f23a9e79cade89ea2dcf7a2051ca9e4256c0cd7bcb0cea7e224ae4e8f5022d1c8f3ae99b26e81f8c958fd8b26a7da4d8b6bb33f415ed664b0d078f933f94f6548a0bf32c4d0852c116c03e2d8d15b05d5a3c5cb5fd1d4eb92ad15cbb0e55806d33d31537396529eec92f13789064854272434e751b1b0c086fc628a22308d3d5e082d1d55af16ded4924d416776c972341d7bb3356c934bb379a598e46696afffdc3eb711d5f2c9488b2ce8bd7487e0b534a1a1d3b7b752ef64cc14f1038ba03b86eec983a7022c9561dab79c96607ba379884364a1e12157ae8096a764a69948becd707b3e70165073b286ff5b485c63f1394b6c7a4216dee767bedc922a40c0bc1bef6bf173b3302308acc10430b5b38c021b46e00091c9c4ec558a59da8adb70b25c5e4b63343de1b3f0f884a12757c030ff1e751e7da205449a25ef17b69ba56502085658beeef9a2e41f2b6675e149e3501a231d8eed17fb384efe2daba4b285275d48ba8c1e711d0c623c4e5de6a31feae806226c6954a10a3a39eebb62ddcede82eaa01499e90419ceb507e0349316033c6491320706000c108aab3c88fefbd3af89cfa3b94e306ee50b943a317e2dfa2f8dc491d35e481e608cce54e1fb84b4fb6bc4fbca05c11d543bc2261cc688aecfd6584bd82aea5ab1f3af8628d3937d949f19352f609170361a3f65ba5abdcf63ca9a8cc46c3f626979c51d443810e15c22891ce283c99387ae17f84c9b3fb7f7afbf2dc8562675da4e69acd6aa03ec191436d2767c81370ffd78fc00623efb3bcf0237e85b843260db18ac7534ab4d3ea6ce972135cc879e457a6a7c8220314efe549c4313286c59fe28f6998b3180fd02c1bf6ae5b90054f7e35217b18942d82bf09db1cdc0ad5c850d1751943dd15969ffebc566e0c7b215867a27161d103c584f51e511e238121d1a5081f3c5dad3c190a39e0be9d8dd6c8f81e04eca5aa483746250ce1ae1543d11677762d1a090812bb024c495d124a9e0f67916e3d666ac2c4af72c8fe34de179202f4ae3de5de5b42cde256b51d07b66e4a3a387c9ea27eacdafd4f975d7ccca3f42f812cea55593e217f055fdd7f0597a51e6dae39813747881af97ba97134e537f3b64c35ef9db558fa20dc30c3bca0c265fed678efa368e81f613299bb597c1bbcdd2b93aabe553aa9ae2838ea9387b9eae7f18c881bdad7f89f4a91ac9863a2698718b22c1b285bf4cbfea7089b3db829ba77761fe948b83573a44592e82bec2c90de78e3b602d7e64beb831feac65d882945b4778e6a2f10a0005b7c9cb221f8c18256795173e4a87f602637993fc996443e0fef14f7eba994338d60a173433667527a35e1093d36eda7d1da39bf70b974db9a7b2ee9405c5cfd00b136442d348f565c107c0c533fc455d9955c2adb3454e1f42ef18bb32de327bdc7cb8efe29f763652bacaa41be043de816c06fbbd6ff3415c69e767415f0fb589a6453b76d69bd54f5c0e3f7d42cdecf659396b1907ea3499b645b47f7afcbfb6bcc2f3e0b9dd8106a73065ee13674943db1b521c789d3684d437a9bfeafd4bfc53c67cb3ae8fdb3a529e9f31481d7c5732c1d3d5664f683ae2ef7adbe6c19a39da3689858688c08c97d00a08058e4942d22b832000c548b79173488902971e9349aa229a83d0d302151008d8bd929f4b313448a43fbe6624bb315a5272f44f008c6f2c87cbe440e2c0b1ba64749a972fb95d2fe5bda94e5393fbc161931b37022bbaec8c4869a623a69eb4fae58d81e5928d8c59f05831be1158a5d61634587bb3a543a1792022e1d292b7c61cb60fe76bfd993dadfa1bb9c71c1b7236c2971b92d47e5d8f0f83c3871a0b2bd631345f699cbf5159ad02827ba7066b0d261ace707968b5fde5481a4de223daebcccd3b1da065966782c7a8f174e03ae7893e150d1a5d4a2e47428b18b74f9a14e7d43c56ce18638d9228efafca1f4ec903b48fa685400f3a29ae6216387e1de9a9ced503e75ce973ee16bbc32552001b2e2affda94e651f2bafff39ce41de26b8525c7cbc448d01a9c9854bfc38f92cc66ac68d16b5be015cbe128d640f1a7115d65d8b367f1c72f42463f774b34119eb8f3c6b2771ff9f2a53789b3c179261f4c4c35af91936e20a3b01e0a488fbefbeb444bb1b4ac187116bfc7d54fa32dcc1898d10eb03fa8e4591e1331514d5009548d1aff9f31ffb3d49d79ca5bf0894db3df3ab68adf15aa49b636b21b1fd1faa73d48c3ac700746bf6e094241db02b06abf70911d2dad031d2737330915010c67a849f30c83050d9ed582739690c07dc50aaa1b09d8cc3e70a3ac737ff8aeaaca707a829144eeff63e285fdee48611cb6f90dc9119f48f96fc265a8cbb7f81aa9608b97f6c716c6f4f5beec291465676471051a2cb05fee293ed32b46a307e0b781798e4878f760f6d6eaf25ef4d7af48bedf29a540c1307e05c317511cd869ac963f0f3ded784ff0cfdd0f81533aa0e8fbc6f1359820be3b5cc8fdfb4b7cbd3ee095e0d12b163ef3a6c52e13204d509a36757ff959ecd7d83a7bf830a116211c1925403a380a8d253cdec4ecb5c1eaa18446772f85efa9012730758bbc83a484b50bf5a316277e516c5dd56616045e7c8dcfd54f056160787d8062e818f13709e67316d5bfa7ce25fffacaeacf31b81c4f14478c4a31ff29589d9e8e09c68215e19d7e9a6667dcc1332ac67faacfe0de29da1741e39e9b01e55e2d0359558736846a8731c79d2d41891048cba6a3c5e7e47e2bfd8d2f998e9de632cc63fbeea5797f207777dea631b4578b7ae1b8eeb5f4d747a6ac058a89e585b512adbdda63d864646ab47beadee11cfb966e0682378299266c27606666ab920362816e68cbe8d55ad8868bdabe2ef9ad1adeb601e306ac5a28a245b2d6486589bea5edb4fd0308e0dbda6fb7b80111bcead7b37387f5cd8c3202674dd364b32af9fe5479de6736be97287794e18bdbf2efb1dcd0f1ba659c881136cb2f6f77a6652412f0a3c73e8482687777204053cf0516e50ad0daf423557ea300ec39304c173ad98645374eb4798cfd059ca322f88e185679624f98275daf11b093f8e546e550a5761e26ed8787492a5d0a0b289f08060ac046a71687b4dfcaba5579bc195dcdb20a6d31d78baf029bcd6f10107dc38de0c1f9509589f844b54f4add28d683298b835f3076698c95ab696d0ee274fe73c973d471a17604b2aeeaad4389e8b38f88afe3c21990ee82ee555b2497bb17c7e9d3dad002010a3875b419925a3f5121bf6e835c94f4d220023b89c13bc47d95553672dc2cae219c0aedbd7b1862d9c2405f09c6040b7aaa51571db174347e339e3d74a4596b56b7e7b2f1a988d73d6b6f1ab0879a36c89f4f2a71f49e8ac7b274ac26184738de6f3f4fb19b3983711b380123f51a2e5b600bc93dcbfd1c01d8257b0a8caf7d396835fe2dcd18adb512bddb2f6e453b3e852e621df0ce4c5deaaf2203eefc3d8ce8aaa2da8a6d11b7f93e13a6babdec465baef0b94f43a6e98f86cf59817964d5e001c4250caf9f868910f5a296ce2fef5f20778274a4a780520a6aac3a47b84c2a31ad4fcb3be6cd54fb00f83ef8d33da1e0f073bd8c548e5654709361ee171d1d1c7cf24257641f13b68f4c5af07a79e9dea668701dd521091074625aa33ba1d8ab8c200f774d723b70b90ed64097629c87e9ced977afd0df4478e1a3ec7032da11b703afb4d7b6ed9c69254afe32f2e192a5e1ea57a2b6f46c52205ce2c2d90d522672d67e5c30b46672b02ff922134d26f751c358235b258fbff6f0824d30c3addf2ef0f6f71a565204e3404b46a6b0fd168909bf085f92e3ae95940bcd4c75505dd2949733706fda52e942737fa6045fcae22e5a73279d040fed9bdd136aea5c9a2aea9b5be1c216cb06a835f2f0d2e69e6747053eb8dc0372453bbe2cdf0010b47068bb89f826c928919ac1cf0276873cb8776b44edd71542a80fc6adb3085b356a30d6ea224061c2a16aec9e1ab9eb8b8d03bf1a"}) utime(&(0x7f0000000040)='./bus\x00', 0x0) r2 = gettid() prlimit64(r2, 0xd, &(0x7f0000000280)={0x7, 0x606c}, &(0x7f00000002c0)) fallocate(r0, 0x49, 0xff, 0x1) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x4, 0x400}) openat(r0, &(0x7f00000000c0)='./bus/file0\x00', 0x60000, 0x82) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xefffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) rename(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00') (async) fallocate(0xffffffffffffffff, 0x69, 0x8, 0x80000000) (async) epoll_create(0x1) (async) fcntl$dupfd(r1, 0x0, r1) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{r0}, 0x0, 0x1c, @inherit={0x78, &(0x7f0000000300)={0x0, 0x6, 0x8, 0x5, {0x18, 0x5, 0x6, 0x8000000000000001, 0x5}, [0x6, 0xff, 0xc6, 0x1, 0x7, 0x1f]}}, @name="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"}) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) gettid() (async) prlimit64(r2, 0xd, &(0x7f0000000280)={0x7, 0x606c}, &(0x7f00000002c0)) (async) fallocate(r0, 0x49, 0xff, 0x1) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x4, 0x400}) (async) openat(r0, &(0x7f00000000c0)='./bus/file0\x00', 0x60000, 0x82) (async) D0714 04:45:23.332294 789113 usertrap_amd64.go:212] [ 12386(2995): 12386(2995)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:23.332321 789113 usertrap_amd64.go:122] [ 12386(2995): 12386(2995)] Allocate a new trap: 0xc00796e600 40 D0714 04:45:23.332335 789113 usertrap_amd64.go:225] [ 12386(2995): 12386(2995)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:23.332677 789113 usertrap_amd64.go:212] [ 12386(2995): 12386(2995)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:23.332770 789113 usertrap_amd64.go:122] [ 12386(2995): 12386(2995)] Allocate a new trap: 0xc00796e600 41 D0714 04:45:23.332843 789113 usertrap_amd64.go:225] [ 12386(2995): 12386(2995)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:23.334154 789113 usertrap_amd64.go:212] [ 12386(2995): 12386(2995)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:23.334194 789113 usertrap_amd64.go:122] [ 12386(2995): 12386(2995)] Allocate a new trap: 0xc00796e600 42 D0714 04:45:23.334207 789113 usertrap_amd64.go:225] [ 12386(2995): 12386(2995)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:23.334345 789113 usertrap_amd64.go:212] [ 12386(2995): 12396(2996)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:23.334523 789113 usertrap_amd64.go:122] [ 12386(2995): 12396(2996)] Allocate a new trap: 0xc00796e600 43 D0714 04:45:23.334547 789113 usertrap_amd64.go:225] [ 12386(2995): 12396(2996)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:23.336875 789113 usertrap_amd64.go:212] [ 12386(2995): 12386(2995)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:23.336972 789113 usertrap_amd64.go:122] [ 12386(2995): 12386(2995)] Allocate a new trap: 0xc00796e600 44 D0714 04:45:23.336992 789113 usertrap_amd64.go:225] [ 12386(2995): 12386(2995)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:23.338212 789113 task_exit.go:204] [ 12386(2995): 12386(2995)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.338518 789113 task_exit.go:204] [ 12386(2995): 12386(2995)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.338620 789113 task_signals.go:204] [ 12386(2995): 12396(2996)] Signal 12386, PID: 12396, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.338649 789113 task_exit.go:204] [ 12386(2995): 12396(2996)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.338781 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:23.338821 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 37 D0714 04:45:23.338947 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:23.339076 789113 task_exit.go:204] [ 12386(2995): 12396(2996)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.339099 789113 task_exit.go:204] [ 12386(2995): 12396(2996)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.339113 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:23.340095 789113 task_exit.go:204] [ 12386(2995): 12386(2995)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.340252 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:23.340277 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 38 D0714 04:45:23.340300 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) 04:45:23 executing program 1: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) (async) r0 = msgget$private(0x0, 0x760) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:23.344744 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:23.344791 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 39 D0714 04:45:23.344807 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:23.346677 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:23.346752 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 40 D0714 04:45:23.346802 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:23.346959 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:23.346982 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 41 D0714 04:45:23.346991 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:23.347642 789113 usertrap_amd64.go:212] [ 12397(2976): 12397(2976)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:23.347674 789113 usertrap_amd64.go:122] [ 12397(2976): 12397(2976)] Allocate a new trap: 0xc005fe1bf0 42 D0714 04:45:23.347687 789113 usertrap_amd64.go:225] [ 12397(2976): 12397(2976)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:23.347738 789113 usertrap_amd64.go:212] [ 12397(2976): 12398(2977)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:23.347809 789113 usertrap_amd64.go:122] [ 12397(2976): 12398(2977)] Allocate a new trap: 0xc005fe1bf0 43 D0714 04:45:23.347892 789113 usertrap_amd64.go:225] [ 12397(2976): 12398(2977)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:23.348721 789113 task_signals.go:470] [ 12397(2976): 12398(2977)] Notified of signal 25 D0714 04:45:23.348798 789113 task_signals.go:204] [ 12397(2976): 12398(2977)] Signal 12397, PID: 12398, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:23.348860 789113 task_exit.go:204] [ 12397(2976): 12398(2977)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.348880 789113 task_exit.go:204] [ 12397(2976): 12398(2977)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.348887 789113 task_exit.go:204] [ 12397(2976): 12398(2977)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.348933 789113 task_signals.go:204] [ 12397(2976): 12397(2976)] Signal 12397, PID: 12397, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.348943 789113 task_exit.go:204] [ 12397(2976): 12397(2976)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.349354 789113 task_exit.go:204] [ 12397(2976): 12397(2976)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.349436 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:23.349683 789113 task_exit.go:204] [ 12397(2976): 12397(2976)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:23 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xefffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) rename(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00') fallocate(0xffffffffffffffff, 0x69, 0x8, 0x80000000) (async) fallocate(0xffffffffffffffff, 0x69, 0x8, 0x80000000) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{r0}, 0x0, 0x1c, @inherit={0x78, &(0x7f0000000300)={0x0, 0x6, 0x8, 0x5, {0x18, 0x5, 0x6, 0x8000000000000001, 0x5}, [0x6, 0xff, 0xc6, 0x1, 0x7, 0x1f]}}, @name="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"}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{r0}, 0x0, 0x1c, @inherit={0x78, &(0x7f0000000300)={0x0, 0x6, 0x8, 0x5, {0x18, 0x5, 0x6, 0x8000000000000001, 0x5}, [0x6, 0xff, 0xc6, 0x1, 0x7, 0x1f]}}, @name="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"}) utime(&(0x7f0000000040)='./bus\x00', 0x0) r2 = gettid() prlimit64(r2, 0xd, &(0x7f0000000280)={0x7, 0x606c}, &(0x7f00000002c0)) fallocate(r0, 0x49, 0xff, 0x1) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x4, 0x400}) (async) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x4, 0x400}) openat(r0, &(0x7f00000000c0)='./bus/file0\x00', 0x60000, 0x82) (async) openat(r0, &(0x7f00000000c0)='./bus/file0\x00', 0x60000, 0x82) D0714 04:45:23.358895 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:23.359011 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 37 D0714 04:45:23.359121 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:23.359996 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:23.360020 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 38 D0714 04:45:23.360030 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:23.362235 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:23.362268 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 37 D0714 04:45:23.362406 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:23.363577 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:23.363665 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 38 D0714 04:45:23.363681 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:23.367164 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:23.367194 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 39 D0714 04:45:23.367205 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:23.367785 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:23.367813 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 39 D0714 04:45:23.367827 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:23.369499 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:23.369532 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 40 D0714 04:45:23.369545 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:23.369682 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:23.369733 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 41 D0714 04:45:23.369755 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:23.370088 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:23.370113 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 40 D0714 04:45:23.370124 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:23.370325 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:23.370352 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 41 D0714 04:45:23.370364 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:23.370631 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:23.370660 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 42 D0714 04:45:23.370670 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:23.370731 789113 usertrap_amd64.go:212] [ 12400(2997): 12401(2998)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:23.370741 789113 usertrap_amd64.go:122] [ 12400(2997): 12401(2998)] Allocate a new trap: 0xc0057ceb10 43 D0714 04:45:23.370751 789113 usertrap_amd64.go:225] [ 12400(2997): 12401(2998)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:23.371221 789113 usertrap_amd64.go:212] [ 12399(2978): 12399(2978)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:23.371250 789113 usertrap_amd64.go:122] [ 12399(2978): 12399(2978)] Allocate a new trap: 0xc005fe1c50 42 D0714 04:45:23.371263 789113 usertrap_amd64.go:225] [ 12399(2978): 12399(2978)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:23.371396 789113 usertrap_amd64.go:212] [ 12399(2978): 12402(2979)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:23.371422 789113 usertrap_amd64.go:122] [ 12399(2978): 12402(2979)] Allocate a new trap: 0xc005fe1c50 43 D0714 04:45:23.371434 789113 usertrap_amd64.go:225] [ 12399(2978): 12402(2979)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:23.372150 789113 usertrap_amd64.go:212] [ 12400(2997): 12400(2997)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:23.372237 789113 usertrap_amd64.go:122] [ 12400(2997): 12400(2997)] Allocate a new trap: 0xc0057ceb10 44 D0714 04:45:23.372256 789113 usertrap_amd64.go:225] [ 12400(2997): 12400(2997)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:23.373068 789113 task_signals.go:470] [ 12399(2978): 12402(2979)] Notified of signal 25 D0714 04:45:23.373167 789113 task_signals.go:204] [ 12399(2978): 12402(2979)] Signal 12399, PID: 12402, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:23.373190 789113 task_exit.go:204] [ 12399(2978): 12402(2979)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.373209 789113 task_exit.go:204] [ 12399(2978): 12402(2979)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.373215 789113 task_exit.go:204] [ 12399(2978): 12402(2979)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.373265 789113 task_signals.go:204] [ 12399(2978): 12399(2978)] Signal 12399, PID: 12399, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.373289 789113 task_exit.go:204] [ 12399(2978): 12399(2978)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.373300 789113 task_exit.go:204] [ 12399(2978): 12399(2978)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.373370 789113 task_signals.go:204] [ 12399(2978): 12403(2980)] Signal 12399, PID: 12403, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.373415 789113 task_exit.go:204] [ 12399(2978): 12403(2980)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.373770 789113 task_exit.go:204] [ 12400(2997): 12400(2997)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.373807 789113 task_exit.go:204] [ 12400(2997): 12400(2997)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.373827 789113 task_signals.go:204] [ 12400(2997): 12401(2998)] Signal 12400, PID: 12401, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.373862 789113 task_exit.go:204] [ 12400(2997): 12401(2998)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.373936 789113 task_exit.go:204] [ 12399(2978): 12403(2980)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.373969 789113 task_exit.go:204] [ 12399(2978): 12403(2980)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.373990 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:23.374127 789113 task_exit.go:204] [ 12399(2978): 12399(2978)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.374194 789113 task_exit.go:204] [ 12400(2997): 12401(2998)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.374262 789113 task_exit.go:204] [ 12400(2997): 12401(2998)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.374287 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:23.375818 789113 task_exit.go:204] [ 12400(2997): 12400(2997)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:23 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x3, &(0x7f0000000100)={0xffffffffffffffdf, 0xffffffffffffffff}) getrlimit(0xa, &(0x7f00000000c0)) fallocate(r0, 0x0, 0x0, 0x100000001) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r1, 0x5421, &(0x7f0000000080)=0x0) setreuid(r2, 0x0) fchown(r0, r2, 0xffffffffffffffff) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:45:23.383527 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:23.383560 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 37 D0714 04:45:23.383689 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:23.384510 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:23.384530 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 38 D0714 04:45:23.384541 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:23.390021 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:23.390047 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 39 D0714 04:45:23.390062 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:23.392177 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:23.392214 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 40 D0714 04:45:23.392235 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:23.392402 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:23.392439 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 41 D0714 04:45:23.392452 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:23.393169 789113 usertrap_amd64.go:212] [ 12404(2981): 12404(2981)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:23.393260 789113 usertrap_amd64.go:122] [ 12404(2981): 12404(2981)] Allocate a new trap: 0xc003942390 42 D0714 04:45:23.393277 789113 usertrap_amd64.go:225] [ 12404(2981): 12404(2981)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:23.393783 789113 usertrap_amd64.go:212] [ 12404(2981): 12406(2982)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:23.393812 789113 usertrap_amd64.go:122] [ 12404(2981): 12406(2982)] Allocate a new trap: 0xc003942390 43 D0714 04:45:23.393825 789113 usertrap_amd64.go:225] [ 12404(2981): 12406(2982)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:23.394726 789113 task_signals.go:470] [ 12404(2981): 12406(2982)] Notified of signal 25 D0714 04:45:23.394766 789113 task_signals.go:204] [ 12404(2981): 12406(2982)] Signal 12404, PID: 12406, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:23.394797 789113 task_exit.go:204] [ 12404(2981): 12406(2982)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.394820 789113 task_exit.go:204] [ 12404(2981): 12406(2982)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.394827 789113 task_exit.go:204] [ 12404(2981): 12406(2982)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.394845 789113 task_signals.go:204] [ 12404(2981): 12404(2981)] Signal 12404, PID: 12404, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:23.394855 789113 task_exit.go:204] [ 12404(2981): 12404(2981)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:23.395197 789113 task_exit.go:204] [ 12404(2981): 12404(2981)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:23.395225 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:23.395371 789113 task_exit.go:204] [ 12404(2981): 12404(2981)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:23.431975 789113 usertrap_amd64.go:212] [ 12388(2932): 12388(2932)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:45:23.432054 789113 usertrap_amd64.go:122] [ 12388(2932): 12388(2932)] Allocate a new trap: 0xc003b516b0 44 D0714 04:45:23.432072 789113 usertrap_amd64.go:225] [ 12388(2932): 12388(2932)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:24.561043 789113 usertrap_amd64.go:212] [ 12385(3423): 12385(3423)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:24.561095 789113 usertrap_amd64.go:122] [ 12385(3423): 12385(3423)] Allocate a new trap: 0xc0085f0240 45 D0714 04:45:24.561112 789113 usertrap_amd64.go:225] [ 12385(3423): 12385(3423)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:45:24.561151 789113 usertrap_amd64.go:212] [ 12388(2932): 12388(2932)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:24.561173 789113 usertrap_amd64.go:122] [ 12388(2932): 12388(2932)] Allocate a new trap: 0xc003b516b0 45 D0714 04:45:24.561189 789113 usertrap_amd64.go:225] [ 12388(2932): 12388(2932)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:45:24.683316 789113 task_exit.go:204] [ 12385(3423): 12385(3423)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.683388 789113 task_signals.go:204] [ 12385(3423): 12391(3426)] Signal 12385, PID: 12391, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.683414 789113 task_signals.go:204] [ 12385(3423): 12394(3428)] Signal 12385, PID: 12394, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.683429 789113 task_signals.go:204] [ 12385(3423): 12390(3425)] Signal 12385, PID: 12390, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.683465 789113 task_signals.go:204] [ 12385(3423): 12389(3424)] Signal 12385, PID: 12389, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.683489 789113 task_exit.go:204] [ 12385(3423): 12385(3423)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.683517 789113 task_signals.go:204] [ 12385(3423): 12393(3427)] Signal 12385, PID: 12393, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.683528 789113 task_exit.go:204] [ 12385(3423): 12393(3427)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.683541 789113 task_exit.go:204] [ 12385(3423): 12393(3427)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.683560 789113 task_exit.go:204] [ 12385(3423): 12393(3427)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.683572 789113 task_exit.go:204] [ 12385(3423): 12391(3426)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.683581 789113 task_exit.go:204] [ 12385(3423): 12391(3426)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.683587 789113 task_exit.go:204] [ 12385(3423): 12391(3426)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.683597 789113 task_exit.go:204] [ 12385(3423): 12394(3428)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.683668 789113 task_exit.go:204] [ 12385(3423): 12394(3428)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.683675 789113 task_exit.go:204] [ 12385(3423): 12394(3428)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.683685 789113 task_exit.go:204] [ 12385(3423): 12390(3425)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.683695 789113 task_exit.go:204] [ 12385(3423): 12390(3425)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.683702 789113 task_exit.go:204] [ 12385(3423): 12390(3425)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.683714 789113 task_exit.go:204] [ 12385(3423): 12389(3424)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.684344 789113 task_exit.go:204] [ 12385(3423): 12389(3424)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.684372 789113 task_exit.go:204] [ 12385(3423): 12389(3424)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.684385 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:24.685616 789113 task_exit.go:204] [ 12385(3423): 12385(3423)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:24 executing program 1: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = msgget$private(0x0, 0x760) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) (async) msgget$private(0x0, 0x760) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) 04:45:24 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x3, &(0x7f0000000100)={0xffffffffffffffdf, 0xffffffffffffffff}) (async) getrlimit(0xa, &(0x7f00000000c0)) fallocate(r0, 0x0, 0x0, 0x100000001) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r1, 0x5421, &(0x7f0000000080)=0x0) setreuid(r2, 0x0) (async) fchown(r0, r2, 0xffffffffffffffff) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:45:24.691855 789113 task_exit.go:204] [ 12388(2932): 12388(2932)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.691887 789113 task_exit.go:204] [ 12388(2932): 12388(2932)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.691968 789113 task_signals.go:204] [ 12388(2932): 12407(2935)] Signal 12388, PID: 12407, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.691997 789113 task_exit.go:204] [ 12388(2932): 12407(2935)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.692015 789113 task_exit.go:204] [ 12388(2932): 12407(2935)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.692021 789113 task_exit.go:204] [ 12388(2932): 12407(2935)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.692398 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:24.692426 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 37 D0714 04:45:24.692566 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:24.695740 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:24.695766 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 38 D0714 04:45:24.695785 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:24.702703 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:24.702732 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 39 D0714 04:45:24.702747 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:24.705609 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:24.705656 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 37 D0714 04:45:24.705749 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:24.706629 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:24.706653 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 38 D0714 04:45:24.706665 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:24.708096 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:24.708121 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 40 D0714 04:45:24.708134 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:24.708478 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:24.708521 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 41 D0714 04:45:24.708597 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:24.709298 789113 usertrap_amd64.go:212] [ 12408(2983): 12408(2983)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:24.709332 789113 usertrap_amd64.go:122] [ 12408(2983): 12408(2983)] Allocate a new trap: 0xc0057ceb40 42 D0714 04:45:24.709350 789113 usertrap_amd64.go:225] [ 12408(2983): 12408(2983)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:24.709374 789113 usertrap_amd64.go:212] [ 12408(2983): 12410(2984)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:24.709382 789113 usertrap_amd64.go:122] [ 12408(2983): 12410(2984)] Allocate a new trap: 0xc0057ceb40 43 D0714 04:45:24.709391 789113 usertrap_amd64.go:225] [ 12408(2983): 12410(2984)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:24.710101 789113 task_signals.go:470] [ 12408(2983): 12410(2984)] Notified of signal 25 D0714 04:45:24.710144 789113 task_signals.go:204] [ 12408(2983): 12410(2984)] Signal 12408, PID: 12410, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:24.710161 789113 task_exit.go:204] [ 12408(2983): 12410(2984)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.710178 789113 task_exit.go:204] [ 12408(2983): 12410(2984)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.710196 789113 task_exit.go:204] [ 12408(2983): 12410(2984)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.710221 789113 task_signals.go:204] [ 12408(2983): 12408(2983)] Signal 12408, PID: 12408, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.710239 789113 task_exit.go:204] [ 12408(2983): 12408(2983)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.710617 789113 task_exit.go:204] [ 12408(2983): 12408(2983)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.710642 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:24.710903 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:24.710919 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 39 D0714 04:45:24.710930 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:24.711773 789113 task_exit.go:204] [ 12408(2983): 12408(2983)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.714335 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:24.714364 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 40 D0714 04:45:24.714377 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:24.714542 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:24.714563 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 41 D0714 04:45:24.714575 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:24.715284 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:24.715312 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 42 D0714 04:45:24.715325 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:24.715348 789113 usertrap_amd64.go:212] [ 12409(2999): 12411(3000)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:24.715356 789113 usertrap_amd64.go:122] [ 12409(2999): 12411(3000)] Allocate a new trap: 0xc0039423f0 43 D0714 04:45:24.715365 789113 usertrap_amd64.go:225] [ 12409(2999): 12411(3000)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:24.716642 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:45:24.716666 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 44 D0714 04:45:24.716674 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:24.718684 789113 usertrap_amd64.go:212] [ 12409(2999): 12409(2999)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:24.718712 789113 usertrap_amd64.go:122] [ 12409(2999): 12409(2999)] Allocate a new trap: 0xc0039423f0 45 D0714 04:45:24.718726 789113 usertrap_amd64.go:225] [ 12409(2999): 12409(2999)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:45:24.719159 789113 task_exit.go:204] [ 12409(2999): 12409(2999)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.719186 789113 task_exit.go:204] [ 12409(2999): 12409(2999)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.719208 789113 task_signals.go:204] [ 12409(2999): 12411(3000)] Signal 12409, PID: 12411, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.719231 789113 task_exit.go:204] [ 12409(2999): 12411(3000)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.719230 789113 task_signals.go:204] [ 12409(2999): 12412(3001)] Signal 12409, PID: 12412, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:24.719241 789113 task_exit.go:204] [ 12409(2999): 12411(3000)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.719281 789113 task_exit.go:204] [ 12409(2999): 12411(3000)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.719358 789113 task_exit.go:204] [ 12409(2999): 12412(3001)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:24.719694 789113 task_exit.go:204] [ 12409(2999): 12412(3001)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:24.719714 789113 task_exit.go:204] [ 12409(2999): 12412(3001)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:24.719726 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:24.720536 789113 task_exit.go:204] [ 12409(2999): 12409(2999)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:26.304081 789113 task_signals.go:481] [ 12388(2932): 12388(2932)] No task notified of signal 9 D0714 04:45:26.304181 789113 task_signals.go:458] [ 12388(2932): 12388(2932)] Discarding duplicate signal 9 D0714 04:45:27.287653 789113 task_signals.go:204] [ 12388(2932): 12392(2933)] Signal 12388, PID: 12392, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.287737 789113 task_exit.go:204] [ 12388(2932): 12392(2933)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.287790 789113 task_exit.go:204] [ 12388(2932): 12392(2933)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.287811 789113 task_exit.go:204] [ 12388(2932): 12392(2933)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.287860 789113 task_signals.go:204] [ 12388(2932): 12405(2934)] Signal 12388, PID: 12405, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.287886 789113 task_exit.go:204] [ 12388(2932): 12405(2934)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.288938 789113 task_exit.go:204] [ 12388(2932): 12405(2934)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.288970 789113 task_exit.go:204] [ 12388(2932): 12405(2934)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.288981 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:27.289131 789113 task_exit.go:204] [ 12388(2932): 12388(2932)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:27 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) fcntl$setlease(r1, 0x400, 0x0) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) (async) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x4, 0x2) 04:45:27 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x3, &(0x7f0000000100)={0xffffffffffffffdf, 0xffffffffffffffff}) getrlimit(0xa, &(0x7f00000000c0)) fallocate(r0, 0x0, 0x0, 0x100000001) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r1, 0x5421, &(0x7f0000000080)=0x0) setreuid(r2, 0x0) (async) fchown(r0, r2, 0xffffffffffffffff) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) 04:45:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x701240, 0xc) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:45:27 executing program 1: r0 = msgget$private(0x0, 0x415) r1 = msgget$private(0x0, 0x542) msgrcv(r1, &(0x7f0000000000)={0x0, ""/234}, 0xf2, 0x2, 0x800) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:27.298352 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:27.298388 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 37 D0714 04:45:27.298504 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:27.299508 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:27.299559 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 38 D0714 04:45:27.299585 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:27.301264 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:27.301307 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 37 D0714 04:45:27.301434 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:27.787201 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:27.787265 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 38 D0714 04:45:27.787284 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:27.790768 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:27.790802 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 39 D0714 04:45:27.790816 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:27.791230 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:27.791266 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 37 D0714 04:45:27.791348 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:27.792112 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:27.792142 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 38 D0714 04:45:27.792152 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:27.796246 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:27.796279 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 39 D0714 04:45:27.796293 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:27.797581 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:27.797612 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 37 D0714 04:45:27.797711 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:27.798756 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:27.798808 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 38 D0714 04:45:27.798826 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:27.801555 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:27.801586 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 40 D0714 04:45:27.801600 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:27.801767 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:27.801792 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 41 D0714 04:45:27.801801 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:27.802282 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:27.802308 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 42 D0714 04:45:27.802354 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:27.802604 789113 usertrap_amd64.go:212] [ 12414(3002): 12417(3003)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:27.802634 789113 usertrap_amd64.go:122] [ 12414(3002): 12417(3003)] Allocate a new trap: 0xc0042c1890 43 D0714 04:45:27.802646 789113 usertrap_amd64.go:225] [ 12414(3002): 12417(3003)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:27.802760 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:27.802818 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 39 D0714 04:45:27.802837 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:27.803813 789113 usertrap_amd64.go:212] [ 12414(3002): 12414(3002)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:27.803852 789113 usertrap_amd64.go:122] [ 12414(3002): 12414(3002)] Allocate a new trap: 0xc0042c1890 44 D0714 04:45:27.803864 789113 usertrap_amd64.go:225] [ 12414(3002): 12414(3002)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:27.805281 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:27.805309 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 40 D0714 04:45:27.805321 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:27.805381 789113 task_exit.go:204] [ 12414(3002): 12414(3002)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.805415 789113 task_exit.go:204] [ 12414(3002): 12414(3002)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.805438 789113 task_signals.go:204] [ 12414(3002): 12417(3003)] Signal 12414, PID: 12417, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.805457 789113 task_exit.go:204] [ 12414(3002): 12417(3003)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.805569 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:27.805595 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 41 D0714 04:45:27.805605 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:27.805731 789113 task_exit.go:204] [ 12414(3002): 12417(3003)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.805757 789113 task_exit.go:204] [ 12414(3002): 12417(3003)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.805771 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:27.806097 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:27.806123 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 42 D0714 04:45:27.806133 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:27.806313 789113 usertrap_amd64.go:212] [ 12416(2936): 12418(2937)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:27.806351 789113 usertrap_amd64.go:122] [ 12416(2936): 12418(2937)] Allocate a new trap: 0xc0008dad50 43 D0714 04:45:27.806368 789113 usertrap_amd64.go:225] [ 12416(2936): 12418(2937)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:27.806505 789113 task_exit.go:204] [ 12414(3002): 12414(3002)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:27 executing program 1: r0 = msgget$private(0x0, 0x415) r1 = msgget$private(0x0, 0x542) msgrcv(r1, &(0x7f0000000000)={0x0, ""/234}, 0xf2, 0x2, 0x800) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:27.809159 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:45:27.809188 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 44 D0714 04:45:27.809203 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:27.809358 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:27.809400 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 40 D0714 04:45:27.809421 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:27.810365 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:27.810396 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 39 D0714 04:45:27.810412 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:27.810690 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:27.810721 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 41 D0714 04:45:27.810742 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:27.811582 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:27.811641 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 42 D0714 04:45:27.811657 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:27.811689 789113 usertrap_amd64.go:212] [ 12415(3429): 12421(3430)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:27.811713 789113 usertrap_amd64.go:122] [ 12415(3429): 12421(3430)] Allocate a new trap: 0xc005fe1c80 43 D0714 04:45:27.811726 789113 usertrap_amd64.go:225] [ 12415(3429): 12421(3430)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:27.820821 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:27.820856 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 40 D0714 04:45:27.820876 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:27.821109 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:27.821129 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 41 D0714 04:45:27.821143 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:27.822156 789113 usertrap_amd64.go:212] [ 12413(2985): 12413(2985)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:27.822186 789113 usertrap_amd64.go:122] [ 12413(2985): 12413(2985)] Allocate a new trap: 0xc003b51710 42 D0714 04:45:27.822197 789113 usertrap_amd64.go:225] [ 12413(2985): 12413(2985)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:27.822236 789113 usertrap_amd64.go:212] [ 12413(2985): 12423(2986)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:27.822254 789113 usertrap_amd64.go:122] [ 12413(2985): 12423(2986)] Allocate a new trap: 0xc003b51710 43 D0714 04:45:27.822261 789113 usertrap_amd64.go:225] [ 12413(2985): 12423(2986)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:27.822984 789113 task_signals.go:470] [ 12413(2985): 12423(2986)] Notified of signal 25 D0714 04:45:27.823046 789113 task_signals.go:204] [ 12413(2985): 12423(2986)] Signal 12413, PID: 12423, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:27.823070 789113 task_exit.go:204] [ 12413(2985): 12423(2986)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.823104 789113 task_exit.go:204] [ 12413(2985): 12423(2986)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.823122 789113 task_exit.go:204] [ 12413(2985): 12423(2986)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.823148 789113 task_signals.go:204] [ 12413(2985): 12413(2985)] Signal 12413, PID: 12413, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.823236 789113 task_exit.go:204] [ 12413(2985): 12413(2985)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.824128 789113 task_exit.go:204] [ 12413(2985): 12413(2985)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.824242 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:27.824332 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:27.824359 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 37 D0714 04:45:27.824442 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:27.824860 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:27.824877 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 38 D0714 04:45:27.824885 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:27.825340 789113 task_exit.go:204] [ 12413(2985): 12413(2985)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:27 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0xb, &(0x7f0000000100)={0x5, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)={0x1f, 0x2d}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:45:27.829773 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:27.829802 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 39 D0714 04:45:27.829815 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:27.832473 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:27.832502 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 40 D0714 04:45:27.832514 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:27.833467 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:27.833495 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 41 D0714 04:45:27.833507 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:27.834284 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:27.834308 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 42 D0714 04:45:27.834319 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:27.834458 789113 usertrap_amd64.go:212] [ 12422(3004): 12425(3005)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:27.834576 789113 usertrap_amd64.go:122] [ 12422(3004): 12425(3005)] Allocate a new trap: 0xc0008dadb0 43 D0714 04:45:27.834635 789113 usertrap_amd64.go:225] [ 12422(3004): 12425(3005)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:27.836261 789113 usertrap_amd64.go:212] [ 12422(3004): 12422(3004)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:27.836293 789113 usertrap_amd64.go:122] [ 12422(3004): 12422(3004)] Allocate a new trap: 0xc0008dadb0 44 D0714 04:45:27.836304 789113 usertrap_amd64.go:225] [ 12422(3004): 12422(3004)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:27.836411 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:27.836448 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 37 D0714 04:45:27.836574 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:27.837164 789113 task_exit.go:204] [ 12422(3004): 12422(3004)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.837209 789113 task_exit.go:204] [ 12422(3004): 12422(3004)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.837232 789113 task_signals.go:204] [ 12422(3004): 12425(3005)] Signal 12422, PID: 12425, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.837280 789113 task_exit.go:204] [ 12422(3004): 12425(3005)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.837304 789113 task_exit.go:204] [ 12422(3004): 12425(3005)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.837316 789113 task_exit.go:204] [ 12422(3004): 12425(3005)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.837349 789113 task_signals.go:204] [ 12422(3004): 12426(3006)] Signal 12422, PID: 12426, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.837376 789113 task_exit.go:204] [ 12422(3004): 12426(3006)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.837680 789113 task_exit.go:204] [ 12422(3004): 12426(3006)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.837764 789113 task_exit.go:204] [ 12422(3004): 12426(3006)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.837819 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:27.838389 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:27.838506 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 38 D0714 04:45:27.838536 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:27.838650 789113 task_exit.go:204] [ 12422(3004): 12422(3004)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:27 executing program 1: r0 = msgget$private(0x0, 0x415) r1 = msgget$private(0x0, 0x542) msgrcv(r1, &(0x7f0000000000)={0x0, ""/234}, 0xf2, 0x2, 0x800) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:27.843675 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:27.843709 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 39 D0714 04:45:27.843724 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:27.847417 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:27.847447 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 40 D0714 04:45:27.847458 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:27.847703 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:27.847734 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 41 D0714 04:45:27.847746 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:27.847805 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:27.847819 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 37 D0714 04:45:27.847877 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:27.848650 789113 usertrap_amd64.go:212] [ 12424(2987): 12424(2987)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:27.848674 789113 usertrap_amd64.go:122] [ 12424(2987): 12424(2987)] Allocate a new trap: 0xc003b51770 42 D0714 04:45:27.848686 789113 usertrap_amd64.go:225] [ 12424(2987): 12424(2987)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:27.848699 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:27.848710 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 38 D0714 04:45:27.848720 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:27.848725 789113 usertrap_amd64.go:212] [ 12424(2987): 12428(2988)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:27.848851 789113 usertrap_amd64.go:122] [ 12424(2987): 12428(2988)] Allocate a new trap: 0xc003b51770 43 D0714 04:45:27.848868 789113 usertrap_amd64.go:225] [ 12424(2987): 12428(2988)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:27.849602 789113 task_signals.go:470] [ 12424(2987): 12428(2988)] Notified of signal 25 D0714 04:45:27.849646 789113 task_signals.go:204] [ 12424(2987): 12428(2988)] Signal 12424, PID: 12428, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:27.849669 789113 task_exit.go:204] [ 12424(2987): 12428(2988)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.849685 789113 task_exit.go:204] [ 12424(2987): 12428(2988)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.849692 789113 task_exit.go:204] [ 12424(2987): 12428(2988)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.849713 789113 task_signals.go:204] [ 12424(2987): 12424(2987)] Signal 12424, PID: 12424, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.849732 789113 task_exit.go:204] [ 12424(2987): 12424(2987)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.850108 789113 task_exit.go:204] [ 12424(2987): 12424(2987)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.850136 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:27.850690 789113 task_exit.go:204] [ 12424(2987): 12424(2987)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:27 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0xb, &(0x7f0000000100)={0x5, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async, rerun: 64) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)={0x1f, 0x2d}) (async, rerun: 64) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:45:27.852227 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:27.852250 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 39 D0714 04:45:27.852263 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:27.855412 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:27.855429 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 40 D0714 04:45:27.855437 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:27.855520 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:27.855526 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 41 D0714 04:45:27.855531 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:27.856220 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:27.856248 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 42 D0714 04:45:27.856255 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:27.856381 789113 usertrap_amd64.go:212] [ 12427(3007): 12430(3008)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:27.856456 789113 usertrap_amd64.go:122] [ 12427(3007): 12430(3008)] Allocate a new trap: 0xc0097346c0 43 D0714 04:45:27.856488 789113 usertrap_amd64.go:225] [ 12427(3007): 12430(3008)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:27.858541 789113 usertrap_amd64.go:212] [ 12427(3007): 12427(3007)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:27.858567 789113 usertrap_amd64.go:122] [ 12427(3007): 12427(3007)] Allocate a new trap: 0xc0097346c0 44 D0714 04:45:27.858579 789113 usertrap_amd64.go:225] [ 12427(3007): 12427(3007)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:27.859678 789113 task_exit.go:204] [ 12427(3007): 12427(3007)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.859721 789113 task_exit.go:204] [ 12427(3007): 12427(3007)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.859820 789113 task_signals.go:204] [ 12427(3007): 12430(3008)] Signal 12427, PID: 12430, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.859839 789113 task_signals.go:204] [ 12427(3007): 12431(3009)] Signal 12427, PID: 12431, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.859848 789113 task_exit.go:204] [ 12427(3007): 12430(3008)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.859867 789113 task_exit.go:204] [ 12427(3007): 12430(3008)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.859876 789113 task_exit.go:204] [ 12427(3007): 12430(3008)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.859888 789113 task_exit.go:204] [ 12427(3007): 12431(3009)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.860123 789113 task_exit.go:204] [ 12427(3007): 12431(3009)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.860146 789113 task_exit.go:204] [ 12427(3007): 12431(3009)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.860153 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:27.860095 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:27.860175 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 37 D0714 04:45:27.860267 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:27.860704 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:27.860732 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 38 D0714 04:45:27.860743 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:27.861250 789113 task_exit.go:204] [ 12427(3007): 12427(3007)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.864941 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:45:27.865015 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 44 D0714 04:45:27.865033 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:27.867852 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:27.867881 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 39 D0714 04:45:27.867893 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:27.870116 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:27.870141 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 40 D0714 04:45:27.870150 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:27.870289 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:27.870312 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 41 D0714 04:45:27.870321 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:27.870871 789113 usertrap_amd64.go:212] [ 12429(2989): 12433(2990)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:27.870895 789113 usertrap_amd64.go:122] [ 12429(2989): 12433(2990)] Allocate a new trap: 0xc0057cec30 42 D0714 04:45:27.870913 789113 usertrap_amd64.go:225] [ 12429(2989): 12433(2990)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:27.871649 789113 usertrap_amd64.go:212] [ 12429(2989): 12429(2989)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:27.871678 789113 usertrap_amd64.go:122] [ 12429(2989): 12429(2989)] Allocate a new trap: 0xc0057cec30 43 D0714 04:45:27.871690 789113 usertrap_amd64.go:225] [ 12429(2989): 12429(2989)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:27.872154 789113 task_signals.go:470] [ 12429(2989): 12433(2990)] Notified of signal 25 D0714 04:45:27.872189 789113 task_signals.go:204] [ 12429(2989): 12433(2990)] Signal 12429, PID: 12433, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:27.872213 789113 task_exit.go:204] [ 12429(2989): 12433(2990)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.872227 789113 task_exit.go:204] [ 12429(2989): 12433(2990)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.872234 789113 task_exit.go:204] [ 12429(2989): 12433(2990)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:27.872249 789113 task_signals.go:204] [ 12429(2989): 12429(2989)] Signal 12429, PID: 12429, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:27.872261 789113 task_exit.go:204] [ 12429(2989): 12429(2989)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:27.872561 789113 task_exit.go:204] [ 12429(2989): 12429(2989)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:27.872586 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:27.872616 789113 task_exit.go:204] [ 12429(2989): 12429(2989)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:28.628896 789113 usertrap_amd64.go:212] [ 12415(3429): 12415(3429)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:28.628955 789113 usertrap_amd64.go:122] [ 12415(3429): 12415(3429)] Allocate a new trap: 0xc005fe1c80 45 D0714 04:45:28.628977 789113 usertrap_amd64.go:225] [ 12415(3429): 12415(3429)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:45:28.630143 789113 task_exit.go:204] [ 12415(3429): 12415(3429)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:28.630192 789113 task_exit.go:204] [ 12415(3429): 12415(3429)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:28.630233 789113 task_signals.go:204] [ 12415(3429): 12432(3431)] Signal 12415, PID: 12432, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:28.630281 789113 task_exit.go:204] [ 12415(3429): 12432(3431)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:28.630296 789113 task_exit.go:204] [ 12415(3429): 12432(3431)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:28.630303 789113 task_exit.go:204] [ 12415(3429): 12432(3431)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:28.630245 789113 task_signals.go:204] [ 12415(3429): 12421(3430)] Signal 12415, PID: 12421, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:28.630328 789113 task_exit.go:204] [ 12415(3429): 12421(3430)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:28.630688 789113 task_exit.go:204] [ 12415(3429): 12421(3430)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:28.630711 789113 task_exit.go:204] [ 12415(3429): 12421(3430)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:28.630722 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:28.632236 789113 task_exit.go:204] [ 12415(3429): 12415(3429)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:28 executing program 1: r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/12}, 0x14, 0x0, 0x3000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:28.635740 789113 usertrap_amd64.go:212] [ 12416(2936): 12416(2936)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:28.635777 789113 usertrap_amd64.go:122] [ 12416(2936): 12416(2936)] Allocate a new trap: 0xc0008dad50 45 D0714 04:45:28.635820 789113 usertrap_amd64.go:225] [ 12416(2936): 12416(2936)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:45:28.636750 789113 task_exit.go:204] [ 12416(2936): 12416(2936)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:28.636811 789113 task_exit.go:204] [ 12416(2936): 12416(2936)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:28.636838 789113 task_signals.go:204] [ 12416(2936): 12420(2939)] Signal 12416, PID: 12420, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:28.636879 789113 task_exit.go:204] [ 12416(2936): 12420(2939)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:28.636890 789113 task_exit.go:204] [ 12416(2936): 12420(2939)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:28.636898 789113 task_exit.go:204] [ 12416(2936): 12420(2939)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:28.638236 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:28.638271 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 37 D0714 04:45:28.638370 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:28.639438 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:28.639477 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 38 D0714 04:45:28.639498 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:28.643068 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:28.643094 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 39 D0714 04:45:28.643105 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:28.645121 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:28.645161 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 40 D0714 04:45:28.645177 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:28.645749 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:28.645780 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 41 D0714 04:45:28.645794 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:28.646484 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:28.646515 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 42 D0714 04:45:28.646528 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:28.646682 789113 usertrap_amd64.go:212] [ 12434(3010): 12435(3011)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:28.646714 789113 usertrap_amd64.go:122] [ 12434(3010): 12435(3011)] Allocate a new trap: 0xc003b517d0 43 D0714 04:45:28.646727 789113 usertrap_amd64.go:225] [ 12434(3010): 12435(3011)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:28.752949 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:45:28.752997 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 44 D0714 04:45:28.753021 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:29.475666 789113 usertrap_amd64.go:212] [ 12434(3010): 12434(3010)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:29.475726 789113 usertrap_amd64.go:122] [ 12434(3010): 12434(3010)] Allocate a new trap: 0xc003b517d0 45 D0714 04:45:29.475744 789113 usertrap_amd64.go:225] [ 12434(3010): 12434(3010)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:45:29.476624 789113 task_exit.go:204] [ 12434(3010): 12434(3010)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:29.476707 789113 task_exit.go:204] [ 12434(3010): 12434(3010)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:29.476720 789113 task_signals.go:204] [ 12434(3010): 12437(3013)] Signal 12434, PID: 12437, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:29.476732 789113 task_signals.go:204] [ 12434(3010): 12436(3012)] Signal 12434, PID: 12436, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:29.476772 789113 task_exit.go:204] [ 12434(3010): 12437(3013)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:29.476803 789113 task_signals.go:204] [ 12434(3010): 12435(3011)] Signal 12434, PID: 12435, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:29.476841 789113 task_exit.go:204] [ 12434(3010): 12437(3013)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:29.476859 789113 task_exit.go:204] [ 12434(3010): 12437(3013)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:29.476878 789113 task_exit.go:204] [ 12434(3010): 12436(3012)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:29.476904 789113 task_exit.go:204] [ 12434(3010): 12436(3012)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:29.476911 789113 task_exit.go:204] [ 12434(3010): 12436(3012)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:29.476925 789113 task_exit.go:204] [ 12434(3010): 12435(3011)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:29.477452 789113 task_exit.go:204] [ 12434(3010): 12435(3011)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:29.477484 789113 task_exit.go:204] [ 12434(3010): 12435(3011)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:29.477498 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:29.478094 789113 task_exit.go:204] [ 12434(3010): 12434(3010)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:30.801469 789113 task_signals.go:481] [ 12416(2936): 12416(2936)] No task notified of signal 9 D0714 04:45:30.801569 789113 task_signals.go:458] [ 12416(2936): 12416(2936)] Discarding duplicate signal 9 D0714 04:45:31.315171 789113 task_signals.go:204] [ 12416(2936): 12419(2938)] Signal 12416, PID: 12419, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:31.315253 789113 task_exit.go:204] [ 12416(2936): 12419(2938)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:31.315295 789113 task_exit.go:204] [ 12416(2936): 12419(2938)] Transitioning from exit state TaskExitInitiated to TaskExitZombie I0714 04:45:31.315199 789113 watchdog.go:295] Watchdog starting loop, tasks: 70, discount: 0s D0714 04:45:31.315305 789113 task_exit.go:204] [ 12416(2936): 12419(2938)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:31.315368 789113 task_signals.go:204] [ 12416(2936): 12418(2937)] Signal 12416, PID: 12418, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:31.315424 789113 task_exit.go:204] [ 12416(2936): 12418(2937)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:31.315914 789113 task_exit.go:204] [ 12416(2936): 12418(2937)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:31.315943 789113 task_exit.go:204] [ 12416(2936): 12418(2937)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:31.315958 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:31.315993 789113 task_exit.go:204] [ 12416(2936): 12416(2936)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:31 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) fcntl$setlease(r1, 0x400, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x4, 0x2) 04:45:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async, rerun: 32) listen(r0, 0x0) (async, rerun: 32) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x701240, 0xc) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:45:31 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0xb, &(0x7f0000000100)={0x5, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)={0x1f, 0x2d}) (async) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)={0x1f, 0x2d}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) 04:45:31 executing program 1: r0 = msgget$private(0x0, 0x0) (async) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/12}, 0x14, 0x0, 0x3000) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:31.789017 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:31.789075 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 37 D0714 04:45:31.789189 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:31.789349 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:31.789374 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 37 D0714 04:45:31.789518 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:31.790430 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:31.790471 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 38 D0714 04:45:31.790494 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:31.790576 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:31.790624 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 38 D0714 04:45:31.790639 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:31.793931 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:31.793959 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 39 D0714 04:45:31.793969 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:31.795412 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:31.795437 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 39 D0714 04:45:31.795451 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:31.795710 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:31.795735 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 40 D0714 04:45:31.795750 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:31.796094 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:31.796123 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 37 D0714 04:45:31.796124 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:31.796141 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 41 D0714 04:45:31.796153 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:31.796236 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:31.797125 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:31.797150 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 42 D0714 04:45:31.797163 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:31.797572 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:31.797595 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 38 D0714 04:45:31.797606 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:31.797723 789113 usertrap_amd64.go:212] [ 12439(3014): 12442(3015)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:31.797749 789113 usertrap_amd64.go:122] [ 12439(3014): 12442(3015)] Allocate a new trap: 0xc003942420 43 D0714 04:45:31.797760 789113 usertrap_amd64.go:225] [ 12439(3014): 12442(3015)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:31.798007 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:31.798041 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 37 D0714 04:45:31.798304 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:31.799216 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:31.799240 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 38 D0714 04:45:31.799249 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:31.801190 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:31.801208 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 40 D0714 04:45:31.801215 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:31.801384 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:31.801402 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 41 D0714 04:45:31.801413 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:31.801959 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:31.801977 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 42 D0714 04:45:31.801987 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:31.802129 789113 usertrap_amd64.go:212] [ 12441(2940): 12443(2941)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:31.802186 789113 usertrap_amd64.go:122] [ 12441(2940): 12443(2941)] Allocate a new trap: 0xc00796e690 43 D0714 04:45:31.802206 789113 usertrap_amd64.go:225] [ 12441(2940): 12443(2941)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:31.802686 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:31.802711 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 39 D0714 04:45:31.802723 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:31.803133 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:31.803162 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 39 D0714 04:45:31.803177 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:31.804668 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:31.804711 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 40 D0714 04:45:31.804727 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:31.804911 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:31.804941 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 40 D0714 04:45:31.804951 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:31.804951 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:31.804995 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 41 D0714 04:45:31.805009 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:31.805128 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:31.805148 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 41 D0714 04:45:31.805156 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:31.805635 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:31.805669 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 42 D0714 04:45:31.805682 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:31.805945 789113 usertrap_amd64.go:212] [ 12440(3432): 12445(3433)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:31.805971 789113 usertrap_amd64.go:122] [ 12440(3432): 12445(3433)] Allocate a new trap: 0xc0042c18c0 43 D0714 04:45:31.805981 789113 usertrap_amd64.go:225] [ 12440(3432): 12445(3433)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:31.805995 789113 usertrap_amd64.go:212] [ 12438(2991): 12438(2991)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:31.806011 789113 usertrap_amd64.go:122] [ 12438(2991): 12438(2991)] Allocate a new trap: 0xc003b51830 42 D0714 04:45:31.806024 789113 usertrap_amd64.go:225] [ 12438(2991): 12438(2991)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:31.806074 789113 usertrap_amd64.go:212] [ 12438(2991): 12446(2992)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:31.806096 789113 usertrap_amd64.go:122] [ 12438(2991): 12446(2992)] Allocate a new trap: 0xc003b51830 43 D0714 04:45:31.806108 789113 usertrap_amd64.go:225] [ 12438(2991): 12446(2992)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:31.806766 789113 task_signals.go:470] [ 12438(2991): 12446(2992)] Notified of signal 25 D0714 04:45:31.806804 789113 task_signals.go:204] [ 12438(2991): 12446(2992)] Signal 12438, PID: 12446, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:31.806824 789113 task_exit.go:204] [ 12438(2991): 12446(2992)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:31.806844 789113 task_exit.go:204] [ 12438(2991): 12446(2992)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:31.806855 789113 task_exit.go:204] [ 12438(2991): 12446(2992)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:31.806900 789113 task_signals.go:204] [ 12438(2991): 12438(2991)] Signal 12438, PID: 12438, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:31.806921 789113 task_exit.go:204] [ 12438(2991): 12438(2991)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:31.807478 789113 task_exit.go:204] [ 12438(2991): 12438(2991)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:31.807518 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:31.808518 789113 task_exit.go:204] [ 12438(2991): 12438(2991)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:31 executing program 0: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000280)={&(0x7f0000000200)=""/118, 0x76, 0x8, 0x7fffffff}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r2, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000180)=0x30) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x3) D0714 04:45:31.810597 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:45:31.810615 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 44 D0714 04:45:31.810628 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:31.815593 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:31.815645 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 37 D0714 04:45:31.815754 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:31.816371 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:31.816394 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 38 D0714 04:45:31.816403 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:31.821510 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:31.821538 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 39 D0714 04:45:31.821551 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:31.824167 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:31.824200 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 40 D0714 04:45:31.824212 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:31.824407 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:31.824431 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 41 D0714 04:45:31.824440 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:31.825206 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:31.825235 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 42 D0714 04:45:31.825248 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:31.825290 789113 usertrap_amd64.go:212] [ 12450(2993): 12451(2994)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:31.825306 789113 usertrap_amd64.go:122] [ 12450(2993): 12451(2994)] Allocate a new trap: 0xc00796e750 43 D0714 04:45:31.825315 789113 usertrap_amd64.go:225] [ 12450(2993): 12451(2994)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:32.776685 789113 usertrap_amd64.go:212] [ 12440(3432): 12440(3432)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:32.776747 789113 usertrap_amd64.go:122] [ 12440(3432): 12440(3432)] Allocate a new trap: 0xc0042c18c0 45 D0714 04:45:32.776766 789113 usertrap_amd64.go:225] [ 12440(3432): 12440(3432)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:45:32.777740 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:45:32.777772 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 44 D0714 04:45:32.777788 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:32.778515 789113 task_exit.go:204] [ 12440(3432): 12440(3432)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.778569 789113 task_exit.go:204] [ 12440(3432): 12440(3432)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.778595 789113 task_signals.go:204] [ 12440(3432): 12447(3434)] Signal 12440, PID: 12447, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.778577 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:45:32.778620 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 44 D0714 04:45:32.778646 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:32.778609 789113 task_exit.go:204] [ 12440(3432): 12447(3434)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.778577 789113 task_signals.go:204] [ 12440(3432): 12449(3436)] Signal 12440, PID: 12449, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.778592 789113 task_signals.go:204] [ 12440(3432): 12445(3433)] Signal 12440, PID: 12445, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.778715 789113 task_exit.go:204] [ 12440(3432): 12449(3436)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.778776 789113 task_signals.go:204] [ 12440(3432): 12448(3435)] Signal 12440, PID: 12448, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.778785 789113 task_exit.go:204] [ 12440(3432): 12449(3436)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.778812 789113 task_exit.go:204] [ 12440(3432): 12449(3436)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.778837 789113 task_exit.go:204] [ 12440(3432): 12447(3434)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.778844 789113 task_exit.go:204] [ 12440(3432): 12447(3434)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.778888 789113 task_exit.go:204] [ 12440(3432): 12445(3433)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.778914 789113 task_exit.go:204] [ 12440(3432): 12445(3433)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.778920 789113 task_exit.go:204] [ 12440(3432): 12445(3433)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.778949 789113 task_exit.go:204] [ 12440(3432): 12448(3435)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.779571 789113 task_exit.go:204] [ 12440(3432): 12448(3435)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.779635 789113 task_exit.go:204] [ 12440(3432): 12448(3435)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.779661 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:32.780243 789113 task_exit.go:204] [ 12440(3432): 12440(3432)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async, rerun: 32) r1 = accept4(r0, 0x0, 0x0, 0x0) (async, rerun: 32) socket$inet_tcp(0x2, 0x1, 0x0) (async) r2 = open(&(0x7f0000000000)='./file0\x00', 0x701240, 0xc) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async, rerun: 32) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async, rerun: 32) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async, rerun: 32) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (rerun: 32) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:45:32.878801 789113 usertrap_amd64.go:212] [ 12441(2940): 12441(2940)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:32.878863 789113 usertrap_amd64.go:122] [ 12441(2940): 12441(2940)] Allocate a new trap: 0xc00796e690 45 D0714 04:45:32.878882 789113 usertrap_amd64.go:225] [ 12441(2940): 12441(2940)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:45:32.880028 789113 task_exit.go:204] [ 12441(2940): 12441(2940)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.880079 789113 task_exit.go:204] [ 12441(2940): 12441(2940)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.880093 789113 usertrap_amd64.go:212] [ 12439(3014): 12439(3014)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:32.880118 789113 usertrap_amd64.go:122] [ 12439(3014): 12439(3014)] Allocate a new trap: 0xc003942420 45 D0714 04:45:32.880132 789113 usertrap_amd64.go:225] [ 12439(3014): 12439(3014)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:45:32.880121 789113 task_signals.go:204] [ 12441(2940): 12452(2943)] Signal 12441, PID: 12452, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.880182 789113 task_exit.go:204] [ 12441(2940): 12452(2943)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.880211 789113 task_exit.go:204] [ 12441(2940): 12452(2943)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.880216 789113 task_exit.go:204] [ 12441(2940): 12452(2943)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.880189 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:45:32.880253 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 44 D0714 04:45:32.880277 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:45:32.881091 789113 task_exit.go:204] [ 12439(3014): 12439(3014)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.881125 789113 task_exit.go:204] [ 12439(3014): 12439(3014)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.881125 789113 task_signals.go:204] [ 12439(3014): 12455(3017)] Signal 12439, PID: 12455, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.881153 789113 task_exit.go:204] [ 12439(3014): 12455(3017)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.881154 789113 task_signals.go:204] [ 12439(3014): 12442(3015)] Signal 12439, PID: 12442, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.881166 789113 task_exit.go:204] [ 12439(3014): 12442(3015)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.881175 789113 task_signals.go:204] [ 12439(3014): 12454(3016)] Signal 12439, PID: 12454, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.881183 789113 task_exit.go:204] [ 12439(3014): 12442(3015)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.881186 789113 task_exit.go:204] [ 12439(3014): 12442(3015)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.881199 789113 task_exit.go:204] [ 12439(3014): 12455(3017)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.881203 789113 task_exit.go:204] [ 12439(3014): 12455(3017)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.881209 789113 task_exit.go:204] [ 12439(3014): 12454(3016)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.881575 789113 task_exit.go:204] [ 12439(3014): 12454(3016)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.881592 789113 task_exit.go:204] [ 12439(3014): 12454(3016)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:32.881610 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:32.882121 789113 task_exit.go:204] [ 12439(3014): 12439(3014)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:32 executing program 1: r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/12}, 0x14, 0x0, 0x3000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgget$private(0x0, 0x0) (async) msgget$private(0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) (async) msgrcv(r1, &(0x7f0000000000)={0x0, ""/12}, 0x14, 0x0, 0x3000) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) D0714 04:45:32.981777 789113 usertrap_amd64.go:212] [ 12450(2993): 12450(2993)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:45:32.981851 789113 usertrap_amd64.go:122] [ 12450(2993): 12450(2993)] Allocate a new trap: 0xc00796e750 45 D0714 04:45:32.981874 789113 usertrap_amd64.go:225] [ 12450(2993): 12450(2993)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:45:32.982511 789113 task_exit.go:204] [ 12450(2993): 12450(2993)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.982573 789113 task_exit.go:204] [ 12450(2993): 12450(2993)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.982613 789113 task_signals.go:204] [ 12450(2993): 12457(2997)] Signal 12450, PID: 12457, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:32.982693 789113 task_exit.go:204] [ 12450(2993): 12457(2997)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:32.982728 789113 task_exit.go:204] [ 12450(2993): 12457(2997)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:32.982738 789113 task_exit.go:204] [ 12450(2993): 12457(2997)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:34.922117 789113 task_signals.go:481] [ 12450(2993): 12450(2993)] No task notified of signal 9 D0714 04:45:34.922261 789113 task_signals.go:458] [ 12450(2993): 12450(2993)] Discarding duplicate signal 9 D0714 04:45:35.702391 789113 task_signals.go:481] [ 12441(2940): 12441(2940)] No task notified of signal 9 D0714 04:45:35.702578 789113 task_signals.go:458] [ 12441(2940): 12441(2940)] Discarding duplicate signal 9 D0714 04:45:37.771436 789113 task_signals.go:204] [ 12441(2940): 12444(2942)] Signal 12441, PID: 12444, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:37.771491 789113 task_signals.go:204] [ 12441(2940): 12443(2941)] Signal 12441, PID: 12443, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:37.771513 789113 task_exit.go:204] [ 12441(2940): 12444(2942)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:37.771506 789113 task_signals.go:204] [ 12450(2993): 12456(2996)] Signal 12450, PID: 12456, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:37.771554 789113 task_signals.go:204] [ 12450(2993): 12451(2994)] Signal 12450, PID: 12451, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:37.771438 789113 task_signals.go:204] [ 12450(2993): 12453(2995)] Signal 12450, PID: 12453, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:37.771590 789113 task_exit.go:204] [ 12441(2940): 12444(2942)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:37.771664 789113 task_exit.go:204] [ 12441(2940): 12444(2942)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.771692 789113 task_exit.go:204] [ 12450(2993): 12451(2994)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:37.771727 789113 task_exit.go:204] [ 12450(2993): 12451(2994)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:37.771737 789113 task_exit.go:204] [ 12450(2993): 12451(2994)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.771755 789113 task_exit.go:204] [ 12450(2993): 12453(2995)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:37.771777 789113 task_exit.go:204] [ 12450(2993): 12453(2995)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:37.771784 789113 task_exit.go:204] [ 12450(2993): 12453(2995)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.771799 789113 task_exit.go:204] [ 12441(2940): 12443(2941)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:37.771888 789113 task_exit.go:204] [ 12450(2993): 12456(2996)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:37.772211 789113 task_exit.go:204] [ 12441(2940): 12443(2941)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:37.772249 789113 task_exit.go:204] [ 12441(2940): 12443(2941)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.772265 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:37.772360 789113 task_exit.go:204] [ 12450(2993): 12456(2996)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:37.772395 789113 task_exit.go:204] [ 12450(2993): 12456(2996)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.772409 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:37.772717 789113 task_exit.go:204] [ 12450(2993): 12450(2993)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:37 executing program 0: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) dup2(r1, 0xffffffffffffffff) (async) r2 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000280)={&(0x7f0000000200)=""/118, 0x76, 0x8, 0x7fffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r2, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000180)=0x30) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x3) D0714 04:45:37.773309 789113 task_exit.go:204] [ 12441(2940): 12441(2940)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:37.773467 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:45:37.773529 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler 04:45:37 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x5b, 0x100000001, 0x100000001) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000002f704641f48e56b00000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a9562718b4fa13abd78da94f6a879a842034d9c0d4059630d8e2a6a169c40e7d5ede8271dd9c094e2e6f88d1c304560bbc96bef1ef9173c002d471e19561f0908988e17f8a1fc2ed1a87c215706e995f372036ab2d077"], 0x78) D0714 04:45:38.176803 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:38.176854 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 37 D0714 04:45:38.176998 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:38.177991 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:38.178010 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 38 D0714 04:45:38.178024 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:38.179885 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:38.179966 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 37 D0714 04:45:38.180164 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:38.181857 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:38.181880 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 38 D0714 04:45:38.181892 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:38.183027 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:38.183075 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 39 D0714 04:45:38.183090 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:38.185659 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:38.185689 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 39 D0714 04:45:38.185702 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:38.186526 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:38.186600 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 40 D0714 04:45:38.186620 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:38.186569 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:38.186668 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 37 D0714 04:45:38.186787 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:38.186867 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:38.186892 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 41 D0714 04:45:38.186903 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:38.187732 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:38.187767 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 42 D0714 04:45:38.187783 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:38.187841 789113 usertrap_amd64.go:212] [ 12459(3018): 12462(3019)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:38.187870 789113 usertrap_amd64.go:122] [ 12459(3018): 12462(3019)] Allocate a new trap: 0xc0035fe0f0 43 D0714 04:45:38.187886 789113 usertrap_amd64.go:225] [ 12459(3018): 12462(3019)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:38.188830 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:38.188867 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 37 D0714 04:45:38.189013 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:38.189954 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:38.189986 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 38 D0714 04:45:38.189997 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:38.191801 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:38.191830 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 38 D0714 04:45:38.191845 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:38.194683 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:38.194729 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 39 D0714 04:45:38.194742 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:38.196306 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:38.196333 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 40 D0714 04:45:38.196345 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:38.196563 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:38.196596 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 41 D0714 04:45:38.196608 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:38.196925 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:38.196960 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 39 D0714 04:45:38.196976 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:38.197108 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:38.197131 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 42 D0714 04:45:38.197160 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:38.197314 789113 usertrap_amd64.go:212] [ 12460(2944): 12463(2945)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:38.197337 789113 usertrap_amd64.go:122] [ 12460(2944): 12463(2945)] Allocate a new trap: 0xc005fe1d10 43 D0714 04:45:38.197346 789113 usertrap_amd64.go:225] [ 12460(2944): 12463(2945)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:38.198524 789113 usertrap_amd64.go:212] [ 12460(2944): 12460(2944)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:38.198552 789113 usertrap_amd64.go:122] [ 12460(2944): 12460(2944)] Allocate a new trap: 0xc005fe1d10 44 D0714 04:45:38.198569 789113 usertrap_amd64.go:225] [ 12460(2944): 12460(2944)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:38.198816 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:38.198840 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 40 D0714 04:45:38.198851 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:38.198856 789113 task_exit.go:204] [ 12460(2944): 12460(2944)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.198920 789113 task_exit.go:204] [ 12460(2944): 12460(2944)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.198957 789113 task_signals.go:204] [ 12460(2944): 12463(2945)] Signal 12460, PID: 12463, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.198974 789113 task_exit.go:204] [ 12460(2944): 12463(2945)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.199062 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:38.199091 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 41 D0714 04:45:38.199102 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:38.199291 789113 task_exit.go:204] [ 12460(2944): 12463(2945)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.199317 789113 task_exit.go:204] [ 12460(2944): 12463(2945)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.199328 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:38.199718 789113 task_exit.go:204] [ 12460(2944): 12460(2944)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.200054 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:38.200076 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 40 D0714 04:45:38.200095 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:38.200253 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:38.200265 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 41 D0714 04:45:38.200274 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) 04:45:38 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x5b, 0x100000001, 0x100000001) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000002f704641f48e56b00000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a9562718b4fa13abd78da94f6a879a842034d9c0d4059630d8e2a6a169c40e7d5ede8271dd9c094e2e6f88d1c304560bbc96bef1ef9173c002d471e19561f0908988e17f8a1fc2ed1a87c215706e995f372036ab2d077"], 0x78) D0714 04:45:38.200907 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:38.200945 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 42 D0714 04:45:38.200957 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:38.201116 789113 usertrap_amd64.go:212] [ 12458(3437): 12464(3438)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:38.201138 789113 usertrap_amd64.go:122] [ 12458(3437): 12464(3438)] Allocate a new trap: 0xc0008dae40 43 D0714 04:45:38.201148 789113 usertrap_amd64.go:225] [ 12458(3437): 12464(3438)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:38.205187 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:45:38.205211 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 44 D0714 04:45:38.205222 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:38.205742 789113 usertrap_amd64.go:212] [ 12461(2998): 12471(2999)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:38.205786 789113 usertrap_amd64.go:122] [ 12461(2998): 12471(2999)] Allocate a new trap: 0xc0085f0270 42 D0714 04:45:38.205806 789113 usertrap_amd64.go:225] [ 12461(2998): 12471(2999)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:38.205874 789113 usertrap_amd64.go:212] [ 12461(2998): 12461(2998)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:38.205952 789113 usertrap_amd64.go:122] [ 12461(2998): 12461(2998)] Allocate a new trap: 0xc0085f0270 43 D0714 04:45:38.205965 789113 usertrap_amd64.go:225] [ 12461(2998): 12461(2998)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:38.206760 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:38.206855 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 37 D0714 04:45:38.206967 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:38.207854 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:38.208006 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 38 D0714 04:45:38.208083 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:38.210198 789113 task_signals.go:470] [ 12461(2998): 12471(2999)] Notified of signal 25 D0714 04:45:38.210362 789113 task_signals.go:204] [ 12461(2998): 12471(2999)] Signal 12461, PID: 12471, TID: 0, fault addr: 0x19: terminating thread group D0714 04:45:38.210460 789113 task_exit.go:204] [ 12461(2998): 12471(2999)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.210524 789113 task_exit.go:204] [ 12461(2998): 12471(2999)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.210544 789113 task_exit.go:204] [ 12461(2998): 12471(2999)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.210568 789113 task_signals.go:204] [ 12461(2998): 12472(3000)] Signal 12461, PID: 12472, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.210583 789113 task_signals.go:204] [ 12461(2998): 12461(2998)] Signal 12461, PID: 12461, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.210598 789113 task_exit.go:204] [ 12461(2998): 12472(3000)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.210657 789113 task_signals.go:204] [ 12461(2998): 12473(3001)] Signal 12461, PID: 12473, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.210684 789113 task_exit.go:204] [ 12461(2998): 12472(3000)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.210728 789113 task_exit.go:204] [ 12461(2998): 12472(3000)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.210742 789113 task_exit.go:204] [ 12461(2998): 12461(2998)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.210752 789113 task_exit.go:204] [ 12461(2998): 12461(2998)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.210761 789113 task_exit.go:204] [ 12461(2998): 12473(3001)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.211061 789113 task_exit.go:204] [ 12461(2998): 12473(3001)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.211085 789113 task_exit.go:204] [ 12461(2998): 12473(3001)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.211095 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:38.211315 789113 task_exit.go:204] [ 12461(2998): 12461(2998)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:38 executing program 0: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) (async) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000280)={&(0x7f0000000200)=""/118, 0x76, 0x8, 0x7fffffff}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r2, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000180)=0x30) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x3) (rerun: 32) D0714 04:45:38.217429 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:38.217450 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 37 D0714 04:45:38.217552 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:38.218468 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:38.218535 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 38 D0714 04:45:38.218592 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:38.222834 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:38.222865 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 39 D0714 04:45:38.222877 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:38.224144 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:38.224168 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 39 D0714 04:45:38.224180 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:38.224860 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:38.224886 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 40 D0714 04:45:38.224899 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:38.225071 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:38.225115 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 41 D0714 04:45:38.225125 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:38.225825 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:38.225841 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 42 D0714 04:45:38.225855 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:38.225887 789113 usertrap_amd64.go:212] [ 12474(3002): 12475(3003)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:38.225894 789113 usertrap_amd64.go:122] [ 12474(3002): 12475(3003)] Allocate a new trap: 0xc0042c1950 43 D0714 04:45:38.225903 789113 usertrap_amd64.go:225] [ 12474(3002): 12475(3003)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:38.226802 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:38.226850 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 40 D0714 04:45:38.226866 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:38.227165 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:38.227206 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 41 D0714 04:45:38.227220 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:38.227921 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:38.228067 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 42 D0714 04:45:38.228146 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:38.228482 789113 usertrap_amd64.go:212] [ 12465(2946): 12477(2947)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:38.228575 789113 usertrap_amd64.go:122] [ 12465(2946): 12477(2947)] Allocate a new trap: 0xc003b44f00 43 D0714 04:45:38.228698 789113 usertrap_amd64.go:225] [ 12465(2946): 12477(2947)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:38.229877 789113 usertrap_amd64.go:212] [ 12465(2946): 12465(2946)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:38.229900 789113 usertrap_amd64.go:122] [ 12465(2946): 12465(2946)] Allocate a new trap: 0xc003b44f00 44 D0714 04:45:38.229911 789113 usertrap_amd64.go:225] [ 12465(2946): 12465(2946)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:38.230310 789113 task_exit.go:204] [ 12465(2946): 12465(2946)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.230422 789113 task_exit.go:204] [ 12465(2946): 12465(2946)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.230452 789113 task_signals.go:204] [ 12465(2946): 12478(2948)] Signal 12465, PID: 12478, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.230472 789113 task_exit.go:204] [ 12465(2946): 12478(2948)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.230485 789113 task_exit.go:204] [ 12465(2946): 12478(2948)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.230492 789113 task_exit.go:204] [ 12465(2946): 12478(2948)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.230458 789113 task_signals.go:204] [ 12465(2946): 12477(2947)] Signal 12465, PID: 12477, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.230509 789113 task_exit.go:204] [ 12465(2946): 12477(2947)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.230835 789113 task_exit.go:204] [ 12465(2946): 12477(2947)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.230861 789113 task_exit.go:204] [ 12465(2946): 12477(2947)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.230871 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:38.233824 789113 task_exit.go:204] [ 12465(2946): 12465(2946)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:38 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x5b, 0x100000001, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000002f704641f48e56b00000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a9562718b4fa13abd78da94f6a879a842034d9c0d4059630d8e2a6a169c40e7d5ede8271dd9c094e2e6f88d1c304560bbc96bef1ef9173c002d471e19561f0908988e17f8a1fc2ed1a87c215706e995f372036ab2d077"], 0x78) D0714 04:45:38.241143 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:38.241190 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 37 D0714 04:45:38.241279 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:38.242186 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:38.242213 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 38 D0714 04:45:38.242233 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:38.245347 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:38.245369 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 39 D0714 04:45:38.245378 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:38.246765 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:38.246790 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 40 D0714 04:45:38.246801 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:38.246912 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:38.246929 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 41 D0714 04:45:38.246938 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:38.247288 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:38.247345 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 42 D0714 04:45:38.247446 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:38.247545 789113 usertrap_amd64.go:212] [ 12479(2949): 12481(2950)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:38.247570 789113 usertrap_amd64.go:122] [ 12479(2949): 12481(2950)] Allocate a new trap: 0xc0042c19b0 43 D0714 04:45:38.247581 789113 usertrap_amd64.go:225] [ 12479(2949): 12481(2950)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:38.248910 789113 usertrap_amd64.go:212] [ 12479(2949): 12479(2949)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:38.248954 789113 usertrap_amd64.go:122] [ 12479(2949): 12479(2949)] Allocate a new trap: 0xc0042c19b0 44 D0714 04:45:38.248968 789113 usertrap_amd64.go:225] [ 12479(2949): 12479(2949)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:38.249492 789113 task_exit.go:204] [ 12479(2949): 12479(2949)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.249530 789113 task_exit.go:204] [ 12479(2949): 12479(2949)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.249555 789113 task_signals.go:204] [ 12479(2949): 12482(2951)] Signal 12479, PID: 12482, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.249573 789113 task_exit.go:204] [ 12479(2949): 12482(2951)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.249588 789113 task_exit.go:204] [ 12479(2949): 12482(2951)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.249594 789113 task_exit.go:204] [ 12479(2949): 12482(2951)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.249551 789113 task_signals.go:204] [ 12479(2949): 12481(2950)] Signal 12479, PID: 12481, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:38.249628 789113 task_exit.go:204] [ 12479(2949): 12481(2950)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:38.250321 789113 task_exit.go:204] [ 12479(2949): 12481(2950)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:38.250380 789113 task_exit.go:204] [ 12479(2949): 12481(2950)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:38.250402 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:38.251314 789113 task_exit.go:204] [ 12479(2949): 12479(2949)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:38 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0xc00) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x401, 0x4) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:45:38.264391 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:38.264435 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 37 D0714 04:45:38.264539 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:38.265212 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:38.265234 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 38 D0714 04:45:38.265245 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:38.269292 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:38.269320 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 39 D0714 04:45:38.269333 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:38.271703 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:38.271729 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 40 D0714 04:45:38.271742 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:38.271909 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:38.271928 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 41 D0714 04:45:38.271937 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:38.272389 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:38.272824 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 42 D0714 04:45:38.273005 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:38.273113 789113 usertrap_amd64.go:212] [ 12483(2952): 12484(2953)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:38.273183 789113 usertrap_amd64.go:122] [ 12483(2952): 12484(2953)] Allocate a new trap: 0xc0035fe180 43 D0714 04:45:38.273253 789113 usertrap_amd64.go:225] [ 12483(2952): 12484(2953)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:39.340613 789113 usertrap_amd64.go:212] [ 12458(3437): 12458(3437)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:39.340671 789113 usertrap_amd64.go:122] [ 12458(3437): 12458(3437)] Allocate a new trap: 0xc0008dae40 45 D0714 04:45:39.340688 789113 usertrap_amd64.go:225] [ 12458(3437): 12458(3437)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:45:39.434669 789113 task_exit.go:204] [ 12458(3437): 12458(3437)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:39.434732 789113 task_signals.go:204] [ 12458(3437): 12466(3439)] Signal 12458, PID: 12466, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:40.328534 789113 task_signals.go:204] [ 12458(3437): 12464(3438)] Signal 12458, PID: 12464, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:40.328518 789113 task_exit.go:204] [ 12458(3437): 12458(3437)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.046695 789113 task_signals.go:204] [ 12458(3437): 12469(3442)] Signal 12458, PID: 12469, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.046727 789113 task_signals.go:204] [ 12458(3437): 12467(3440)] Signal 12458, PID: 12467, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.046769 789113 task_exit.go:204] [ 12458(3437): 12469(3442)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:40.328787 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:45:41.046791 789113 task_signals.go:204] [ 12458(3437): 12468(3441)] Signal 12458, PID: 12468, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.046797 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 44 D0714 04:45:41.046800 789113 task_exit.go:204] [ 12458(3437): 12466(3439)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.046823 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:41.046852 789113 task_signals.go:204] [ 12458(3437): 12470(3443)] Signal 12458, PID: 12470, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.046967 789113 task_exit.go:204] [ 12458(3437): 12464(3438)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.046992 789113 task_exit.go:204] [ 12458(3437): 12467(3440)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.047014 789113 task_exit.go:204] [ 12458(3437): 12467(3440)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.047022 789113 task_exit.go:204] [ 12458(3437): 12467(3440)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.047069 789113 task_exit.go:204] [ 12458(3437): 12468(3441)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.047136 789113 task_exit.go:204] [ 12458(3437): 12468(3441)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.047155 789113 task_exit.go:204] [ 12458(3437): 12468(3441)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.047175 789113 task_exit.go:204] [ 12458(3437): 12469(3442)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.047182 789113 task_exit.go:204] [ 12458(3437): 12469(3442)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.047199 789113 task_exit.go:204] [ 12458(3437): 12466(3439)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.047223 789113 task_exit.go:204] [ 12458(3437): 12466(3439)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.047237 789113 task_exit.go:204] [ 12458(3437): 12470(3443)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.047251 789113 task_exit.go:204] [ 12458(3437): 12470(3443)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.047256 789113 task_exit.go:204] [ 12458(3437): 12470(3443)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.047663 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:45:41.047680 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 44 D0714 04:45:41.047705 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:45:41.048064 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:45:41.048084 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 44 D0714 04:45:41.048095 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:41.048342 789113 task_signals.go:481] [ 12458(3437): 12458(3437)] No task notified of signal 9 D0714 04:45:41.048503 789113 task_signals.go:458] [ 12458(3437): 12458(3437)] Discarding duplicate signal 9 D0714 04:45:41.049866 789113 usertrap_amd64.go:212] [ 12483(2952): 12483(2952)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:41.050041 789113 usertrap_amd64.go:122] [ 12483(2952): 12483(2952)] Allocate a new trap: 0xc0035fe180 45 D0714 04:45:41.050145 789113 usertrap_amd64.go:225] [ 12483(2952): 12483(2952)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:45:41.050800 789113 task_exit.go:204] [ 12483(2952): 12483(2952)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.050839 789113 task_exit.go:204] [ 12483(2952): 12483(2952)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.060084 789113 task_exit.go:204] [ 12458(3437): 12464(3438)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.060121 789113 task_exit.go:204] [ 12458(3437): 12464(3438)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.060134 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:41.060283 789113 task_exit.go:204] [ 12458(3437): 12458(3437)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000040)=0x8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "beef9444394ed6b3", "5c82cdeac57b833f905a09822f53439f", "6a589346", "29e8407af548d6fe"}, 0x28) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:45:41.149123 789113 usertrap_amd64.go:212] [ 12459(3018): 12459(3018)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:41.149181 789113 usertrap_amd64.go:122] [ 12459(3018): 12459(3018)] Allocate a new trap: 0xc0035fe0f0 45 D0714 04:45:41.149185 789113 usertrap_amd64.go:212] [ 12474(3002): 12474(3002)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:45:41.149199 789113 usertrap_amd64.go:225] [ 12459(3018): 12459(3018)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:45:41.149204 789113 usertrap_amd64.go:122] [ 12474(3002): 12474(3002)] Allocate a new trap: 0xc0042c1950 45 D0714 04:45:41.149221 789113 usertrap_amd64.go:225] [ 12474(3002): 12474(3002)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:45:41.150373 789113 task_exit.go:204] [ 12459(3018): 12459(3018)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150417 789113 task_signals.go:204] [ 12459(3018): 12489(3022)] Signal 12459, PID: 12489, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.150460 789113 task_exit.go:204] [ 12459(3018): 12489(3022)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150461 789113 task_signals.go:204] [ 12459(3018): 12480(3020)] Signal 12459, PID: 12480, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.150472 789113 task_signals.go:204] [ 12459(3018): 12462(3019)] Signal 12459, PID: 12462, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.150474 789113 task_exit.go:204] [ 12459(3018): 12480(3020)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150432 789113 task_signals.go:204] [ 12459(3018): 12490(3023)] Signal 12459, PID: 12490, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.150488 789113 task_exit.go:204] [ 12459(3018): 12490(3023)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150500 789113 task_signals.go:204] [ 12459(3018): 12486(3021)] Signal 12459, PID: 12486, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.150505 789113 task_exit.go:204] [ 12459(3018): 12490(3023)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.150513 789113 task_exit.go:204] [ 12459(3018): 12490(3023)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.150533 789113 task_exit.go:204] [ 12459(3018): 12486(3021)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150558 789113 task_exit.go:204] [ 12459(3018): 12486(3021)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.150564 789113 task_exit.go:204] [ 12459(3018): 12486(3021)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.150598 789113 task_exit.go:204] [ 12459(3018): 12489(3022)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.150607 789113 task_exit.go:204] [ 12459(3018): 12489(3022)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.150618 789113 task_exit.go:204] [ 12459(3018): 12462(3019)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.150636 789113 task_exit.go:204] [ 12459(3018): 12462(3019)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.150644 789113 task_exit.go:204] [ 12459(3018): 12462(3019)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.150660 789113 task_exit.go:204] [ 12459(3018): 12480(3020)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.150666 789113 task_exit.go:204] [ 12459(3018): 12480(3020)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.151000 789113 task_exit.go:204] [ 12459(3018): 12459(3018)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.151035 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:41.151125 789113 task_exit.go:204] [ 12474(3002): 12474(3002)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.151204 789113 task_exit.go:204] [ 12474(3002): 12474(3002)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.151245 789113 task_signals.go:204] [ 12474(3002): 12485(3005)] Signal 12474, PID: 12485, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.151283 789113 task_exit.go:204] [ 12474(3002): 12485(3005)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.151296 789113 task_exit.go:204] [ 12474(3002): 12485(3005)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.151302 789113 task_exit.go:204] [ 12474(3002): 12485(3005)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.151328 789113 task_signals.go:204] [ 12474(3002): 12488(3006)] Signal 12474, PID: 12488, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:41.151354 789113 task_exit.go:204] [ 12474(3002): 12488(3006)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:41.151364 789113 task_exit.go:204] [ 12474(3002): 12488(3006)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:41.151371 789113 task_exit.go:204] [ 12474(3002): 12488(3006)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:41.151439 789113 task_exit.go:204] [ 12459(3018): 12459(3018)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:41 executing program 1: msgget$private(0x0, 0x490) r0 = shmget(0x2, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4072) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) r2 = semget(0x1, 0x1, 0x4) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000000c0)=""/78) shmctl$IPC_RMID(r1, 0x0) D0714 04:45:42.050929 789113 task_signals.go:481] [ 12483(2952): 12483(2952)] No task notified of signal 9 D0714 04:45:42.050993 789113 task_signals.go:458] [ 12483(2952): 12483(2952)] Discarding duplicate signal 9 D0714 04:45:42.149686 789113 task_signals.go:481] [ 12474(3002): 12474(3002)] No task notified of signal 9 D0714 04:45:42.149811 789113 task_signals.go:458] [ 12474(3002): 12474(3002)] Discarding duplicate signal 9 D0714 04:45:43.699898 789113 task_signals.go:204] [ 12474(3002): 12476(3004)] Signal 12474, PID: 12476, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:43.699976 789113 task_exit.go:204] [ 12474(3002): 12476(3004)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:43.700016 789113 task_exit.go:204] [ 12474(3002): 12476(3004)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:43.700025 789113 task_exit.go:204] [ 12474(3002): 12476(3004)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:43.699916 789113 task_signals.go:204] [ 12474(3002): 12475(3003)] Signal 12474, PID: 12475, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:43.700065 789113 task_exit.go:204] [ 12474(3002): 12475(3003)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:43.700758 789113 task_exit.go:204] [ 12474(3002): 12475(3003)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:43.700788 789113 task_exit.go:204] [ 12474(3002): 12475(3003)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:43.700807 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:43.700851 789113 task_exit.go:204] [ 12474(3002): 12474(3002)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:43 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) socketpair(0x10, 0x5, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r1, 0x22e7e000) D0714 04:45:44.105207 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:45:44.105352 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:45:44.204020 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:44.204082 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 37 D0714 04:45:44.204214 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:44.205384 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:44.205451 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 38 D0714 04:45:44.205472 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:44.207015 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:44.207080 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 37 D0714 04:45:44.207168 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:44.207266 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:44.207304 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 37 D0714 04:45:44.207467 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:44.208698 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:44.208731 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 38 D0714 04:45:44.208745 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:44.214467 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:44.214510 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 39 D0714 04:45:44.214525 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:44.216075 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:44.216110 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 38 D0714 04:45:44.216127 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:44.217512 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:44.217537 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 40 D0714 04:45:44.217548 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:44.217722 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:44.217737 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 41 D0714 04:45:44.217744 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:44.218454 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:44.218471 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 42 D0714 04:45:44.218479 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:44.218554 789113 usertrap_amd64.go:212] [ 12492(3024): 12494(3025)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:44.218571 789113 usertrap_amd64.go:122] [ 12492(3024): 12494(3025)] Allocate a new trap: 0xc0042c19e0 43 D0714 04:45:44.218581 789113 usertrap_amd64.go:225] [ 12492(3024): 12494(3025)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:44.219795 789113 usertrap_amd64.go:212] [ 12492(3024): 12492(3024)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:44.219824 789113 usertrap_amd64.go:122] [ 12492(3024): 12492(3024)] Allocate a new trap: 0xc0042c19e0 44 D0714 04:45:44.219837 789113 usertrap_amd64.go:225] [ 12492(3024): 12492(3024)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:44.220015 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:44.220044 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 39 D0714 04:45:44.220058 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:44.220639 789113 task_exit.go:204] [ 12492(3024): 12492(3024)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:44.220685 789113 task_exit.go:204] [ 12492(3024): 12492(3024)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:44.220727 789113 task_signals.go:204] [ 12492(3024): 12494(3025)] Signal 12492, PID: 12494, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:44.220751 789113 task_exit.go:204] [ 12492(3024): 12494(3025)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:44.221024 789113 task_exit.go:204] [ 12492(3024): 12494(3025)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:44.221048 789113 task_exit.go:204] [ 12492(3024): 12494(3025)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:44.221059 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:44.221490 789113 task_exit.go:204] [ 12492(3024): 12492(3024)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:44 executing program 1: msgget$private(0x0, 0x490) shmget(0x2, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) (async) r0 = shmget(0x2, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4072) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) semget(0x1, 0x1, 0x4) (async) r2 = semget(0x1, 0x1, 0x4) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000000c0)=""/78) shmctl$IPC_RMID(r1, 0x0) D0714 04:45:44.222264 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:44.222287 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 40 D0714 04:45:44.222298 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:44.222569 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:44.222603 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 41 D0714 04:45:44.222614 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:44.222821 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:44.222845 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 39 D0714 04:45:44.222876 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:44.223145 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:44.223169 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 42 D0714 04:45:44.223181 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:44.223242 789113 usertrap_amd64.go:212] [ 12491(3444): 12495(3445)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:44.223272 789113 usertrap_amd64.go:122] [ 12491(3444): 12495(3445)] Allocate a new trap: 0xc009734720 43 D0714 04:45:44.223286 789113 usertrap_amd64.go:225] [ 12491(3444): 12495(3445)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:44.226094 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:44.226120 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 40 D0714 04:45:44.226135 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:44.226566 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:44.226589 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 41 D0714 04:45:44.226601 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:44.227331 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:44.227351 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 42 D0714 04:45:44.227369 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:44.227397 789113 usertrap_amd64.go:212] [ 12493(3007): 12497(3008)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:44.227411 789113 usertrap_amd64.go:122] [ 12493(3007): 12497(3008)] Allocate a new trap: 0xc005fe1dd0 43 D0714 04:45:44.227419 789113 usertrap_amd64.go:225] [ 12493(3007): 12497(3008)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:44.227795 789113 usertrap_amd64.go:212] [ 12496(3026): 12496(3026)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:44.227816 789113 usertrap_amd64.go:122] [ 12496(3026): 12496(3026)] Allocate a new trap: 0xc00796e870 37 D0714 04:45:44.227895 789113 usertrap_amd64.go:225] [ 12496(3026): 12496(3026)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:44.228898 789113 usertrap_amd64.go:212] [ 12496(3026): 12496(3026)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:44.228957 789113 usertrap_amd64.go:122] [ 12496(3026): 12496(3026)] Allocate a new trap: 0xc00796e870 38 D0714 04:45:44.228977 789113 usertrap_amd64.go:225] [ 12496(3026): 12496(3026)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:44.873522 789113 usertrap_amd64.go:212] [ 12491(3444): 12491(3444)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:44.873576 789113 usertrap_amd64.go:122] [ 12491(3444): 12491(3444)] Allocate a new trap: 0xc009734720 44 D0714 04:45:44.873592 789113 usertrap_amd64.go:225] [ 12491(3444): 12491(3444)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:44.874997 789113 task_exit.go:204] [ 12491(3444): 12491(3444)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:44.875051 789113 task_exit.go:204] [ 12491(3444): 12491(3444)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:44.875077 789113 task_signals.go:204] [ 12491(3444): 12495(3445)] Signal 12491, PID: 12495, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:44.875091 789113 task_exit.go:204] [ 12491(3444): 12495(3445)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:44.875101 789113 task_exit.go:204] [ 12491(3444): 12495(3445)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:44.875108 789113 task_exit.go:204] [ 12491(3444): 12495(3445)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:44.875121 789113 task_signals.go:204] [ 12491(3444): 12498(3446)] Signal 12491, PID: 12498, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:44.875140 789113 task_exit.go:204] [ 12491(3444): 12498(3446)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:44.875478 789113 task_exit.go:204] [ 12491(3444): 12498(3446)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:44.875504 789113 task_exit.go:204] [ 12491(3444): 12498(3446)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:44.875515 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:44.875546 789113 task_exit.go:204] [ 12491(3444): 12491(3444)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000040)=0x8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "beef9444394ed6b3", "5c82cdeac57b833f905a09822f53439f", "6a589346", "29e8407af548d6fe"}, 0x28) connect$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) fcntl$dupfd(r1, 0x406, r1) (async) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000040)=0x8) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) epoll_create(0x1) (async) fcntl$dupfd(r4, 0x0, r4) (async) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "beef9444394ed6b3", "5c82cdeac57b833f905a09822f53439f", "6a589346", "29e8407af548d6fe"}, 0x28) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async) D0714 04:45:45.871048 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:45:45.871115 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 44 D0714 04:45:45.871133 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:45:45.972168 789113 usertrap_amd64.go:212] [ 12493(3007): 12493(3007)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:45:45.972227 789113 usertrap_amd64.go:122] [ 12493(3007): 12493(3007)] Allocate a new trap: 0xc005fe1dd0 45 D0714 04:45:45.972246 789113 usertrap_amd64.go:225] [ 12493(3007): 12493(3007)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:45:45.973877 789113 task_exit.go:204] [ 12493(3007): 12493(3007)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:45.973943 789113 task_exit.go:204] [ 12493(3007): 12493(3007)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:45.973978 789113 task_signals.go:204] [ 12493(3007): 12501(3011)] Signal 12493, PID: 12501, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:45.974009 789113 task_exit.go:204] [ 12493(3007): 12501(3011)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:45.974021 789113 task_exit.go:204] [ 12493(3007): 12501(3011)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:45.974029 789113 task_exit.go:204] [ 12493(3007): 12501(3011)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.104538 789113 task_signals.go:470] [ 7: 5231] Notified of signal 23 D0714 04:45:47.104716 789113 task_signals.go:220] [ 7: 5231] Signal 23: delivering to handler D0714 04:45:47.203193 789113 task_signals.go:481] [ 12493(3007): 12493(3007)] No task notified of signal 9 D0714 04:45:47.203294 789113 task_signals.go:458] [ 12493(3007): 12493(3007)] Discarding duplicate signal 9 D0714 04:45:47.224946 789113 task_signals.go:481] [ 12496(3026): 12496(3026)] No task notified of signal 9 D0714 04:45:47.225098 789113 task_signals.go:458] [ 12496(3026): 12496(3026)] Discarding duplicate signal 9 D0714 04:45:47.906716 789113 task_signals.go:204] [ 12496(3026): 12496(3026)] Signal 12496, PID: 12496, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906787 789113 task_exit.go:204] [ 12496(3026): 12496(3026)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.906781 789113 task_signals.go:204] [ 12493(3007): 12499(3009)] Signal 12493, PID: 12499, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906795 789113 task_signals.go:204] [ 12483(2952): 12487(2954)] Signal 12483, PID: 12487, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906815 789113 task_exit.go:204] [ 12493(3007): 12499(3009)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.906840 789113 task_signals.go:204] [ 12493(3007): 12500(3010)] Signal 12493, PID: 12500, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906868 789113 task_signals.go:204] [ 12483(2952): 12484(2953)] Signal 12483, PID: 12484, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906895 789113 task_signals.go:204] [ 12493(3007): 12497(3008)] Signal 12493, PID: 12497, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:47.906911 789113 task_exit.go:204] [ 12493(3007): 12499(3009)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.906917 789113 task_exit.go:204] [ 12493(3007): 12499(3009)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.906965 789113 task_exit.go:204] [ 12483(2952): 12487(2954)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.907023 789113 task_exit.go:204] [ 12483(2952): 12487(2954)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.907032 789113 task_exit.go:204] [ 12483(2952): 12487(2954)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.907048 789113 task_exit.go:204] [ 12493(3007): 12500(3010)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.907085 789113 task_exit.go:204] [ 12493(3007): 12500(3010)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.907094 789113 task_exit.go:204] [ 12493(3007): 12500(3010)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.907105 789113 task_exit.go:204] [ 12483(2952): 12484(2953)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.907212 789113 task_exit.go:204] [ 12496(3026): 12496(3026)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.907246 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:47.907310 789113 task_exit.go:204] [ 12496(3026): 12496(3026)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.907352 789113 task_exit.go:204] [ 12493(3007): 12497(3008)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:47.907517 789113 task_exit.go:204] [ 12483(2952): 12484(2953)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.907561 789113 task_exit.go:204] [ 12483(2952): 12484(2953)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.907583 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:47.907651 789113 task_exit.go:204] [ 12483(2952): 12483(2952)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:47 executing program 1: msgget$private(0x0, 0x490) (async) r0 = shmget(0x2, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4072) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) r2 = semget(0x1, 0x1, 0x4) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000000c0)=""/78) (async) shmctl$IPC_RMID(r1, 0x0) 04:45:47 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0xc00) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x401, 0x4) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:45:47.907981 789113 task_exit.go:204] [ 12493(3007): 12497(3008)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:47.908002 789113 task_exit.go:204] [ 12493(3007): 12497(3008)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:47.908013 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:47.908039 789113 task_exit.go:204] [ 12493(3007): 12493(3007)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:47 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) socketpair(0x10, 0x5, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r1, 0x22e7e000) D0714 04:45:48.315101 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:48.315147 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 37 D0714 04:45:48.315225 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:48.316919 789113 usertrap_amd64.go:212] [ 12504(3447): 12504(3447)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:48.317018 789113 usertrap_amd64.go:122] [ 12504(3447): 12504(3447)] Allocate a new trap: 0xc0042c1a10 37 D0714 04:45:48.317203 789113 usertrap_amd64.go:225] [ 12504(3447): 12504(3447)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:48.317026 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:48.317366 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 37 D0714 04:45:48.317491 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:48.318822 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:48.318865 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 38 D0714 04:45:48.318891 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:48.319250 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:48.319293 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 38 D0714 04:45:48.319305 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:48.325311 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:48.325486 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 39 D0714 04:45:48.325565 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:48.328979 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:48.329004 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 40 D0714 04:45:48.329019 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:48.329202 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:48.329235 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 41 D0714 04:45:48.329250 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:48.330144 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:48.330226 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 42 D0714 04:45:48.330274 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:48.330358 789113 usertrap_amd64.go:212] [ 12505(3012): 12506(3013)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:48.330421 789113 usertrap_amd64.go:122] [ 12505(3012): 12506(3013)] Allocate a new trap: 0xc0042c1a40 43 D0714 04:45:48.330487 789113 usertrap_amd64.go:225] [ 12505(3012): 12506(3013)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:48.331589 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:48.331686 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 39 D0714 04:45:48.331714 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:48.332023 789113 usertrap_amd64.go:212] [ 12502(2955): 12502(2955)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:48.332048 789113 usertrap_amd64.go:122] [ 12502(2955): 12502(2955)] Allocate a new trap: 0xc0097347e0 37 D0714 04:45:48.332197 789113 usertrap_amd64.go:225] [ 12502(2955): 12502(2955)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:48.333758 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:45:48.333877 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 44 D0714 04:45:48.333933 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:45:48.334957 789113 usertrap_amd64.go:212] [ 12502(2955): 12502(2955)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:48.335021 789113 usertrap_amd64.go:122] [ 12502(2955): 12502(2955)] Allocate a new trap: 0xc0097347e0 38 D0714 04:45:48.335087 789113 usertrap_amd64.go:225] [ 12502(2955): 12502(2955)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:48.335669 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:48.335741 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 40 D0714 04:45:48.335795 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:48.336080 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:48.336103 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 41 D0714 04:45:48.336117 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:48.336945 789113 usertrap_amd64.go:212] [ 12504(3447): 12504(3447)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:48.336995 789113 usertrap_amd64.go:122] [ 12504(3447): 12504(3447)] Allocate a new trap: 0xc0042c1a10 38 D0714 04:45:48.337017 789113 usertrap_amd64.go:225] [ 12504(3447): 12504(3447)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:48.337568 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:48.337590 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 42 D0714 04:45:48.337600 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:48.337885 789113 usertrap_amd64.go:212] [ 12503(3027): 12510(3028)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:48.337902 789113 usertrap_amd64.go:122] [ 12503(3027): 12510(3028)] Allocate a new trap: 0xc007838ed0 43 D0714 04:45:48.337921 789113 usertrap_amd64.go:225] [ 12503(3027): 12510(3028)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:48.340423 789113 usertrap_amd64.go:212] [ 12503(3027): 12503(3027)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:48.340449 789113 usertrap_amd64.go:122] [ 12503(3027): 12503(3027)] Allocate a new trap: 0xc007838ed0 44 D0714 04:45:48.340465 789113 usertrap_amd64.go:225] [ 12503(3027): 12503(3027)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:48.342031 789113 task_exit.go:204] [ 12503(3027): 12503(3027)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:48.342075 789113 task_exit.go:204] [ 12503(3027): 12503(3027)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:48.342120 789113 task_signals.go:204] [ 12503(3027): 12511(3029)] Signal 12503, PID: 12511, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:48.342148 789113 task_exit.go:204] [ 12503(3027): 12511(3029)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:48.342163 789113 task_exit.go:204] [ 12503(3027): 12511(3029)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:48.342170 789113 task_exit.go:204] [ 12503(3027): 12511(3029)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:48.342098 789113 task_signals.go:204] [ 12503(3027): 12510(3028)] Signal 12503, PID: 12510, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:48.342295 789113 task_exit.go:204] [ 12503(3027): 12510(3028)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:48.342583 789113 task_exit.go:204] [ 12503(3027): 12510(3028)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:48.342660 789113 task_exit.go:204] [ 12503(3027): 12510(3028)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:48.342716 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:48.343393 789113 task_exit.go:204] [ 12503(3027): 12503(3027)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:48 executing program 1: msgget$private(0x0, 0x0) r0 = shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:49.489355 789113 usertrap_amd64.go:212] [ 12505(3012): 12505(3012)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:45:49.489421 789113 usertrap_amd64.go:122] [ 12505(3012): 12505(3012)] Allocate a new trap: 0xc0042c1a40 45 D0714 04:45:49.489451 789113 usertrap_amd64.go:225] [ 12505(3012): 12505(3012)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:45:49.596670 789113 task_exit.go:204] [ 12505(3012): 12505(3012)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:49.596757 789113 task_exit.go:204] [ 12505(3012): 12505(3012)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:49.596810 789113 task_signals.go:204] [ 12505(3012): 12508(3015)] Signal 12505, PID: 12508, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:49.596840 789113 task_exit.go:204] [ 12505(3012): 12508(3015)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:49.596851 789113 task_exit.go:204] [ 12505(3012): 12508(3015)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:49.596859 789113 task_exit.go:204] [ 12505(3012): 12508(3015)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:49.596875 789113 task_signals.go:204] [ 12505(3012): 12509(3016)] Signal 12505, PID: 12509, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:49.597053 789113 task_exit.go:204] [ 12505(3012): 12509(3016)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:49.597129 789113 task_exit.go:204] [ 12505(3012): 12509(3016)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:49.597171 789113 task_exit.go:204] [ 12505(3012): 12509(3016)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:51.342738 789113 task_signals.go:481] [ 12505(3012): 12505(3012)] No task notified of signal 9 D0714 04:45:51.342827 789113 task_signals.go:481] [ 12504(3447): 12504(3447)] No task notified of signal 9 D0714 04:45:51.342857 789113 task_signals.go:458] [ 12505(3012): 12505(3012)] Discarding duplicate signal 9 D0714 04:45:51.342872 789113 task_signals.go:481] [ 12502(2955): 12502(2955)] No task notified of signal 9 D0714 04:45:51.342901 789113 task_signals.go:458] [ 12504(3447): 12504(3447)] Discarding duplicate signal 9 D0714 04:45:51.342938 789113 task_signals.go:458] [ 12502(2955): 12502(2955)] Discarding duplicate signal 9 D0714 04:45:52.117754 789113 task_signals.go:204] [ 12502(2955): 12502(2955)] Signal 12502, PID: 12502, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:52.117804 789113 task_signals.go:204] [ 12505(3012): 12507(3014)] Signal 12505, PID: 12507, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:52.117795 789113 task_signals.go:204] [ 12505(3012): 12506(3013)] Signal 12505, PID: 12506, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:52.117825 789113 task_exit.go:204] [ 12502(2955): 12502(2955)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:52.117923 789113 task_signals.go:204] [ 12504(3447): 12504(3447)] Signal 12504, PID: 12504, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:52.117954 789113 task_exit.go:204] [ 12504(3447): 12504(3447)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:52.118048 789113 task_exit.go:204] [ 12505(3012): 12507(3014)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:52.118103 789113 task_exit.go:204] [ 12505(3012): 12507(3014)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:52.118116 789113 task_exit.go:204] [ 12505(3012): 12507(3014)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:52.118137 789113 task_exit.go:204] [ 12505(3012): 12506(3013)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:52.118212 789113 task_exit.go:204] [ 12502(2955): 12502(2955)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:52.118258 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:52.118286 789113 task_exit.go:204] [ 12502(2955): 12502(2955)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:52.118388 789113 task_exit.go:204] [ 12504(3447): 12504(3447)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:52.118410 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:52.118449 789113 task_exit.go:204] [ 12504(3447): 12504(3447)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:52.118789 789113 task_exit.go:204] [ 12505(3012): 12506(3013)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:52.118822 789113 task_exit.go:204] [ 12505(3012): 12506(3013)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:52.118841 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:52.118869 789113 task_exit.go:204] [ 12505(3012): 12505(3012)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:52 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0xc00) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x401, 0x4) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0xc00) (async) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x401, 0x4) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) (async) 04:45:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) r3 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000040)=0x8) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "beef9444394ed6b3", "5c82cdeac57b833f905a09822f53439f", "6a589346", "29e8407af548d6fe"}, 0x28) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:45:52 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) socketpair(0x10, 0x5, 0x6, &(0x7f00000000c0)) (async) socketpair(0x10, 0x5, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r1, 0x22e7e000) D0714 04:45:52.586801 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:52.586857 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 37 D0714 04:45:52.586901 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:52.586954 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 37 D0714 04:45:52.586964 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:52.587116 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:52.588093 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:52.588130 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 38 D0714 04:45:52.588149 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:52.588089 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:52.588304 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 38 D0714 04:45:52.588336 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:52.588514 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:52.588547 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 37 D0714 04:45:52.588691 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:52.589775 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:52.589814 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 38 D0714 04:45:52.589837 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:52.592506 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:52.592549 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 39 D0714 04:45:52.592561 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:52.592857 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:52.592882 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 39 D0714 04:45:52.592895 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:52.595333 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:52.595358 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:52.595364 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 40 D0714 04:45:52.595369 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 39 D0714 04:45:52.595377 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:52.595380 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:52.595401 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 37 D0714 04:45:52.595410 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:52.595427 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 40 D0714 04:45:52.595451 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:52.595378 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:52.595517 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:52.595654 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:52.595694 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 41 D0714 04:45:52.595705 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:52.595763 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:52.595786 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 41 D0714 04:45:52.595798 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:52.596422 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:52.596463 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 42 D0714 04:45:52.596484 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:52.596660 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:52.596707 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 42 D0714 04:45:52.596725 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:52.596850 789113 usertrap_amd64.go:212] [ 12513(2956): 12516(2957)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:52.596907 789113 usertrap_amd64.go:122] [ 12513(2956): 12516(2957)] Allocate a new trap: 0xc00796e8a0 43 D0714 04:45:52.596918 789113 usertrap_amd64.go:225] [ 12513(2956): 12516(2957)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:52.596957 789113 usertrap_amd64.go:212] [ 12514(3448): 12517(3449)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:52.596965 789113 usertrap_amd64.go:122] [ 12514(3448): 12517(3449)] Allocate a new trap: 0xc0035fe1e0 43 D0714 04:45:52.596973 789113 usertrap_amd64.go:225] [ 12514(3448): 12517(3449)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:52.599068 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:52.599093 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 40 D0714 04:45:52.599104 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:52.599250 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:52.599281 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 41 D0714 04:45:52.599293 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:52.600044 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:52.600069 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 42 D0714 04:45:52.600084 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:52.600100 789113 usertrap_amd64.go:212] [ 12512(3017): 12518(3018)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:52.600117 789113 usertrap_amd64.go:122] [ 12512(3017): 12518(3018)] Allocate a new trap: 0xc005fe1e30 43 D0714 04:45:52.600128 789113 usertrap_amd64.go:225] [ 12512(3017): 12518(3018)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:52.603907 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:52.603935 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 38 D0714 04:45:53.713560 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:53.716705 789113 usertrap_amd64.go:212] [ 12514(3448): 12514(3448)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:53.716749 789113 usertrap_amd64.go:122] [ 12514(3448): 12514(3448)] Allocate a new trap: 0xc0035fe1e0 44 D0714 04:45:53.716765 789113 usertrap_amd64.go:225] [ 12514(3448): 12514(3448)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:53.717806 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:53.717834 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 39 D0714 04:45:53.717851 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:53.718506 789113 task_exit.go:204] [ 12514(3448): 12514(3448)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.718620 789113 task_exit.go:204] [ 12514(3448): 12514(3448)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.718676 789113 task_signals.go:204] [ 12514(3448): 12517(3449)] Signal 12514, PID: 12517, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.718700 789113 task_signals.go:204] [ 12514(3448): 12521(3451)] Signal 12514, PID: 12521, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.718710 789113 task_exit.go:204] [ 12514(3448): 12517(3449)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.718939 789113 task_signals.go:204] [ 12514(3448): 12520(3450)] Signal 12514, PID: 12520, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.718982 789113 task_exit.go:204] [ 12514(3448): 12517(3449)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.718993 789113 task_exit.go:204] [ 12514(3448): 12517(3449)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.719034 789113 task_exit.go:204] [ 12514(3448): 12521(3451)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.719060 789113 task_exit.go:204] [ 12514(3448): 12521(3451)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.719070 789113 task_exit.go:204] [ 12514(3448): 12521(3451)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.719088 789113 task_exit.go:204] [ 12514(3448): 12520(3450)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.719688 789113 task_exit.go:204] [ 12514(3448): 12520(3450)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.719716 789113 task_exit.go:204] [ 12514(3448): 12520(3450)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.719728 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:53.719896 789113 task_exit.go:204] [ 12514(3448): 12514(3448)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.721316 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:53.721341 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 40 D0714 04:45:53.721365 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:53.721520 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:53.721543 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 41 D0714 04:45:53.721555 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:53.722183 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:53.722207 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 42 D0714 04:45:53.722218 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:53.722293 789113 usertrap_amd64.go:212] [ 12515(3030): 12523(3031)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:53.722317 789113 usertrap_amd64.go:122] [ 12515(3030): 12523(3031)] Allocate a new trap: 0xc003942480 43 D0714 04:45:53.722328 789113 usertrap_amd64.go:225] [ 12515(3030): 12523(3031)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:53.723386 789113 usertrap_amd64.go:212] [ 12515(3030): 12515(3030)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:53.723514 789113 usertrap_amd64.go:122] [ 12515(3030): 12515(3030)] Allocate a new trap: 0xc003942480 44 D0714 04:45:53.723535 789113 usertrap_amd64.go:225] [ 12515(3030): 12515(3030)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) 04:45:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) fcntl$setflags(r5, 0x2, 0x1) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_tcp_buf(r6, 0x6, 0xe, &(0x7f0000000540)=""/4096, &(0x7f00000000c0)=0x1000) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r7 = epoll_create(0x1) r8 = fcntl$dupfd(r7, 0x0, r7) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_IOC_FAIL(r8, 0x5451, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, &(0x7f0000000000)={0x456, 0x0, 0x9}, 0xc) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:45:53.724226 789113 task_exit.go:204] [ 12515(3030): 12515(3030)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.724246 789113 task_exit.go:204] [ 12515(3030): 12515(3030)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.724266 789113 task_signals.go:204] [ 12515(3030): 12523(3031)] Signal 12515, PID: 12523, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.724278 789113 task_exit.go:204] [ 12515(3030): 12523(3031)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.724640 789113 task_exit.go:204] [ 12515(3030): 12523(3031)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.724664 789113 task_exit.go:204] [ 12515(3030): 12523(3031)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.724675 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:53.725058 789113 task_exit.go:204] [ 12515(3030): 12515(3030)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:53 executing program 1: msgget$private(0x0, 0x0) (async) r0 = shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:53.733106 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:53.733141 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 37 D0714 04:45:53.733244 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:53.734797 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:53.734827 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 38 D0714 04:45:53.734841 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:53.739062 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:53.739090 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 39 D0714 04:45:53.739103 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:53.741356 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:53.741382 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 40 D0714 04:45:53.741390 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:53.741504 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:53.741537 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 41 D0714 04:45:53.741547 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:53.742381 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:53.742412 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 42 D0714 04:45:53.742423 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:53.742519 789113 usertrap_amd64.go:212] [ 12524(3032): 12526(3033)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:53.742543 789113 usertrap_amd64.go:122] [ 12524(3032): 12526(3033)] Allocate a new trap: 0xc007838f00 43 D0714 04:45:53.742556 789113 usertrap_amd64.go:225] [ 12524(3032): 12526(3033)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:53.743409 789113 usertrap_amd64.go:212] [ 12524(3032): 12524(3032)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:53.743435 789113 usertrap_amd64.go:122] [ 12524(3032): 12524(3032)] Allocate a new trap: 0xc007838f00 44 D0714 04:45:53.743443 789113 usertrap_amd64.go:225] [ 12524(3032): 12524(3032)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:53.744376 789113 task_exit.go:204] [ 12524(3032): 12524(3032)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.744471 789113 task_signals.go:204] [ 12524(3032): 12526(3033)] Signal 12524, PID: 12526, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.744478 789113 task_exit.go:204] [ 12524(3032): 12524(3032)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.744534 789113 task_exit.go:204] [ 12524(3032): 12526(3033)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.744856 789113 task_exit.go:204] [ 12524(3032): 12526(3033)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.744892 789113 task_exit.go:204] [ 12524(3032): 12526(3033)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.744912 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:53.745906 789113 task_exit.go:204] [ 12524(3032): 12524(3032)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.746259 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:53.746295 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 37 D0714 04:45:53.746475 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) 04:45:53 executing program 1: msgget$private(0x0, 0x0) shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) (async) r0 = shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:53.747244 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:53.747270 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 38 D0714 04:45:53.747281 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:53.751153 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:53.751182 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 39 D0714 04:45:53.751196 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:53.752211 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:53.752257 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 37 D0714 04:45:53.752383 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:53.753691 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:53.753795 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 40 D0714 04:45:53.753827 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:53.754043 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:53.754118 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 38 D0714 04:45:53.754134 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:53.754087 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:53.754270 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 41 D0714 04:45:53.754285 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:53.754925 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:53.754954 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 42 D0714 04:45:53.754966 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:53.755389 789113 usertrap_amd64.go:212] [ 12525(3452): 12528(3453)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:53.755453 789113 usertrap_amd64.go:122] [ 12525(3452): 12528(3453)] Allocate a new trap: 0xc003b519b0 43 D0714 04:45:53.755472 789113 usertrap_amd64.go:225] [ 12525(3452): 12528(3453)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:53.758144 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:53.758179 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 39 D0714 04:45:53.758191 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:53.758397 789113 usertrap_amd64.go:212] [ 12525(3452): 12525(3452)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:53.758434 789113 usertrap_amd64.go:122] [ 12525(3452): 12525(3452)] Allocate a new trap: 0xc003b519b0 44 D0714 04:45:53.758446 789113 usertrap_amd64.go:225] [ 12525(3452): 12525(3452)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:53.759749 789113 task_exit.go:204] [ 12525(3452): 12525(3452)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.759788 789113 task_exit.go:204] [ 12525(3452): 12525(3452)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.759814 789113 task_signals.go:204] [ 12525(3452): 12528(3453)] Signal 12525, PID: 12528, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.759836 789113 task_exit.go:204] [ 12525(3452): 12528(3453)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.760175 789113 task_exit.go:204] [ 12525(3452): 12528(3453)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.760195 789113 task_exit.go:204] [ 12525(3452): 12528(3453)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.760206 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:53.760232 789113 task_exit.go:204] [ 12525(3452): 12525(3452)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) (async, rerun: 64) r1 = epoll_create(0x1) (rerun: 64) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) fcntl$setflags(r5, 0x2, 0x1) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_tcp_buf(r6, 0x6, 0xe, &(0x7f0000000540)=""/4096, &(0x7f00000000c0)=0x1000) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) r7 = epoll_create(0x1) r8 = fcntl$dupfd(r7, 0x0, r7) (async) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_IOC_FAIL(r8, 0x5451, 0x0) (async) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, &(0x7f0000000000)={0x456, 0x0, 0x9}, 0xc) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:45:53.761604 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:53.761621 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 40 D0714 04:45:53.761634 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:53.761841 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:53.761873 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 41 D0714 04:45:53.761888 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:53.762466 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:53.762490 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 42 D0714 04:45:53.762502 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:53.762542 789113 usertrap_amd64.go:212] [ 12527(3034): 12529(3035)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:53.762548 789113 usertrap_amd64.go:122] [ 12527(3034): 12529(3035)] Allocate a new trap: 0xc003b44f90 43 D0714 04:45:53.762566 789113 usertrap_amd64.go:225] [ 12527(3034): 12529(3035)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:53.764697 789113 usertrap_amd64.go:212] [ 12527(3034): 12527(3034)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:53.764733 789113 usertrap_amd64.go:122] [ 12527(3034): 12527(3034)] Allocate a new trap: 0xc003b44f90 44 D0714 04:45:53.764745 789113 usertrap_amd64.go:225] [ 12527(3034): 12527(3034)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:53.765368 789113 task_exit.go:204] [ 12527(3034): 12527(3034)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.765462 789113 task_exit.go:204] [ 12527(3034): 12527(3034)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.765492 789113 task_signals.go:204] [ 12527(3034): 12529(3035)] Signal 12527, PID: 12529, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.765507 789113 task_exit.go:204] [ 12527(3034): 12529(3035)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.765518 789113 task_exit.go:204] [ 12527(3034): 12529(3035)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.765531 789113 task_exit.go:204] [ 12527(3034): 12529(3035)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.765545 789113 task_signals.go:204] [ 12527(3034): 12531(3036)] Signal 12527, PID: 12531, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.765565 789113 task_exit.go:204] [ 12527(3034): 12531(3036)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.765795 789113 task_exit.go:204] [ 12527(3034): 12531(3036)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.765814 789113 task_exit.go:204] [ 12527(3034): 12531(3036)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.765825 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:53.766557 789113 task_exit.go:204] [ 12527(3034): 12527(3034)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:53 executing program 1: msgget$private(0x0, 0x0) r0 = msgget(0x0, 0x200) msgrcv(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002300000000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ffee8f7ef267d8338ade5c6b3e9f2da3a5626a3c498e"], 0xd4, 0x0, 0x3800) r1 = msgget$private(0x0, 0x400) msgsnd(r1, &(0x7f0000000000)={0x3, "68e65f698c0eae711093220ec228df4cdf59334196dc2aca1de64d6960f01f4fafef59e03a81826ca32d4902cfab2c6e989aaef545627942a764bb91f6cb57259f4abf1da046c24fa83d8ea3d29f795b94f97f3b61483350e2ad885e0bc80405addb0e923552152a6e218541b9ae3fa0cfbe0ba793be615960803284e6ce98a77011892ae4150459"}, 0x90, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:53.768946 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:45:53.769022 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 44 D0714 04:45:53.769095 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:45:53.869720 789113 usertrap_amd64.go:212] [ 12513(2956): 12513(2956)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:45:53.869784 789113 usertrap_amd64.go:122] [ 12513(2956): 12513(2956)] Allocate a new trap: 0xc00796e8a0 45 D0714 04:45:53.869803 789113 usertrap_amd64.go:225] [ 12513(2956): 12513(2956)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:45:53.870570 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:45:53.870605 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 44 D0714 04:45:53.870622 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:45:53.870847 789113 task_exit.go:204] [ 12513(2956): 12513(2956)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.871093 789113 task_signals.go:204] [ 12513(2956): 12535(2961)] Signal 12513, PID: 12535, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.871134 789113 task_exit.go:204] [ 12513(2956): 12513(2956)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.871155 789113 task_exit.go:204] [ 12513(2956): 12535(2961)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.871167 789113 task_exit.go:204] [ 12513(2956): 12535(2961)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.871173 789113 task_exit.go:204] [ 12513(2956): 12535(2961)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.972294 789113 usertrap_amd64.go:212] [ 12512(3017): 12512(3017)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:45:53.972358 789113 usertrap_amd64.go:122] [ 12512(3017): 12512(3017)] Allocate a new trap: 0xc005fe1e30 45 D0714 04:45:53.972379 789113 usertrap_amd64.go:225] [ 12512(3017): 12512(3017)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:45:53.973440 789113 task_exit.go:204] [ 12512(3017): 12512(3017)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.973520 789113 task_exit.go:204] [ 12512(3017): 12512(3017)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.973556 789113 task_signals.go:204] [ 12512(3017): 12538(3022)] Signal 12512, PID: 12538, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.973572 789113 task_exit.go:204] [ 12512(3017): 12538(3022)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.973581 789113 task_exit.go:204] [ 12512(3017): 12538(3022)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.973586 789113 task_exit.go:204] [ 12512(3017): 12538(3022)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:53.973601 789113 task_signals.go:204] [ 12512(3017): 12539(3023)] Signal 12512, PID: 12539, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:53.973610 789113 task_exit.go:204] [ 12512(3017): 12539(3023)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:53.973624 789113 task_exit.go:204] [ 12512(3017): 12539(3023)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:53.973630 789113 task_exit.go:204] [ 12512(3017): 12539(3023)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:55.726149 789113 task_signals.go:481] [ 12512(3017): 12512(3017)] No task notified of signal 9 D0714 04:45:55.813154 789113 task_signals.go:458] [ 12512(3017): 12512(3017)] Discarding duplicate signal 9 D0714 04:45:56.595843 789113 task_signals.go:481] [ 12513(2956): 12513(2956)] No task notified of signal 9 D0714 04:45:56.596067 789113 task_signals.go:458] [ 12513(2956): 12513(2956)] Discarding duplicate signal 9 D0714 04:45:57.292646 789113 task_signals.go:481] [ 12530(3454): 12530(3454)] No task notified of signal 9 D0714 04:45:58.677989 789113 task_signals.go:204] [ 12513(2956): 12534(2960)] Signal 12513, PID: 12534, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678046 789113 task_signals.go:204] [ 12513(2956): 12536(2962)] Signal 12513, PID: 12536, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678003 789113 task_signals.go:204] [ 12512(3017): 12519(3019)] Signal 12512, PID: 12519, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678045 789113 task_signals.go:204] [ 12512(3017): 12532(3020)] Signal 12512, PID: 12532, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678066 789113 task_exit.go:204] [ 12513(2956): 12534(2960)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678111 789113 task_signals.go:204] [ 12513(2956): 12533(2959)] Signal 12513, PID: 12533, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678106 789113 task_signals.go:204] [ 12530(3454): 12530(3454)] Signal 12530, PID: 12530, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678121 789113 task_exit.go:204] [ 12513(2956): 12534(2960)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678146 789113 task_exit.go:204] [ 12513(2956): 12534(2960)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678000 789113 task_signals.go:204] [ 12512(3017): 12518(3018)] Signal 12512, PID: 12518, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678180 789113 task_signals.go:204] [ 12513(2956): 12522(2958)] Signal 12513, PID: 12522, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678192 789113 task_exit.go:204] [ 12512(3017): 12518(3018)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678211 789113 task_signals.go:204] [ 12513(2956): 12516(2957)] Signal 12513, PID: 12516, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678238 789113 task_exit.go:204] [ 12512(3017): 12518(3018)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678273 789113 task_exit.go:204] [ 12512(3017): 12518(3018)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678300 789113 task_exit.go:204] [ 12512(3017): 12519(3019)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678326 789113 task_exit.go:204] [ 12512(3017): 12519(3019)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678357 789113 task_exit.go:204] [ 12512(3017): 12519(3019)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678393 789113 task_exit.go:204] [ 12513(2956): 12522(2958)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678447 789113 task_signals.go:204] [ 12512(3017): 12537(3021)] Signal 12512, PID: 12537, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:58.678471 789113 task_exit.go:204] [ 12513(2956): 12522(2958)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678479 789113 task_exit.go:204] [ 12513(2956): 12522(2958)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678494 789113 task_exit.go:204] [ 12513(2956): 12516(2957)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678515 789113 task_exit.go:204] [ 12513(2956): 12516(2957)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678521 789113 task_exit.go:204] [ 12513(2956): 12516(2957)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678538 789113 task_exit.go:204] [ 12512(3017): 12532(3020)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678550 789113 task_exit.go:204] [ 12512(3017): 12532(3020)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678558 789113 task_exit.go:204] [ 12512(3017): 12532(3020)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678570 789113 task_exit.go:204] [ 12513(2956): 12536(2962)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678581 789113 task_exit.go:204] [ 12513(2956): 12536(2962)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.678598 789113 task_exit.go:204] [ 12513(2956): 12536(2962)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.678610 789113 task_exit.go:204] [ 12513(2956): 12533(2959)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678733 789113 task_exit.go:204] [ 12530(3454): 12530(3454)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.678820 789113 task_exit.go:204] [ 12512(3017): 12537(3021)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:58.679286 789113 task_exit.go:204] [ 12512(3017): 12537(3021)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.679316 789113 task_exit.go:204] [ 12512(3017): 12537(3021)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.679330 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:45:58.679383 789113 task_exit.go:204] [ 12530(3454): 12530(3454)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.679399 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:58.679439 789113 task_exit.go:204] [ 12530(3454): 12530(3454)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.679494 789113 task_exit.go:204] [ 12512(3017): 12512(3017)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.679934 789113 task_exit.go:204] [ 12513(2956): 12533(2959)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:58.679974 789113 task_exit.go:204] [ 12513(2956): 12533(2959)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:58.679987 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:45:58.680014 789113 task_exit.go:204] [ 12513(2956): 12513(2956)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:58 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) fcntl$dupfd(r4, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fff4c460000000000000000000000000000000000000000000000000000000040000000000000003d0200000000000000000000000031000000001300000000000000000000000000000000000000000000ffff0000000000000000000000000000e439c867cbe41f55c33192070700000000000000000000000000000000000000000000156680c469072f321e35f04a0c8c2f347fe8"], 0x78) 04:45:58 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) utime(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000180)={0x2c9, 0x9}) 04:45:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) r3 = accept4(r2, 0x0, 0x0, 0x0) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) fcntl$setflags(r5, 0x2, 0x1) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_tcp_buf(r6, 0x6, 0xe, &(0x7f0000000540)=""/4096, &(0x7f00000000c0)=0x1000) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r7 = epoll_create(0x1) r8 = fcntl$dupfd(r7, 0x0, r7) socket$inet6_tcp(0xa, 0x1, 0x0) (async) ioctl$AUTOFS_IOC_FAIL(r8, 0x5451, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, &(0x7f0000000000)={0x456, 0x0, 0x9}, 0xc) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:45:59.092361 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:45:59.092421 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 37 D0714 04:45:59.092542 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:45:59.095461 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:45:59.095498 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 37 D0714 04:45:59.095665 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:45:59.095708 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:45:59.095730 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 38 D0714 04:45:59.095744 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:45:59.096879 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:59.096947 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 37 D0714 04:45:59.096991 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:45:59.097033 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 38 D0714 04:45:59.097052 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:45:59.097065 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:59.098303 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:59.098327 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 38 D0714 04:45:59.098338 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:59.101453 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:59.101484 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 39 D0714 04:45:59.101501 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:59.102027 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:45:59.102071 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 37 D0714 04:45:59.102179 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:45:59.116154 789113 task_signals.go:470] [ 7: 39] Notified of signal 23 D0714 04:45:59.116258 789113 task_signals.go:220] [ 7: 39] Signal 23: delivering to handler D0714 04:45:59.119012 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:59.119056 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 40 D0714 04:45:59.119092 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:59.119306 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:59.119340 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 41 D0714 04:45:59.119361 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:59.120621 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:45:59.120663 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 42 D0714 04:45:59.120683 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:45:59.121026 789113 usertrap_amd64.go:212] [ 12540(3037): 12544(3038)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:45:59.121104 789113 usertrap_amd64.go:122] [ 12540(3037): 12544(3038)] Allocate a new trap: 0xc003b51a10 43 D0714 04:45:59.121128 789113 usertrap_amd64.go:225] [ 12540(3037): 12544(3038)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:45:59.122193 789113 usertrap_amd64.go:212] [ 12540(3037): 12540(3037)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:45:59.122219 789113 usertrap_amd64.go:122] [ 12540(3037): 12540(3037)] Allocate a new trap: 0xc003b51a10 44 D0714 04:45:59.122231 789113 usertrap_amd64.go:225] [ 12540(3037): 12540(3037)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:45:59.123307 789113 task_exit.go:204] [ 12540(3037): 12540(3037)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.123351 789113 task_exit.go:204] [ 12540(3037): 12540(3037)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.123379 789113 task_signals.go:204] [ 12540(3037): 12544(3038)] Signal 12540, PID: 12544, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:59.123390 789113 task_exit.go:204] [ 12540(3037): 12544(3038)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.123770 789113 task_exit.go:204] [ 12540(3037): 12544(3038)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.123793 789113 task_exit.go:204] [ 12540(3037): 12544(3038)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:59.123802 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:45:59.124547 789113 task_exit.go:204] [ 12540(3037): 12540(3037)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:45:59 executing program 1: msgget$private(0x0, 0x0) r0 = msgget(0x0, 0x200) msgrcv(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002300000000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ffee8f7ef267d8338ade5c6b3e9f2da3a5626a3c498e"], 0xd4, 0x0, 0x3800) r1 = msgget$private(0x0, 0x400) msgsnd(r1, &(0x7f0000000000)={0x3, "68e65f698c0eae711093220ec228df4cdf59334196dc2aca1de64d6960f01f4fafef59e03a81826ca32d4902cfab2c6e989aaef545627942a764bb91f6cb57259f4abf1da046c24fa83d8ea3d29f795b94f97f3b61483350e2ad885e0bc80405addb0e923552152a6e218541b9ae3fa0cfbe0ba793be615960803284e6ce98a77011892ae4150459"}, 0x90, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000280)=""/4096) D0714 04:45:59.127591 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:45:59.127638 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 39 D0714 04:45:59.127652 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:45:59.128213 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:45:59.128237 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 38 D0714 04:45:59.128252 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:45:59.130021 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:45:59.130051 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 40 D0714 04:45:59.130064 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:45:59.130193 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:45:59.130219 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 41 D0714 04:45:59.130230 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:45:59.130837 789113 usertrap_amd64.go:212] [ 12543(2963): 12543(2963)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:45:59.130940 789113 usertrap_amd64.go:122] [ 12543(2963): 12543(2963)] Allocate a new trap: 0xc005fe1e60 42 D0714 04:45:59.130994 789113 usertrap_amd64.go:225] [ 12543(2963): 12543(2963)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:45:59.131062 789113 usertrap_amd64.go:212] [ 12543(2963): 12546(2964)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:45:59.131072 789113 usertrap_amd64.go:122] [ 12543(2963): 12546(2964)] Allocate a new trap: 0xc005fe1e60 43 D0714 04:45:59.131084 789113 usertrap_amd64.go:225] [ 12543(2963): 12546(2964)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:45:59.134033 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:45:59.134069 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 37 D0714 04:45:59.134175 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:45:59.134289 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:45:59.134307 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 39 D0714 04:45:59.134315 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:45:59.134920 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:45:59.134948 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 39 D0714 04:45:59.134959 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:45:59.135205 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:45:59.135310 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 38 D0714 04:45:59.135333 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:45:59.136314 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:45:59.136427 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 40 D0714 04:45:59.136451 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:45:59.136724 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:45:59.136748 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 41 D0714 04:45:59.136759 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:45:59.137418 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:45:59.137438 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 42 D0714 04:45:59.137445 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:45:59.137464 789113 usertrap_amd64.go:212] [ 12541(3455): 12547(3456)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:45:59.137468 789113 usertrap_amd64.go:122] [ 12541(3455): 12547(3456)] Allocate a new trap: 0xc0035fe2a0 43 D0714 04:45:59.137478 789113 usertrap_amd64.go:225] [ 12541(3455): 12547(3456)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:45:59.139080 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:45:59.139110 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 40 D0714 04:45:59.139123 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:45:59.139203 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:45:59.139214 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 39 D0714 04:45:59.139222 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:45:59.139283 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:45:59.139298 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 41 D0714 04:45:59.139310 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:45:59.140092 789113 usertrap_amd64.go:212] [ 12542(3024): 12548(3025)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:45:59.140170 789113 usertrap_amd64.go:122] [ 12542(3024): 12548(3025)] Allocate a new trap: 0xc0057cec60 42 D0714 04:45:59.140283 789113 usertrap_amd64.go:225] [ 12542(3024): 12548(3025)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:45:59.140365 789113 usertrap_amd64.go:212] [ 12542(3024): 12542(3024)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:45:59.140375 789113 usertrap_amd64.go:122] [ 12542(3024): 12542(3024)] Allocate a new trap: 0xc0057cec60 43 D0714 04:45:59.140385 789113 usertrap_amd64.go:225] [ 12542(3024): 12542(3024)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:45:59.141430 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:45:59.141453 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 40 D0714 04:45:59.141464 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:45:59.141655 789113 usertrap_amd64.go:212] [ 12541(3455): 12541(3455)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:45:59.141719 789113 usertrap_amd64.go:122] [ 12541(3455): 12541(3455)] Allocate a new trap: 0xc0035fe2a0 44 D0714 04:45:59.141740 789113 usertrap_amd64.go:225] [ 12541(3455): 12541(3455)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:45:59.141692 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:45:59.141802 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 41 D0714 04:45:59.141828 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:45:59.142863 789113 task_exit.go:204] [ 12541(3455): 12541(3455)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.142906 789113 task_exit.go:204] [ 12541(3455): 12541(3455)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.142910 789113 task_signals.go:204] [ 12541(3455): 12549(3457)] Signal 12541, PID: 12549, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:59.142935 789113 task_exit.go:204] [ 12541(3455): 12549(3457)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.142951 789113 task_exit.go:204] [ 12541(3455): 12549(3457)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.142959 789113 task_exit.go:204] [ 12541(3455): 12549(3457)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:59.142995 789113 task_signals.go:204] [ 12541(3455): 12547(3456)] Signal 12541, PID: 12547, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:59.143008 789113 task_exit.go:204] [ 12541(3455): 12547(3456)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.143030 789113 task_signals.go:204] [ 12541(3455): 12550(3458)] Signal 12541, PID: 12550, TID: 0, fault addr: 0x9: terminating thread group D0714 04:45:59.143051 789113 task_exit.go:204] [ 12541(3455): 12547(3456)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.143059 789113 task_exit.go:204] [ 12541(3455): 12547(3456)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:59.143075 789113 task_exit.go:204] [ 12541(3455): 12550(3458)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:45:59.143401 789113 task_exit.go:204] [ 12541(3455): 12550(3458)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:45:59.143419 789113 task_exit.go:204] [ 12541(3455): 12550(3458)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:45:59.143429 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:45:59.144030 789113 task_exit.go:204] [ 12541(3455): 12541(3455)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:00.548372 789113 task_signals.go:470] [ 7: 18] Notified of signal 23 D0714 04:46:00.548517 789113 task_signals.go:220] [ 7: 18] Signal 23: delivering to handler 04:46:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) getsockname(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000080)=0x80) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) accept$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) getsockname(r5, &(0x7f0000000200)=@isdn, &(0x7f00000000c0)=0x80) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:00.784282 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:00.784350 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 42 D0714 04:46:00.784374 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:00.784628 789113 usertrap_amd64.go:212] [ 12545(3039): 12553(3040)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:00.784665 789113 usertrap_amd64.go:122] [ 12545(3039): 12553(3040)] Allocate a new trap: 0xc0042c0090 43 D0714 04:46:00.784679 789113 usertrap_amd64.go:225] [ 12545(3039): 12553(3040)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:00.786440 789113 usertrap_amd64.go:212] [ 12545(3039): 12545(3039)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:00.786478 789113 usertrap_amd64.go:122] [ 12545(3039): 12545(3039)] Allocate a new trap: 0xc0042c0090 44 D0714 04:46:00.786494 789113 usertrap_amd64.go:225] [ 12545(3039): 12545(3039)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:03.411628 789113 task_signals.go:481] [ 12542(3024): 12542(3024)] No task notified of signal 9 D0714 04:46:03.411742 789113 task_exit.go:204] [ 12545(3039): 12545(3039)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:03.411744 789113 task_signals.go:204] [ 12545(3039): 12553(3040)] Signal 12545, PID: 12553, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:03.411775 789113 task_signals.go:204] [ 12542(3024): 12542(3024)] Signal 12542, PID: 12542, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:03.411798 789113 task_signals.go:470] [ 12543(2963): 12543(2963)] Notified of signal 9 D0714 04:46:03.411910 789113 task_signals.go:458] [ 12543(2963): 12543(2963)] Discarding duplicate signal 9 D0714 04:46:03.411947 789113 task_exit.go:204] [ 12545(3039): 12553(3040)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:03.411975 789113 task_signals.go:204] [ 12543(2963): 12543(2963)] Signal 12543, PID: 12543, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:03.411998 789113 task_signals.go:458] [ 12542(3024): 12542(3024)] Discarding duplicate signal 9 D0714 04:46:03.412026 789113 task_exit.go:204] [ 12543(2963): 12543(2963)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:03.412056 789113 task_exit.go:204] [ 12542(3024): 12542(3024)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:03.412072 789113 task_exit.go:204] [ 12542(3024): 12542(3024)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:03.412086 789113 task_exit.go:204] [ 12543(2963): 12543(2963)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:03.412120 789113 task_exit.go:204] [ 12545(3039): 12545(3039)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:03.412334 789113 task_exit.go:204] [ 12545(3039): 12553(3040)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:03.412364 789113 task_exit.go:204] [ 12545(3039): 12553(3040)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:03.412383 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:03.413377 789113 task_signals.go:481] [ 12545(3039): 12545(3039)] No task notified of signal 9 D0714 04:46:03.413422 789113 task_signals.go:458] [ 12545(3039): 12545(3039)] Discarding duplicate signal 9 D0714 04:46:03.413447 789113 task_exit.go:204] [ 12545(3039): 12545(3039)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:03 executing program 1: msgget$private(0x0, 0x0) (async) r0 = msgget(0x0, 0x200) msgrcv(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002300000000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ffee8f7ef267d8338ade5c6b3e9f2da3a5626a3c498e"], 0xd4, 0x0, 0x3800) (async) r1 = msgget$private(0x0, 0x400) msgsnd(r1, &(0x7f0000000000)={0x3, "68e65f698c0eae711093220ec228df4cdf59334196dc2aca1de64d6960f01f4fafef59e03a81826ca32d4902cfab2c6e989aaef545627942a764bb91f6cb57259f4abf1da046c24fa83d8ea3d29f795b94f97f3b61483350e2ad885e0bc80405addb0e923552152a6e218541b9ae3fa0cfbe0ba793be615960803284e6ce98a77011892ae4150459"}, 0x90, 0x0) (async) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000280)=""/4096) D0714 04:46:03.413825 789113 usertrap_amd64.go:212] [ 12554(3459): 12554(3459)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:03.413849 789113 usertrap_amd64.go:122] [ 12554(3459): 12554(3459)] Allocate a new trap: 0xc0057ce150 37 D0714 04:46:03.413961 789113 usertrap_amd64.go:225] [ 12554(3459): 12554(3459)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:03.414865 789113 usertrap_amd64.go:212] [ 12554(3459): 12554(3459)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:03.414892 789113 usertrap_amd64.go:122] [ 12554(3459): 12554(3459)] Allocate a new trap: 0xc0057ce150 38 D0714 04:46:03.414906 789113 usertrap_amd64.go:225] [ 12554(3459): 12554(3459)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:03.786167 789113 task_signals.go:481] [ 12554(3459): 12554(3459)] No task notified of signal 9 D0714 04:46:03.786298 789113 task_signals.go:458] [ 12554(3459): 12554(3459)] Discarding duplicate signal 9 D0714 04:46:05.985863 789113 task_signals.go:204] [ 12554(3459): 12554(3459)] Signal 12554, PID: 12554, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:05.985931 789113 task_exit.go:204] [ 12554(3459): 12554(3459)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:05.985963 789113 task_signals.go:204] [ 12542(3024): 12552(3026)] Signal 12542, PID: 12552, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:05.985983 789113 task_signals.go:204] [ 12542(3024): 12548(3025)] Signal 12542, PID: 12548, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:05.985898 789113 task_signals.go:204] [ 12543(2963): 12546(2964)] Signal 12543, PID: 12546, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:05.986008 789113 task_exit.go:204] [ 12542(3024): 12552(3026)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:05.985931 789113 task_signals.go:204] [ 12543(2963): 12551(2965)] Signal 12543, PID: 12551, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:05.986040 789113 task_exit.go:204] [ 12543(2963): 12551(2965)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:05.986087 789113 task_exit.go:204] [ 12543(2963): 12551(2965)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:05.986094 789113 task_exit.go:204] [ 12543(2963): 12551(2965)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986117 789113 task_exit.go:204] [ 12542(3024): 12552(3026)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:05.986123 789113 task_exit.go:204] [ 12542(3024): 12552(3026)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986141 789113 task_exit.go:204] [ 12543(2963): 12546(2964)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:05.986213 789113 task_exit.go:204] [ 12542(3024): 12548(3025)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:05.986318 789113 task_exit.go:204] [ 12554(3459): 12554(3459)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:05.986353 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:05.986391 789113 task_exit.go:204] [ 12554(3459): 12554(3459)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986722 789113 task_exit.go:204] [ 12542(3024): 12548(3025)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:05.986756 789113 task_exit.go:204] [ 12542(3024): 12548(3025)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986771 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:05.986829 789113 task_exit.go:204] [ 12542(3024): 12542(3024)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986892 789113 task_exit.go:204] [ 12543(2963): 12546(2964)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:05.986914 789113 task_exit.go:204] [ 12543(2963): 12546(2964)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:05.986923 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:05.986957 789113 task_exit.go:204] [ 12543(2963): 12543(2963)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:05 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) utime(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000180)={0x2c9, 0x9}) 04:46:05 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) epoll_create(0x1) (async) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) (async) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) fcntl$dupfd(r4, 0x0, r1) (async) fcntl$dupfd(r4, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) (async) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fff4c460000000000000000000000000000000000000000000000000000000040000000000000003d0200000000000000000000000031000000001300000000000000000000000000000000000000000000ffff0000000000000000000000000000e439c867cbe41f55c33192070700000000000000000000000000000000000000000000156680c469072f321e35f04a0c8c2f347fe8"], 0x78) 04:46:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) getsockname(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000080)=0x80) (async) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) r3 = socket$inet_icmp(0x2, 0x2, 0x1) accept$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) (async) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) getsockname(r5, &(0x7f0000000200)=@isdn, &(0x7f00000000c0)=0x80) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:06.381869 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:06.381913 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 37 D0714 04:46:06.381991 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:06.382770 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:06.382817 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 38 D0714 04:46:06.382832 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:06.383036 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:06.383070 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 37 D0714 04:46:06.383162 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:06.383186 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 37 D0714 04:46:06.383216 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:06.384215 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:06.384241 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 38 D0714 04:46:06.384253 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:06.384684 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:06.384715 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 37 D0714 04:46:06.387666 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:06.387683 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:06.388521 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:06.388599 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 38 D0714 04:46:06.388648 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:06.392655 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:06.392678 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 39 D0714 04:46:06.392690 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:06.393198 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:06.393222 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 39 D0714 04:46:06.393236 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:06.395008 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:06.395048 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 40 D0714 04:46:06.395063 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:06.395275 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:06.395305 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 41 D0714 04:46:06.395317 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:06.395857 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:06.395885 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 42 D0714 04:46:06.395898 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:06.395911 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:06.395918 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 40 D0714 04:46:06.395926 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:06.395956 789113 usertrap_amd64.go:212] [ 12556(3460): 12559(3461)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:06.395963 789113 usertrap_amd64.go:122] [ 12556(3460): 12559(3461)] Allocate a new trap: 0xc0070f8090 43 D0714 04:46:06.395970 789113 usertrap_amd64.go:225] [ 12556(3460): 12559(3461)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:06.396087 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:06.396189 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 41 D0714 04:46:06.396269 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:06.397095 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:06.397120 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 42 D0714 04:46:06.397130 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:06.397235 789113 usertrap_amd64.go:212] [ 12555(3041): 12560(3042)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:06.397261 789113 usertrap_amd64.go:122] [ 12555(3041): 12560(3042)] Allocate a new trap: 0xc009734000 43 D0714 04:46:06.397273 789113 usertrap_amd64.go:225] [ 12555(3041): 12560(3042)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:06.398816 789113 usertrap_amd64.go:212] [ 12556(3460): 12556(3460)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:06.398844 789113 usertrap_amd64.go:122] [ 12556(3460): 12556(3460)] Allocate a new trap: 0xc0070f8090 44 D0714 04:46:06.398856 789113 usertrap_amd64.go:225] [ 12556(3460): 12556(3460)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:06.400063 789113 task_exit.go:204] [ 12556(3460): 12556(3460)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:06.400105 789113 task_exit.go:204] [ 12556(3460): 12556(3460)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:06.400131 789113 task_signals.go:204] [ 12556(3460): 12559(3461)] Signal 12556, PID: 12559, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:06.400145 789113 task_exit.go:204] [ 12556(3460): 12559(3461)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:06.400156 789113 task_exit.go:204] [ 12556(3460): 12559(3461)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:06.400162 789113 task_exit.go:204] [ 12556(3460): 12559(3461)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:06.400176 789113 task_signals.go:204] [ 12556(3460): 12561(3462)] Signal 12556, PID: 12561, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:06.400201 789113 task_exit.go:204] [ 12556(3460): 12561(3462)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:06.400214 789113 task_exit.go:204] [ 12556(3460): 12561(3462)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:06.400220 789113 task_exit.go:204] [ 12556(3460): 12561(3462)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:06.400236 789113 task_signals.go:204] [ 12556(3460): 12562(3463)] Signal 12556, PID: 12562, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:06.400257 789113 task_exit.go:204] [ 12556(3460): 12562(3463)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:06.400555 789113 task_exit.go:204] [ 12556(3460): 12562(3463)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:06.400583 789113 task_exit.go:204] [ 12556(3460): 12562(3463)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:06.400598 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:06.400675 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:06.400703 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 38 D0714 04:46:06.400711 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:06.401601 789113 task_exit.go:204] [ 12556(3460): 12556(3460)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) getsockname(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000080)=0x80) (async, rerun: 32) listen(r0, 0x0) (async, rerun: 32) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async, rerun: 32) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async, rerun: 32) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) accept$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) (async) r4 = epoll_create(0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_IOC_FAIL(r5, 0x5451, 0x0) (async) getsockname(r5, &(0x7f0000000200)=@isdn, &(0x7f00000000c0)=0x80) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:06.404448 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:06.404528 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 39 D0714 04:46:06.404577 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:06.406886 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:06.406919 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 40 D0714 04:46:06.406931 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:06.407018 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:06.407037 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 41 D0714 04:46:06.407047 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:06.407730 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:06.407759 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 39 D0714 04:46:06.407768 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:06.408299 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:06.408324 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 42 D0714 04:46:06.408334 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:06.408353 789113 usertrap_amd64.go:212] [ 12558(2966): 12563(2967)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:06.408360 789113 usertrap_amd64.go:122] [ 12558(2966): 12563(2967)] Allocate a new trap: 0xc003b44120 43 D0714 04:46:06.408368 789113 usertrap_amd64.go:225] [ 12558(2966): 12563(2967)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:06.410133 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:06.410188 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 40 D0714 04:46:06.410208 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:06.410361 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:06.410387 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 41 D0714 04:46:06.410395 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:06.410925 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:06.410952 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 42 D0714 04:46:06.410962 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:06.410982 789113 usertrap_amd64.go:212] [ 12557(3027): 12564(3028)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:06.410987 789113 usertrap_amd64.go:122] [ 12557(3027): 12564(3028)] Allocate a new trap: 0xc001aa80f0 43 D0714 04:46:06.410992 789113 usertrap_amd64.go:225] [ 12557(3027): 12564(3028)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:07.888891 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:07.888942 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 44 D0714 04:46:07.888961 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:07.890161 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:07.890203 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 44 D0714 04:46:07.890222 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:07.891967 789113 usertrap_amd64.go:212] [ 12555(3041): 12555(3041)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:07.892050 789113 usertrap_amd64.go:122] [ 12555(3041): 12555(3041)] Allocate a new trap: 0xc009734000 45 D0714 04:46:07.892071 789113 usertrap_amd64.go:225] [ 12555(3041): 12555(3041)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:07.893971 789113 usertrap_amd64.go:212] [ 12570(3464): 12570(3464)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:07.894028 789113 usertrap_amd64.go:122] [ 12570(3464): 12570(3464)] Allocate a new trap: 0xc009734030 37 D0714 04:46:07.894175 789113 usertrap_amd64.go:225] [ 12570(3464): 12570(3464)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:07.895107 789113 usertrap_amd64.go:212] [ 12570(3464): 12570(3464)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:07.895162 789113 usertrap_amd64.go:122] [ 12570(3464): 12570(3464)] Allocate a new trap: 0xc009734030 38 D0714 04:46:07.895180 789113 usertrap_amd64.go:225] [ 12570(3464): 12570(3464)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:07.898005 789113 task_exit.go:204] [ 12555(3041): 12555(3041)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.898080 789113 task_exit.go:204] [ 12555(3041): 12555(3041)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:07.898111 789113 task_signals.go:204] [ 12555(3041): 12567(3043)] Signal 12555, PID: 12567, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:07.898121 789113 task_signals.go:204] [ 12555(3041): 12560(3042)] Signal 12555, PID: 12560, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:07.898145 789113 task_exit.go:204] [ 12555(3041): 12567(3043)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.898179 789113 task_exit.go:204] [ 12555(3041): 12567(3043)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:07.898195 789113 task_exit.go:204] [ 12555(3041): 12567(3043)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:07.898213 789113 task_exit.go:204] [ 12555(3041): 12560(3042)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.898564 789113 task_exit.go:204] [ 12555(3041): 12560(3042)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:07.898591 789113 task_exit.go:204] [ 12555(3041): 12560(3042)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:07.898609 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:07.899429 789113 task_exit.go:204] [ 12555(3041): 12555(3041)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:07 executing program 1: msgget$private(0x0, 0x0) r0 = msgget$private(0x0, 0x2) msgrcv(r0, &(0x7f0000000000)={0x0, ""/129}, 0x89, 0x1, 0x2800) D0714 04:46:07.940761 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:07.940823 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 44 D0714 04:46:07.940842 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:07.990680 789113 usertrap_amd64.go:212] [ 12557(3027): 12557(3027)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:07.990736 789113 usertrap_amd64.go:122] [ 12557(3027): 12557(3027)] Allocate a new trap: 0xc001aa80f0 45 D0714 04:46:07.990757 789113 usertrap_amd64.go:225] [ 12557(3027): 12557(3027)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:07.991333 789113 task_exit.go:204] [ 12557(3027): 12557(3027)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.991382 789113 task_signals.go:204] [ 12557(3027): 12571(3031)] Signal 12557, PID: 12571, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:07.991399 789113 task_exit.go:204] [ 12557(3027): 12571(3031)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.991381 789113 task_signals.go:204] [ 12557(3027): 12569(3030)] Signal 12557, PID: 12569, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:07.991412 789113 task_exit.go:204] [ 12557(3027): 12569(3030)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:07.991423 789113 task_exit.go:204] [ 12557(3027): 12569(3030)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:07.991431 789113 task_exit.go:204] [ 12557(3027): 12569(3030)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:07.991462 789113 task_exit.go:204] [ 12557(3027): 12571(3031)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:07.991479 789113 task_exit.go:204] [ 12557(3027): 12571(3031)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:07.991493 789113 task_exit.go:204] [ 12557(3027): 12557(3027)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:08.041776 789113 usertrap_amd64.go:212] [ 12558(2966): 12558(2966)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:08.041831 789113 usertrap_amd64.go:122] [ 12558(2966): 12558(2966)] Allocate a new trap: 0xc003b44120 45 D0714 04:46:08.041847 789113 usertrap_amd64.go:225] [ 12558(2966): 12558(2966)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:08.042464 789113 task_exit.go:204] [ 12558(2966): 12558(2966)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:08.042510 789113 task_exit.go:204] [ 12558(2966): 12558(2966)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:08.042542 789113 task_signals.go:204] [ 12558(2966): 12568(2969)] Signal 12558, PID: 12568, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:08.042561 789113 task_exit.go:204] [ 12558(2966): 12568(2969)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:08.042572 789113 task_exit.go:204] [ 12558(2966): 12568(2969)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:08.042578 789113 task_exit.go:204] [ 12558(2966): 12568(2969)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:10.075885 789113 task_signals.go:481] [ 12558(2966): 12558(2966)] No task notified of signal 9 D0714 04:46:10.076010 789113 task_signals.go:481] [ 12557(3027): 12557(3027)] No task notified of signal 9 D0714 04:46:10.076049 789113 task_signals.go:458] [ 12558(2966): 12558(2966)] Discarding duplicate signal 9 D0714 04:46:10.076119 789113 task_signals.go:458] [ 12557(3027): 12557(3027)] Discarding duplicate signal 9 D0714 04:46:10.900072 789113 task_signals.go:481] [ 12570(3464): 12570(3464)] No task notified of signal 9 D0714 04:46:10.900206 789113 task_signals.go:458] [ 12570(3464): 12570(3464)] Discarding duplicate signal 9 D0714 04:46:13.114727 789113 task_signals.go:204] [ 12570(3464): 12570(3464)] Signal 12570, PID: 12570, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.114871 789113 task_signals.go:204] [ 12557(3027): 12566(3029)] Signal 12557, PID: 12566, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.114816 789113 task_signals.go:204] [ 12558(2966): 12565(2968)] Signal 12558, PID: 12565, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.114827 789113 task_signals.go:204] [ 12557(3027): 12564(3028)] Signal 12557, PID: 12564, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.114894 789113 task_exit.go:204] [ 12570(3464): 12570(3464)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.114776 789113 task_signals.go:204] [ 12558(2966): 12563(2967)] Signal 12558, PID: 12563, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.114995 789113 task_exit.go:204] [ 12558(2966): 12563(2967)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.115031 789113 task_exit.go:204] [ 12557(3027): 12566(3029)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.115073 789113 task_exit.go:204] [ 12557(3027): 12566(3029)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.115084 789113 task_exit.go:204] [ 12557(3027): 12566(3029)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.115109 789113 task_exit.go:204] [ 12558(2966): 12565(2968)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.115130 789113 task_exit.go:204] [ 12558(2966): 12565(2968)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.115137 789113 task_exit.go:204] [ 12558(2966): 12565(2968)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.115149 789113 task_exit.go:204] [ 12557(3027): 12564(3028)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.115313 789113 task_exit.go:204] [ 12570(3464): 12570(3464)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.115346 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:13.115846 789113 task_exit.go:204] [ 12557(3027): 12564(3028)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.115874 789113 task_exit.go:204] [ 12557(3027): 12564(3028)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.115895 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:13.116411 789113 task_exit.go:204] [ 12558(2966): 12563(2967)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.116443 789113 task_exit.go:204] [ 12558(2966): 12563(2967)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.116454 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:13.116484 789113 task_exit.go:204] [ 12557(3027): 12557(3027)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.116545 789113 task_exit.go:204] [ 12558(2966): 12558(2966)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.117731 789113 task_exit.go:204] [ 12570(3464): 12570(3464)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:13 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x100000001) (async, rerun: 64) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) utime(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000180)={0x2c9, 0x9}) 04:46:13 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) epoll_create(0x1) (async) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) (async) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) fcntl$dupfd(r4, 0x0, r1) (async) fcntl$dupfd(r4, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) (async) write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7fff4c460000000000000000000000000000000000000000000000000000000040000000000000003d0200000000000000000000000031000000001300000000000000000000000000000000000000000000ffff0000000000000000000000000000e439c867cbe41f55c33192070700000000000000000000000000000000000000000000156680c469072f321e35f04a0c8c2f347fe8"], 0x78) 04:46:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xffff, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = epoll_create(0x1) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r5, 0x5421, &(0x7f0000000080)=0x0) setreuid(r6, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e22, 0xfe00, 0x3, 0x8b, 0xa, 0x0, 0xc0, 0x73, 0x0, r6}, {0x4, 0x5, 0x3, 0x80, 0xf7de, 0x6, 0x5, 0x7fff}, {0x8000000000000001, 0x1ff, 0x8, 0xc9e}, 0xd26, 0xb7, 0x1, 0x0, 0x3, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x42}, 0x4d6, 0xff}, 0x2, @in=@broadcast, 0x3506, 0x1, 0x2, 0x1, 0x4, 0x800, 0x20000}}, 0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:13.583928 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:13.583976 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 37 D0714 04:46:13.584068 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:13.585734 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:13.585784 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 38 D0714 04:46:13.585799 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:13.585898 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:13.585950 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 37 D0714 04:46:13.586162 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:13.588005 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:13.588040 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 38 D0714 04:46:13.588052 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:13.592604 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:13.592641 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 39 D0714 04:46:13.592653 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:13.594890 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:13.594954 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 39 D0714 04:46:13.594980 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:13.596662 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:13.596699 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 37 D0714 04:46:13.596872 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:13.597628 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:13.597654 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 38 D0714 04:46:13.597667 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:13.598319 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:13.598342 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 40 D0714 04:46:13.598361 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:13.598635 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:13.598672 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 41 D0714 04:46:13.598688 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:13.599172 789113 usertrap_amd64.go:212] [ 12572(2970): 12572(2970)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:13.599187 789113 usertrap_amd64.go:122] [ 12572(2970): 12572(2970)] Allocate a new trap: 0xc009ca60f0 37 D0714 04:46:13.599278 789113 usertrap_amd64.go:225] [ 12572(2970): 12572(2970)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:13.599359 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:13.599397 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 42 D0714 04:46:13.599414 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:13.599436 789113 usertrap_amd64.go:212] [ 12574(3032): 12576(3033)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:13.599453 789113 usertrap_amd64.go:122] [ 12574(3032): 12576(3033)] Allocate a new trap: 0xc003b50180 43 D0714 04:46:13.599466 789113 usertrap_amd64.go:225] [ 12574(3032): 12576(3033)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:13.600402 789113 usertrap_amd64.go:212] [ 12572(2970): 12572(2970)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:13.600432 789113 usertrap_amd64.go:122] [ 12572(2970): 12572(2970)] Allocate a new trap: 0xc009ca60f0 38 D0714 04:46:13.600448 789113 usertrap_amd64.go:225] [ 12572(2970): 12572(2970)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:13.601588 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:13.601610 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 39 D0714 04:46:13.601618 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:13.602171 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:13.602205 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 40 D0714 04:46:13.602222 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:13.602899 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:13.602927 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 41 D0714 04:46:13.602938 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:13.603780 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:13.603801 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 42 D0714 04:46:13.603809 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:13.603954 789113 usertrap_amd64.go:212] [ 12573(3044): 12580(3045)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:13.603978 789113 usertrap_amd64.go:122] [ 12573(3044): 12580(3045)] Allocate a new trap: 0xc009ca6180 43 D0714 04:46:13.603990 789113 usertrap_amd64.go:225] [ 12573(3044): 12580(3045)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:13.605379 789113 usertrap_amd64.go:212] [ 12573(3044): 12573(3044)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:13.605448 789113 usertrap_amd64.go:122] [ 12573(3044): 12573(3044)] Allocate a new trap: 0xc009ca6180 44 D0714 04:46:13.605466 789113 usertrap_amd64.go:225] [ 12573(3044): 12573(3044)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:13.606435 789113 task_exit.go:204] [ 12573(3044): 12573(3044)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.606472 789113 task_exit.go:204] [ 12573(3044): 12573(3044)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.606499 789113 task_signals.go:204] [ 12573(3044): 12580(3045)] Signal 12573, PID: 12580, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:13.606514 789113 task_exit.go:204] [ 12573(3044): 12580(3045)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:13.606770 789113 task_exit.go:204] [ 12573(3044): 12580(3045)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:13.606786 789113 task_exit.go:204] [ 12573(3044): 12580(3045)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:13.606797 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:13.608449 789113 task_exit.go:204] [ 12573(3044): 12573(3044)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:13 executing program 1: msgget$private(0x0, 0x0) (async) r0 = msgget$private(0x0, 0x2) msgrcv(r0, &(0x7f0000000000)={0x0, ""/129}, 0x89, 0x1, 0x2800) D0714 04:46:13.612490 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:13.612516 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 40 D0714 04:46:13.612528 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:13.612635 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:13.612677 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 41 D0714 04:46:13.612688 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:13.613114 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:13.613176 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 42 D0714 04:46:13.613213 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:13.613276 789113 usertrap_amd64.go:212] [ 12575(3465): 12581(3466)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:13.613297 789113 usertrap_amd64.go:122] [ 12575(3465): 12581(3466)] Allocate a new trap: 0xc0032a8000 43 D0714 04:46:13.613308 789113 usertrap_amd64.go:225] [ 12575(3465): 12581(3466)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:13.653642 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:13.653702 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 44 D0714 04:46:13.653720 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:13.668586 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:46:13.668622 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 44 D0714 04:46:13.668637 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:14.106380 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:14.106510 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:14.425998 789113 usertrap_amd64.go:212] [ 12574(3032): 12574(3032)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:14.426045 789113 usertrap_amd64.go:122] [ 12574(3032): 12574(3032)] Allocate a new trap: 0xc003b50180 45 D0714 04:46:14.426061 789113 usertrap_amd64.go:225] [ 12574(3032): 12574(3032)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:14.427113 789113 task_exit.go:204] [ 12574(3032): 12574(3032)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:14.427167 789113 task_exit.go:204] [ 12574(3032): 12574(3032)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:14.427197 789113 task_signals.go:204] [ 12574(3032): 12579(3036)] Signal 12574, PID: 12579, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:14.427214 789113 task_exit.go:204] [ 12574(3032): 12579(3036)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:14.427224 789113 task_exit.go:204] [ 12574(3032): 12579(3036)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:14.427230 789113 task_exit.go:204] [ 12574(3032): 12579(3036)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:14.434144 789113 usertrap_amd64.go:212] [ 12575(3465): 12575(3465)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:14.434199 789113 usertrap_amd64.go:122] [ 12575(3465): 12575(3465)] Allocate a new trap: 0xc0032a8000 45 D0714 04:46:14.434217 789113 usertrap_amd64.go:225] [ 12575(3465): 12575(3465)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:46:14.435213 789113 task_exit.go:204] [ 12575(3465): 12575(3465)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:14.435265 789113 task_exit.go:204] [ 12575(3465): 12575(3465)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:14.435294 789113 task_signals.go:204] [ 12575(3465): 12581(3466)] Signal 12575, PID: 12581, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:14.435346 789113 task_exit.go:204] [ 12575(3465): 12581(3466)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:14.435364 789113 task_exit.go:204] [ 12575(3465): 12581(3466)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:14.435380 789113 task_exit.go:204] [ 12575(3465): 12581(3466)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:14.435303 789113 task_signals.go:204] [ 12575(3465): 12582(3467)] Signal 12575, PID: 12582, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:14.435402 789113 task_exit.go:204] [ 12575(3465): 12582(3467)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:14.435758 789113 task_exit.go:204] [ 12575(3465): 12582(3467)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:14.435780 789113 task_exit.go:204] [ 12575(3465): 12582(3467)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:14.435793 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:14.436484 789113 task_exit.go:204] [ 12575(3465): 12575(3465)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xffff, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}, 0x1c) listen(r0, 0x0) (async) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = epoll_create(0x1) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) (async) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r5, 0x5421, &(0x7f0000000080)=0x0) setreuid(r6, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e22, 0xfe00, 0x3, 0x8b, 0xa, 0x0, 0xc0, 0x73, 0x0, r6}, {0x4, 0x5, 0x3, 0x80, 0xf7de, 0x6, 0x5, 0x7fff}, {0x8000000000000001, 0x1ff, 0x8, 0xc9e}, 0xd26, 0xb7, 0x1, 0x0, 0x3, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x42}, 0x4d6, 0xff}, 0x2, @in=@broadcast, 0x3506, 0x1, 0x2, 0x1, 0x4, 0x800, 0x20000}}, 0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) I0714 04:46:16.316129 789113 watchdog.go:295] Watchdog starting loop, tasks: 72, discount: 0s D0714 04:46:16.579347 789113 task_signals.go:481] [ 12572(2970): 12572(2970)] No task notified of signal 9 D0714 04:46:16.579470 789113 task_signals.go:458] [ 12572(2970): 12572(2970)] Discarding duplicate signal 9 D0714 04:46:16.582080 789113 task_signals.go:481] [ 12574(3032): 12574(3032)] No task notified of signal 9 D0714 04:46:16.582168 789113 task_signals.go:458] [ 12574(3032): 12574(3032)] Discarding duplicate signal 9 D0714 04:46:17.712841 789113 task_signals.go:204] [ 12572(2970): 12572(2970)] Signal 12572, PID: 12572, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:17.712932 789113 task_signals.go:204] [ 12574(3032): 12577(3034)] Signal 12574, PID: 12577, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:17.712932 789113 task_exit.go:204] [ 12572(2970): 12572(2970)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:17.712860 789113 task_signals.go:204] [ 12574(3032): 12576(3033)] Signal 12574, PID: 12576, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:17.713009 789113 task_signals.go:204] [ 12574(3032): 12578(3035)] Signal 12574, PID: 12578, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:17.713014 789113 task_exit.go:204] [ 12574(3032): 12577(3034)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:17.713099 789113 task_exit.go:204] [ 12574(3032): 12577(3034)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:17.713110 789113 task_exit.go:204] [ 12574(3032): 12577(3034)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:17.713133 789113 task_exit.go:204] [ 12574(3032): 12576(3033)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:17.713232 789113 task_exit.go:204] [ 12574(3032): 12576(3033)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:17.713269 789113 task_exit.go:204] [ 12574(3032): 12576(3033)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:17.713304 789113 task_exit.go:204] [ 12574(3032): 12578(3035)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:17.713338 789113 task_exit.go:204] [ 12572(2970): 12572(2970)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:17.713387 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:17.713425 789113 task_exit.go:204] [ 12572(2970): 12572(2970)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:17.713824 789113 task_exit.go:204] [ 12574(3032): 12578(3035)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:17.713852 789113 task_exit.go:204] [ 12574(3032): 12578(3035)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:17.713870 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:17.713918 789113 task_exit.go:204] [ 12574(3032): 12574(3032)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:17.714202 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:17.714423 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler 04:46:17 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) open(&(0x7f00000000c0)='./bus\x00', 0x2000, 0x0) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) 04:46:17 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x81000) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:18.139651 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:18.139708 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 37 D0714 04:46:18.139842 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:18.141473 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:18.141519 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 37 D0714 04:46:18.141551 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:18.141596 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 38 D0714 04:46:18.141605 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:18.141617 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:18.142731 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:18.142754 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 38 D0714 04:46:18.142767 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:18.142912 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:18.142962 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 37 D0714 04:46:18.143082 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:18.143775 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:18.143850 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 37 D0714 04:46:18.144006 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:18.144263 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:18.144292 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 38 D0714 04:46:18.144311 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:18.146539 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:18.146573 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 39 D0714 04:46:18.146587 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:18.148171 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:18.148212 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 39 D0714 04:46:18.148231 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:18.150168 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:18.150194 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 40 D0714 04:46:18.150209 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:18.150467 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:18.150507 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 41 D0714 04:46:18.150521 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:18.151059 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:18.151080 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 40 D0714 04:46:18.151090 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:18.151249 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:18.151273 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 41 D0714 04:46:18.151283 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:18.151740 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:18.151814 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 42 D0714 04:46:18.151882 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:18.151888 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:18.152020 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 42 D0714 04:46:18.152041 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:18.152084 789113 usertrap_amd64.go:212] [ 12585(3468): 12588(3469)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:18.152108 789113 usertrap_amd64.go:122] [ 12585(3468): 12588(3469)] Allocate a new trap: 0xc003b444e0 43 D0714 04:46:18.152133 789113 usertrap_amd64.go:225] [ 12585(3468): 12588(3469)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:18.153281 789113 usertrap_amd64.go:212] [ 12584(2971): 12587(2972)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:18.153311 789113 usertrap_amd64.go:122] [ 12584(2971): 12587(2972)] Allocate a new trap: 0xc0002aa180 43 D0714 04:46:18.153339 789113 usertrap_amd64.go:225] [ 12584(2971): 12587(2972)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:18.158107 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:18.158129 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 39 D0714 04:46:18.158141 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:18.160025 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:18.160053 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 38 D0714 04:46:18.160076 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:18.160612 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:18.160638 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 40 D0714 04:46:18.160646 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:18.160805 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:18.160837 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 41 D0714 04:46:18.160853 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:18.161832 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:18.161865 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 42 D0714 04:46:18.161878 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:18.161930 789113 usertrap_amd64.go:212] [ 12583(3046): 12590(3047)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:18.161961 789113 usertrap_amd64.go:122] [ 12583(3046): 12590(3047)] Allocate a new trap: 0xc0042c0180 43 D0714 04:46:18.161975 789113 usertrap_amd64.go:225] [ 12583(3046): 12590(3047)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:18.164268 789113 usertrap_amd64.go:212] [ 12583(3046): 12583(3046)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:18.164305 789113 usertrap_amd64.go:122] [ 12583(3046): 12583(3046)] Allocate a new trap: 0xc0042c0180 44 D0714 04:46:18.164317 789113 usertrap_amd64.go:225] [ 12583(3046): 12583(3046)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:18.165728 789113 task_exit.go:204] [ 12583(3046): 12583(3046)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:18.165769 789113 task_exit.go:204] [ 12583(3046): 12583(3046)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:18.165797 789113 task_signals.go:204] [ 12583(3046): 12590(3047)] Signal 12583, PID: 12590, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:18.165817 789113 task_exit.go:204] [ 12583(3046): 12590(3047)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:18.166574 789113 task_exit.go:204] [ 12583(3046): 12590(3047)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:18.166606 789113 task_exit.go:204] [ 12583(3046): 12590(3047)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:18.166618 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:18.166960 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:18.167045 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 39 D0714 04:46:18.167075 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:18.167811 789113 task_exit.go:204] [ 12583(3046): 12583(3046)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:18 executing program 1: msgget$private(0x0, 0x0) (async) msgget$private(0x0, 0x0) r0 = msgget$private(0x0, 0x2) msgrcv(r0, &(0x7f0000000000)={0x0, ""/129}, 0x89, 0x1, 0x2800) D0714 04:46:18.180849 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:18.180894 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 40 D0714 04:46:18.180910 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:18.181061 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:18.181082 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 41 D0714 04:46:18.181092 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:18.182221 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:18.182348 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 42 D0714 04:46:18.182393 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:18.182411 789113 usertrap_amd64.go:212] [ 12586(3037): 12592(3038)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:18.182422 789113 usertrap_amd64.go:122] [ 12586(3037): 12592(3038)] Allocate a new trap: 0xc0042c0210 43 D0714 04:46:18.182433 789113 usertrap_amd64.go:225] [ 12586(3037): 12592(3038)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:18.183158 789113 usertrap_amd64.go:212] [ 12591(3048): 12591(3048)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:18.183214 789113 usertrap_amd64.go:122] [ 12591(3048): 12591(3048)] Allocate a new trap: 0xc00113c6c0 37 D0714 04:46:18.183415 789113 usertrap_amd64.go:225] [ 12591(3048): 12591(3048)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:18.184568 789113 usertrap_amd64.go:212] [ 12591(3048): 12591(3048)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:18.184594 789113 usertrap_amd64.go:122] [ 12591(3048): 12591(3048)] Allocate a new trap: 0xc00113c6c0 38 D0714 04:46:18.184606 789113 usertrap_amd64.go:225] [ 12591(3048): 12591(3048)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:19.247229 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:46:19.247281 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 44 D0714 04:46:19.247312 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:19.296687 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:19.296743 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 44 D0714 04:46:19.296766 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:19.349291 789113 usertrap_amd64.go:212] [ 12585(3468): 12585(3468)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:19.349338 789113 usertrap_amd64.go:122] [ 12585(3468): 12585(3468)] Allocate a new trap: 0xc003b444e0 45 D0714 04:46:19.349353 789113 usertrap_amd64.go:225] [ 12585(3468): 12585(3468)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:46:19.349334 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:19.349384 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 44 D0714 04:46:19.349403 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:19.352218 789113 task_exit.go:204] [ 12585(3468): 12585(3468)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:19.352298 789113 task_exit.go:204] [ 12585(3468): 12585(3468)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:19.352396 789113 task_signals.go:204] [ 12585(3468): 12588(3469)] Signal 12585, PID: 12588, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:19.352416 789113 task_exit.go:204] [ 12585(3468): 12588(3469)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:19.352427 789113 task_exit.go:204] [ 12585(3468): 12588(3469)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:19.352431 789113 task_exit.go:204] [ 12585(3468): 12588(3469)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:19.352446 789113 task_signals.go:204] [ 12585(3468): 12589(3470)] Signal 12585, PID: 12589, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:19.352463 789113 task_exit.go:204] [ 12585(3468): 12589(3470)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:19.352468 789113 task_exit.go:204] [ 12585(3468): 12589(3470)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:19.352481 789113 task_exit.go:204] [ 12585(3468): 12589(3470)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:19.352533 789113 task_signals.go:204] [ 12585(3468): 12594(3471)] Signal 12585, PID: 12594, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:19.352607 789113 task_exit.go:204] [ 12585(3468): 12594(3471)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:19.363767 789113 task_exit.go:204] [ 12585(3468): 12594(3471)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:19.364019 789113 task_exit.go:204] [ 12585(3468): 12594(3471)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:19.364097 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:19.364573 789113 task_exit.go:204] [ 12585(3468): 12585(3468)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xffff, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}, 0x1c) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) r3 = epoll_create(0x1) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) (async) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r5, 0x5421, &(0x7f0000000080)=0x0) setreuid(r6, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e22, 0xfe00, 0x3, 0x8b, 0xa, 0x0, 0xc0, 0x73, 0x0, r6}, {0x4, 0x5, 0x3, 0x80, 0xf7de, 0x6, 0x5, 0x7fff}, {0x8000000000000001, 0x1ff, 0x8, 0xc9e}, 0xd26, 0xb7, 0x1, 0x0, 0x3, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x42}, 0x4d6, 0xff}, 0x2, @in=@broadcast, 0x3506, 0x1, 0x2, 0x1, 0x4, 0x800, 0x20000}}, 0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:19.398496 789113 usertrap_amd64.go:212] [ 12584(2971): 12584(2971)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:19.398553 789113 usertrap_amd64.go:122] [ 12584(2971): 12584(2971)] Allocate a new trap: 0xc0002aa180 45 D0714 04:46:19.398573 789113 usertrap_amd64.go:225] [ 12584(2971): 12584(2971)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:19.399030 789113 task_exit.go:204] [ 12584(2971): 12584(2971)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:19.399085 789113 task_exit.go:204] [ 12584(2971): 12584(2971)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:19.452414 789113 usertrap_amd64.go:212] [ 12586(3037): 12586(3037)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:19.452490 789113 usertrap_amd64.go:122] [ 12586(3037): 12586(3037)] Allocate a new trap: 0xc0042c0210 45 D0714 04:46:19.452511 789113 usertrap_amd64.go:225] [ 12586(3037): 12586(3037)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:21.150296 789113 task_signals.go:481] [ 12586(3037): 12586(3037)] No task notified of signal 9 D0714 04:46:21.150406 789113 task_signals.go:458] [ 12586(3037): 12586(3037)] Discarding duplicate signal 9 D0714 04:46:21.155993 789113 task_signals.go:481] [ 12584(2971): 12584(2971)] No task notified of signal 9 D0714 04:46:21.156067 789113 task_signals.go:458] [ 12584(2971): 12584(2971)] Discarding duplicate signal 9 D0714 04:46:21.177586 789113 task_signals.go:481] [ 12591(3048): 12591(3048)] No task notified of signal 9 D0714 04:46:21.177687 789113 task_signals.go:458] [ 12591(3048): 12591(3048)] Discarding duplicate signal 9 D0714 04:46:23.810615 789113 task_signals.go:204] [ 12586(3037): 12586(3037)] Signal 12586, PID: 12586, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810653 789113 task_signals.go:204] [ 12586(3037): 12595(3039)] Signal 12586, PID: 12595, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810674 789113 task_exit.go:204] [ 12586(3037): 12586(3037)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.810665 789113 task_signals.go:204] [ 12584(2971): 12593(2973)] Signal 12584, PID: 12593, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810610 789113 task_signals.go:204] [ 12591(3048): 12591(3048)] Signal 12591, PID: 12591, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810697 789113 task_exit.go:204] [ 12586(3037): 12595(3039)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.810697 789113 task_signals.go:204] [ 12586(3037): 12592(3038)] Signal 12586, PID: 12592, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810746 789113 task_signals.go:204] [ 12586(3037): 12596(3040)] Signal 12586, PID: 12596, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810774 789113 task_signals.go:204] [ 12584(2971): 12587(2972)] Signal 12584, PID: 12587, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:23.810806 789113 task_exit.go:204] [ 12586(3037): 12595(3039)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.810828 789113 task_exit.go:204] [ 12586(3037): 12595(3039)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.810871 789113 task_exit.go:204] [ 12584(2971): 12593(2973)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.810908 789113 task_exit.go:204] [ 12584(2971): 12593(2973)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.810915 789113 task_exit.go:204] [ 12584(2971): 12593(2973)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.810944 789113 task_exit.go:204] [ 12591(3048): 12591(3048)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.811000 789113 task_exit.go:204] [ 12586(3037): 12596(3040)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.811017 789113 task_exit.go:204] [ 12586(3037): 12596(3040)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.811024 789113 task_exit.go:204] [ 12586(3037): 12596(3040)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.811040 789113 task_exit.go:204] [ 12586(3037): 12586(3037)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.811052 789113 task_exit.go:204] [ 12586(3037): 12592(3038)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.811219 789113 task_exit.go:204] [ 12584(2971): 12587(2972)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:23.811286 789113 task_exit.go:204] [ 12591(3048): 12591(3048)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.811304 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:23.811349 789113 task_exit.go:204] [ 12591(3048): 12591(3048)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.812016 789113 task_exit.go:204] [ 12586(3037): 12592(3038)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.812046 789113 task_exit.go:204] [ 12586(3037): 12592(3038)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.812059 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:23.812082 789113 task_exit.go:204] [ 12586(3037): 12586(3037)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:23 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) open(&(0x7f00000000c0)='./bus\x00', 0x2000, 0x0) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:46:23.813251 789113 task_exit.go:204] [ 12584(2971): 12587(2972)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:23.813281 789113 task_exit.go:204] [ 12584(2971): 12587(2972)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:23.813295 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:23.813327 789113 task_exit.go:204] [ 12584(2971): 12584(2971)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:23 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x81000) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) epoll_create(0x1) (async) fcntl$dupfd(r1, 0x0, r1) (async) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x81000) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) (async) 04:46:23 executing program 1: r0 = msgget$private(0x0, 0x480) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) r1 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = msgget(0x1, 0x134) msgctl$IPC_RMID(r2, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) semctl$SEM_INFO(r3, 0x0, 0x13, &(0x7f0000000040)=""/89) shmctl$SHM_LOCK(r3, 0xb) D0714 04:46:24.269166 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:24.269223 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 37 D0714 04:46:24.269374 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:24.270148 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:24.270194 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 37 D0714 04:46:24.270290 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:24.270482 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:24.270509 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 38 D0714 04:46:24.270521 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:24.271063 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:24.271098 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 37 D0714 04:46:24.271173 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:24.271446 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:24.271493 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 38 D0714 04:46:24.271509 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:24.272118 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:24.272163 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 37 D0714 04:46:24.272311 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:24.272821 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:24.272861 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 38 D0714 04:46:24.272873 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:24.273854 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:24.273899 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 38 D0714 04:46:24.273912 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:24.274680 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:24.274759 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 39 D0714 04:46:24.274786 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:24.277079 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:24.277131 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 39 D0714 04:46:24.277146 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:24.277497 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:24.277527 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 40 D0714 04:46:24.277541 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:24.277706 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:24.277728 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 41 D0714 04:46:24.277739 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:24.278146 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:24.278173 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 39 D0714 04:46:24.278187 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:24.278464 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:24.278485 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 42 D0714 04:46:24.278498 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:24.278694 789113 usertrap_amd64.go:212] [ 12597(3472): 12601(3473)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:24.278716 789113 usertrap_amd64.go:122] [ 12597(3472): 12601(3473)] Allocate a new trap: 0xc005fe0000 43 D0714 04:46:24.278730 789113 usertrap_amd64.go:225] [ 12597(3472): 12601(3473)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:24.279168 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:24.279203 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 39 D0714 04:46:24.279218 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:24.281319 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:24.281354 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 40 D0714 04:46:24.281369 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:24.281759 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:24.281787 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 41 D0714 04:46:24.281802 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:24.282275 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:46:24.282304 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 44 D0714 04:46:24.282315 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:24.283748 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:24.283770 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 42 D0714 04:46:24.283779 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:24.284112 789113 usertrap_amd64.go:212] [ 12600(3049): 12604(3050)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:24.284152 789113 usertrap_amd64.go:122] [ 12600(3049): 12604(3050)] Allocate a new trap: 0xc003b44510 43 D0714 04:46:24.284166 789113 usertrap_amd64.go:225] [ 12600(3049): 12604(3050)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) I0714 04:46:24.284734 789113 compat.go:120] Unsupported syscall shmctl(0x96,0xb,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/shmctl for more information. D0714 04:46:24.285470 789113 usertrap_amd64.go:212] [ 12600(3049): 12600(3049)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:24.285496 789113 usertrap_amd64.go:122] [ 12600(3049): 12600(3049)] Allocate a new trap: 0xc003b44510 44 D0714 04:46:24.285512 789113 usertrap_amd64.go:225] [ 12600(3049): 12600(3049)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:24.286543 789113 task_exit.go:204] [ 12600(3049): 12600(3049)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:24.286581 789113 task_exit.go:204] [ 12600(3049): 12600(3049)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:24.286613 789113 task_signals.go:204] [ 12600(3049): 12604(3050)] Signal 12600, PID: 12604, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:24.286641 789113 task_exit.go:204] [ 12600(3049): 12604(3050)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:24.286949 789113 task_exit.go:204] [ 12600(3049): 12604(3050)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:24.286974 789113 task_exit.go:204] [ 12600(3049): 12604(3050)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:24.286989 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:24.287344 789113 task_exit.go:204] [ 12600(3049): 12600(3049)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:24 executing program 1: r0 = msgget$private(0x0, 0x480) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) r1 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) (async) r2 = msgget(0x1, 0x134) msgctl$IPC_RMID(r2, 0x0) (async) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) semctl$SEM_INFO(r3, 0x0, 0x13, &(0x7f0000000040)=""/89) shmctl$SHM_LOCK(r3, 0xb) D0714 04:46:24.288193 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:24.288219 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 40 D0714 04:46:24.288234 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:24.288402 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:24.288416 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 41 D0714 04:46:24.288432 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:24.289369 789113 usertrap_amd64.go:212] [ 12599(3041): 12605(3042)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:24.289394 789113 usertrap_amd64.go:122] [ 12599(3041): 12605(3042)] Allocate a new trap: 0xc00113c8d0 42 D0714 04:46:24.289407 789113 usertrap_amd64.go:225] [ 12599(3041): 12605(3042)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:24.289437 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:24.289446 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 43 D0714 04:46:24.289455 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:24.296030 789113 usertrap_amd64.go:212] [ 12607(3051): 12607(3051)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:24.296075 789113 usertrap_amd64.go:122] [ 12607(3051): 12607(3051)] Allocate a new trap: 0xc007cf80c0 37 D0714 04:46:24.296145 789113 usertrap_amd64.go:225] [ 12607(3051): 12607(3051)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:24.297129 789113 usertrap_amd64.go:212] [ 12607(3051): 12607(3051)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:24.297161 789113 usertrap_amd64.go:122] [ 12607(3051): 12607(3051)] Allocate a new trap: 0xc007cf80c0 38 D0714 04:46:24.297176 789113 usertrap_amd64.go:225] [ 12607(3051): 12607(3051)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:24.300388 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:24.300422 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 40 D0714 04:46:24.300439 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:24.300688 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:24.300710 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 41 D0714 04:46:24.300718 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:24.301181 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:24.301206 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 42 D0714 04:46:24.301216 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:24.301392 789113 usertrap_amd64.go:212] [ 12598(2974): 12609(2975)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:24.301428 789113 usertrap_amd64.go:122] [ 12598(2974): 12609(2975)] Allocate a new trap: 0xc005fe0030 43 D0714 04:46:24.301440 789113 usertrap_amd64.go:225] [ 12598(2974): 12609(2975)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:24.354831 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:24.354914 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 44 D0714 04:46:24.354930 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:24.395884 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:24.395959 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 44 D0714 04:46:24.395983 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:25.666596 789113 usertrap_amd64.go:212] [ 12597(3472): 12597(3472)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:25.666651 789113 usertrap_amd64.go:212] [ 12598(2974): 12598(2974)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:25.666679 789113 usertrap_amd64.go:122] [ 12598(2974): 12598(2974)] Allocate a new trap: 0xc005fe0030 45 D0714 04:46:25.666703 789113 usertrap_amd64.go:225] [ 12598(2974): 12598(2974)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:25.666667 789113 usertrap_amd64.go:122] [ 12597(3472): 12597(3472)] Allocate a new trap: 0xc005fe0000 45 D0714 04:46:25.666799 789113 usertrap_amd64.go:212] [ 12599(3041): 12599(3041)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:25.666818 789113 usertrap_amd64.go:122] [ 12599(3041): 12599(3041)] Allocate a new trap: 0xc00113c8d0 45 D0714 04:46:25.666844 789113 usertrap_amd64.go:225] [ 12599(3041): 12599(3041)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:25.666844 789113 usertrap_amd64.go:225] [ 12597(3472): 12597(3472)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:46:25.667703 789113 task_exit.go:204] [ 12598(2974): 12598(2974)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.667768 789113 task_exit.go:204] [ 12598(2974): 12598(2974)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.667805 789113 task_signals.go:204] [ 12598(2974): 12611(2977)] Signal 12598, PID: 12611, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.667836 789113 task_exit.go:204] [ 12598(2974): 12611(2977)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.667847 789113 task_exit.go:204] [ 12598(2974): 12611(2977)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.667839 789113 task_signals.go:204] [ 12598(2974): 12613(2979)] Signal 12598, PID: 12613, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.667854 789113 task_exit.go:204] [ 12598(2974): 12611(2977)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.667872 789113 task_signals.go:204] [ 12598(2974): 12612(2978)] Signal 12598, PID: 12612, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.667877 789113 task_signals.go:204] [ 12598(2974): 12614(2980)] Signal 12598, PID: 12614, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.667884 789113 task_exit.go:204] [ 12598(2974): 12612(2978)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.667893 789113 task_exit.go:204] [ 12598(2974): 12613(2979)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.667920 789113 task_exit.go:204] [ 12598(2974): 12613(2979)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.667929 789113 task_exit.go:204] [ 12598(2974): 12613(2979)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.667958 789113 task_exit.go:204] [ 12598(2974): 12614(2980)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.667984 789113 task_exit.go:204] [ 12598(2974): 12614(2980)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.667990 789113 task_exit.go:204] [ 12598(2974): 12614(2980)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.668020 789113 task_exit.go:204] [ 12598(2974): 12612(2978)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.668026 789113 task_exit.go:204] [ 12598(2974): 12612(2978)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.668644 789113 task_exit.go:204] [ 12597(3472): 12597(3472)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.668703 789113 task_exit.go:204] [ 12597(3472): 12597(3472)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.668737 789113 task_signals.go:204] [ 12597(3472): 12603(3475)] Signal 12597, PID: 12603, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.668769 789113 task_exit.go:204] [ 12597(3472): 12603(3475)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.668786 789113 task_exit.go:204] [ 12597(3472): 12603(3475)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.668794 789113 task_exit.go:204] [ 12597(3472): 12603(3475)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.668780 789113 task_signals.go:204] [ 12597(3472): 12602(3474)] Signal 12597, PID: 12602, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.668821 789113 task_exit.go:204] [ 12597(3472): 12602(3474)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.668851 789113 task_exit.go:204] [ 12597(3472): 12602(3474)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.668859 789113 task_exit.go:204] [ 12597(3472): 12602(3474)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.668815 789113 task_signals.go:204] [ 12597(3472): 12601(3473)] Signal 12597, PID: 12601, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:25.668880 789113 task_exit.go:204] [ 12597(3472): 12601(3473)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:25.669339 789113 task_exit.go:204] [ 12597(3472): 12601(3473)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:25.669373 789113 task_exit.go:204] [ 12597(3472): 12601(3473)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:25.669387 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:25.669472 789113 task_exit.go:204] [ 12597(3472): 12597(3472)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:25 executing program 3: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x7080, 0xe066b1bb53e21c0, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x8, @empty, 0x10}, 0x1c) listen(r2, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x80800) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r5 = epoll_create(0x1) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) r8 = epoll_create(0x1) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$AUTOFS_IOC_FAIL(r9, 0x5451, 0x0) r10 = accept$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) ioctl$sock_inet_SIOCGARP(r11, 0x8954, &(0x7f0000000300)={{0x2, 0x4e21, @multicast2}, {0x6, @local}, 0x50, {0x2, 0x4e22, @remote}, 'macsec0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000000100), 0x4) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:26.105478 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:26.105624 789113 task_signals.go:179] [ 7: 5230] Restarting syscall 202: interrupted by signal 23 D0714 04:46:26.105707 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:27.267271 789113 task_signals.go:481] [ 12598(2974): 12598(2974)] No task notified of signal 9 D0714 04:46:27.267399 789113 task_signals.go:481] [ 12599(3041): 12599(3041)] No task notified of signal 9 D0714 04:46:27.267426 789113 task_signals.go:458] [ 12598(2974): 12598(2974)] Discarding duplicate signal 9 D0714 04:46:27.267516 789113 task_signals.go:458] [ 12599(3041): 12599(3041)] Discarding duplicate signal 9 D0714 04:46:27.292688 789113 task_signals.go:481] [ 12607(3051): 12607(3051)] No task notified of signal 9 D0714 04:46:27.292807 789113 task_signals.go:458] [ 12607(3051): 12607(3051)] Discarding duplicate signal 9 D0714 04:46:28.550331 789113 task_signals.go:204] [ 12607(3051): 12607(3051)] Signal 12607, PID: 12607, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550464 789113 task_signals.go:204] [ 12599(3041): 12608(3044)] Signal 12599, PID: 12608, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550447 789113 task_signals.go:204] [ 12599(3041): 12599(3041)] Signal 12599, PID: 12599, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550502 789113 task_exit.go:204] [ 12607(3051): 12607(3051)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.550406 789113 task_signals.go:204] [ 12599(3041): 12606(3043)] Signal 12599, PID: 12606, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550573 789113 task_exit.go:204] [ 12599(3041): 12606(3043)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.550660 789113 task_signals.go:204] [ 12599(3041): 12605(3042)] Signal 12599, PID: 12605, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550682 789113 task_signals.go:204] [ 12598(2974): 12609(2975)] Signal 12598, PID: 12609, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550701 789113 task_signals.go:204] [ 12598(2974): 12610(2976)] Signal 12598, PID: 12610, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:28.550717 789113 task_exit.go:204] [ 12599(3041): 12606(3043)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.550727 789113 task_exit.go:204] [ 12599(3041): 12606(3043)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.550747 789113 task_exit.go:204] [ 12599(3041): 12608(3044)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.550773 789113 task_exit.go:204] [ 12599(3041): 12608(3044)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.550783 789113 task_exit.go:204] [ 12599(3041): 12608(3044)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.550833 789113 task_exit.go:204] [ 12599(3041): 12599(3041)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.550897 789113 task_exit.go:204] [ 12599(3041): 12599(3041)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.550926 789113 task_exit.go:204] [ 12599(3041): 12605(3042)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.551020 789113 task_exit.go:204] [ 12598(2974): 12609(2975)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.551075 789113 task_exit.go:204] [ 12598(2974): 12609(2975)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.551084 789113 task_exit.go:204] [ 12598(2974): 12609(2975)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.551100 789113 task_exit.go:204] [ 12598(2974): 12610(2976)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:28.551387 789113 task_exit.go:204] [ 12607(3051): 12607(3051)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.551429 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:28.551560 789113 task_exit.go:204] [ 12607(3051): 12607(3051)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.551682 789113 task_exit.go:204] [ 12599(3041): 12605(3042)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.551697 789113 task_exit.go:204] [ 12599(3041): 12605(3042)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.551716 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:28.551770 789113 task_exit.go:204] [ 12599(3041): 12599(3041)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.551826 789113 task_exit.go:204] [ 12598(2974): 12610(2976)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:28.551842 789113 task_exit.go:204] [ 12598(2974): 12610(2976)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:28.551864 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:28.551897 789113 task_exit.go:204] [ 12598(2974): 12598(2974)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:28 executing program 1: r0 = msgget$private(0x0, 0x480) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async, rerun: 32) r1 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) (rerun: 32) shmctl$SHM_LOCK(r1, 0xb) (async) r2 = msgget(0x1, 0x134) msgctl$IPC_RMID(r2, 0x0) (async) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ff3000/0x3000)=nil) semctl$SEM_INFO(r3, 0x0, 0x13, &(0x7f0000000040)=""/89) (async) shmctl$SHM_LOCK(r3, 0xb) 04:46:28 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) (async) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x81000) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) 04:46:28 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x100000001) (async, rerun: 64) open(&(0x7f00000000c0)='./bus\x00', 0x2000, 0x0) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:46:28.558669 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:28.558715 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 37 D0714 04:46:28.558826 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:28.558897 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:28.558910 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:28.558921 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 37 D0714 04:46:28.559044 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:28.558926 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 37 D0714 04:46:28.559278 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:28.559897 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:28.559933 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 38 D0714 04:46:28.559950 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:28.560794 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:28.560822 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 38 D0714 04:46:28.560834 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:28.563966 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:28.564003 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 39 D0714 04:46:28.564015 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:28.564904 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:28.564935 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 39 D0714 04:46:28.564969 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:28.567443 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:28.567486 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 40 D0714 04:46:28.567509 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:28.567709 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:28.567743 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 41 D0714 04:46:28.567756 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:28.568030 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:28.568069 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 40 D0714 04:46:28.568088 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:28.568182 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:28.568209 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 38 D0714 04:46:28.568222 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:28.568418 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:28.568443 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 41 D0714 04:46:28.568454 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:28.568555 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:28.568577 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 42 D0714 04:46:28.568589 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:28.568848 789113 usertrap_amd64.go:212] [ 12617(3052): 12618(3053)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:28.568955 789113 usertrap_amd64.go:122] [ 12617(3052): 12618(3053)] Allocate a new trap: 0xc001aa81b0 43 D0714 04:46:28.568980 789113 usertrap_amd64.go:225] [ 12617(3052): 12618(3053)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:28.568926 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:28.569034 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 42 D0714 04:46:28.569079 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:28.569257 789113 usertrap_amd64.go:212] [ 12616(2981): 12619(2982)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:28.569295 789113 usertrap_amd64.go:122] [ 12616(2981): 12619(2982)] Allocate a new trap: 0xc009ca6450 43 D0714 04:46:28.569309 789113 usertrap_amd64.go:225] [ 12616(2981): 12619(2982)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:29.039865 789113 usertrap_amd64.go:212] [ 12617(3052): 12617(3052)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:29.039937 789113 usertrap_amd64.go:122] [ 12617(3052): 12617(3052)] Allocate a new trap: 0xc001aa81b0 44 D0714 04:46:29.039963 789113 usertrap_amd64.go:225] [ 12617(3052): 12617(3052)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:29.040314 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:29.040347 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 39 D0714 04:46:29.040363 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:29.041128 789113 task_exit.go:204] [ 12617(3052): 12617(3052)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:29.041207 789113 task_exit.go:204] [ 12617(3052): 12617(3052)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:29.041233 789113 task_signals.go:204] [ 12617(3052): 12620(3054)] Signal 12617, PID: 12620, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:29.041248 789113 task_exit.go:204] [ 12617(3052): 12620(3054)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:29.041257 789113 task_exit.go:204] [ 12617(3052): 12620(3054)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:29.041243 789113 task_signals.go:204] [ 12617(3052): 12618(3053)] Signal 12617, PID: 12618, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:29.041261 789113 task_exit.go:204] [ 12617(3052): 12620(3054)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:29.041289 789113 task_exit.go:204] [ 12617(3052): 12618(3053)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:29.041688 789113 task_exit.go:204] [ 12617(3052): 12618(3053)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:29.041717 789113 task_exit.go:204] [ 12617(3052): 12618(3053)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:29.041730 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:29.042721 789113 task_exit.go:204] [ 12617(3052): 12617(3052)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:29.043287 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:29.043318 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 40 D0714 04:46:29.043336 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:29.043574 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:29.043678 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 41 D0714 04:46:29.043706 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:29.044070 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:29.044098 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 37 D0714 04:46:29.044234 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:29.044339 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:29.044357 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 42 D0714 04:46:29.044375 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:29.044464 789113 usertrap_amd64.go:212] [ 12615(3476): 12623(3477)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:29.044489 789113 usertrap_amd64.go:122] [ 12615(3476): 12623(3477)] Allocate a new trap: 0xc007cf8150 43 D0714 04:46:29.044501 789113 usertrap_amd64.go:225] [ 12615(3476): 12623(3477)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) 04:46:29 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000140)=0x1c, 0x80800) r1 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000280)=""/4096) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgrcv(r2, &(0x7f0000000000)={0x0, ""/129}, 0xffffffffffffff77, 0x3, 0x0) D0714 04:46:29.051168 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:29.051209 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 37 D0714 04:46:29.051316 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:29.053366 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:29.053397 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 38 D0714 04:46:29.053411 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:29.058459 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:29.058500 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 39 D0714 04:46:29.058517 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:29.060118 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:29.060147 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 38 D0714 04:46:29.060157 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:29.061570 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:29.061597 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 40 D0714 04:46:29.061611 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:29.061806 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:29.061830 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 41 D0714 04:46:29.061842 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:29.062621 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:29.062648 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 42 D0714 04:46:29.062661 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:29.063421 789113 usertrap_amd64.go:212] [ 12624(3055): 12625(3056)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:29.063453 789113 usertrap_amd64.go:122] [ 12624(3055): 12625(3056)] Allocate a new trap: 0xc0042c03f0 43 D0714 04:46:29.063464 789113 usertrap_amd64.go:225] [ 12624(3055): 12625(3056)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:29.069742 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:29.069858 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 39 D0714 04:46:29.069912 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:29.072500 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:29.072537 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 40 D0714 04:46:29.072552 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:29.072727 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:29.072746 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 41 D0714 04:46:29.072775 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:29.073903 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:29.073933 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 42 D0714 04:46:29.073951 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:29.074049 789113 usertrap_amd64.go:212] [ 12622(3045): 12626(3046)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:29.074078 789113 usertrap_amd64.go:122] [ 12622(3045): 12626(3046)] Allocate a new trap: 0xc005fe00f0 43 D0714 04:46:29.074092 789113 usertrap_amd64.go:225] [ 12622(3045): 12626(3046)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:29.105444 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:29.105587 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:30.904621 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:30.904696 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 44 D0714 04:46:30.904721 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:30.905293 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:30.905354 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 44 D0714 04:46:30.905377 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:30.906240 789113 usertrap_amd64.go:212] [ 12615(3476): 12615(3476)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:30.906279 789113 usertrap_amd64.go:122] [ 12615(3476): 12615(3476)] Allocate a new trap: 0xc007cf8150 44 D0714 04:46:30.906298 789113 usertrap_amd64.go:225] [ 12615(3476): 12615(3476)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:30.917089 789113 task_exit.go:204] [ 12615(3476): 12615(3476)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:30.917260 789113 task_signals.go:204] [ 12615(3476): 12631(3478)] Signal 12615, PID: 12631, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:30.917320 789113 task_exit.go:204] [ 12615(3476): 12615(3476)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:30.917359 789113 task_signals.go:204] [ 12615(3476): 12623(3477)] Signal 12615, PID: 12623, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:30.917399 789113 task_exit.go:204] [ 12615(3476): 12623(3477)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:30.917427 789113 task_exit.go:204] [ 12615(3476): 12623(3477)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:30.917437 789113 task_exit.go:204] [ 12615(3476): 12623(3477)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:30.917508 789113 task_exit.go:204] [ 12615(3476): 12631(3478)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:30.918063 789113 task_exit.go:204] [ 12615(3476): 12631(3478)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:30.918089 789113 task_exit.go:204] [ 12615(3476): 12631(3478)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:30.918112 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:30.919322 789113 task_exit.go:204] [ 12615(3476): 12615(3476)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:30 executing program 3: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x7080, 0xe066b1bb53e21c0, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x8, @empty, 0x10}, 0x1c) (async) listen(r2, 0x0) (async, rerun: 64) r3 = accept4(r2, 0x0, 0x0, 0x80800) (rerun: 64) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) r5 = epoll_create(0x1) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) (async, rerun: 64) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) (async, rerun: 64) r8 = epoll_create(0x1) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$AUTOFS_IOC_FAIL(r9, 0x5451, 0x0) r10 = accept$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) ioctl$sock_inet_SIOCGARP(r11, 0x8954, &(0x7f0000000300)={{0x2, 0x4e21, @multicast2}, {0x6, @local}, 0x50, {0x2, 0x4e22, @remote}, 'macsec0\x00'}) (async) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000000100), 0x4) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:30.955455 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:30.955503 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 44 D0714 04:46:30.955521 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:31.005457 789113 usertrap_amd64.go:212] [ 12622(3045): 12622(3045)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:31.005522 789113 usertrap_amd64.go:122] [ 12622(3045): 12622(3045)] Allocate a new trap: 0xc005fe00f0 45 D0714 04:46:31.005550 789113 usertrap_amd64.go:225] [ 12622(3045): 12622(3045)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:31.009308 789113 usertrap_amd64.go:212] [ 12624(3055): 12624(3055)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:31.009353 789113 usertrap_amd64.go:122] [ 12624(3055): 12624(3055)] Allocate a new trap: 0xc0042c03f0 45 D0714 04:46:31.009382 789113 usertrap_amd64.go:225] [ 12624(3055): 12624(3055)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:31.011290 789113 task_exit.go:204] [ 12624(3055): 12624(3055)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:31.011346 789113 task_exit.go:204] [ 12624(3055): 12624(3055)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:31.011372 789113 task_signals.go:204] [ 12624(3055): 12625(3056)] Signal 12624, PID: 12625, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:31.011388 789113 task_exit.go:204] [ 12624(3055): 12625(3056)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:31.011409 789113 task_exit.go:204] [ 12624(3055): 12625(3056)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:31.011416 789113 task_exit.go:204] [ 12624(3055): 12625(3056)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:31.011432 789113 task_signals.go:204] [ 12624(3055): 12628(3057)] Signal 12624, PID: 12628, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:31.011445 789113 task_exit.go:204] [ 12624(3055): 12628(3057)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:31.011819 789113 task_exit.go:204] [ 12624(3055): 12628(3057)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:31.011850 789113 task_exit.go:204] [ 12624(3055): 12628(3057)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:31.011864 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:31.011978 789113 task_exit.go:204] [ 12624(3055): 12624(3055)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000140)=0x1c, 0x80800) (async) r1 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000280)=""/4096) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgrcv(r2, &(0x7f0000000000)={0x0, ""/129}, 0xffffffffffffff77, 0x3, 0x0) D0714 04:46:31.058113 789113 usertrap_amd64.go:212] [ 12616(2981): 12616(2981)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:31.058194 789113 usertrap_amd64.go:122] [ 12616(2981): 12616(2981)] Allocate a new trap: 0xc009ca6450 45 D0714 04:46:31.058215 789113 usertrap_amd64.go:225] [ 12616(2981): 12616(2981)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:32.039490 789113 task_signals.go:476] [ 12622(3045): 12630(3048)] Notified of group signal 9 D0714 04:46:32.039582 789113 task_signals.go:204] [ 12622(3045): 12630(3048)] Signal 12622, PID: 12630, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:32.039632 789113 task_exit.go:204] [ 12622(3045): 12630(3048)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:32.039658 789113 task_signals.go:458] [ 12622(3045): 12622(3045)] Discarding duplicate signal 9 D0714 04:46:32.039697 789113 task_exit.go:204] [ 12622(3045): 12630(3048)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:32.039684 789113 task_signals.go:204] [ 12622(3045): 12632(3049)] Signal 12622, PID: 12632, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:32.039719 789113 task_exit.go:204] [ 12622(3045): 12630(3048)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:32.039786 789113 task_exit.go:204] [ 12622(3045): 12632(3049)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:32.039830 789113 task_exit.go:204] [ 12622(3045): 12632(3049)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:32.039839 789113 task_exit.go:204] [ 12622(3045): 12632(3049)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:32.058977 789113 task_signals.go:481] [ 12616(2981): 12616(2981)] No task notified of signal 9 D0714 04:46:32.059080 789113 task_signals.go:458] [ 12616(2981): 12616(2981)] Discarding duplicate signal 9 D0714 04:46:32.104746 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:32.264038 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:32.873817 789113 task_signals.go:470] [ 7: 39] Notified of signal 23 D0714 04:46:32.873910 789113 task_signals.go:179] [ 7: 39] Restarting syscall 202: interrupted by signal 23 D0714 04:46:32.873924 789113 task_signals.go:220] [ 7: 39] Signal 23: delivering to handler D0714 04:46:34.907749 789113 task_signals.go:204] [ 12616(2981): 12619(2982)] Signal 12616, PID: 12619, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907823 789113 task_signals.go:204] [ 12622(3045): 12627(3047)] Signal 12622, PID: 12627, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907829 789113 task_exit.go:204] [ 12616(2981): 12619(2982)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.907857 789113 task_exit.go:204] [ 12622(3045): 12627(3047)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.907805 789113 task_signals.go:204] [ 12616(2981): 12621(2983)] Signal 12616, PID: 12621, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907788 789113 task_signals.go:204] [ 12622(3045): 12622(3045)] Signal 12622, PID: 12622, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907753 789113 task_signals.go:204] [ 12622(3045): 12626(3046)] Signal 12622, PID: 12626, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907899 789113 task_signals.go:204] [ 12616(2981): 12616(2981)] Signal 12616, PID: 12616, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907913 789113 task_exit.go:204] [ 12622(3045): 12622(3045)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.907944 789113 task_exit.go:204] [ 12622(3045): 12622(3045)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.907918 789113 task_signals.go:204] [ 12616(2981): 12629(2984)] Signal 12616, PID: 12629, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:34.907971 789113 task_exit.go:204] [ 12622(3045): 12626(3046)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.908002 789113 task_exit.go:204] [ 12622(3045): 12626(3046)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908011 789113 task_exit.go:204] [ 12622(3045): 12626(3046)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908061 789113 task_exit.go:204] [ 12616(2981): 12621(2983)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.908149 789113 task_exit.go:204] [ 12616(2981): 12621(2983)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908159 789113 task_exit.go:204] [ 12616(2981): 12621(2983)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908186 789113 task_exit.go:204] [ 12616(2981): 12619(2982)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908200 789113 task_exit.go:204] [ 12616(2981): 12619(2982)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908212 789113 task_exit.go:204] [ 12616(2981): 12616(2981)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.908223 789113 task_exit.go:204] [ 12616(2981): 12616(2981)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908233 789113 task_exit.go:204] [ 12616(2981): 12629(2984)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:34.908532 789113 task_exit.go:204] [ 12622(3045): 12627(3047)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908625 789113 task_exit.go:204] [ 12622(3045): 12627(3047)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908645 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:34.908687 789113 task_exit.go:204] [ 12622(3045): 12622(3045)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908728 789113 task_exit.go:204] [ 12616(2981): 12629(2984)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:34.908737 789113 task_exit.go:204] [ 12616(2981): 12629(2984)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:34.908744 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:34.908756 789113 task_exit.go:204] [ 12616(2981): 12616(2981)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:34 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44802, 0x111) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) 04:46:34 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) tkill(0x0, 0x1004000000015) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:46:35.359461 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:35.359529 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 37 D0714 04:46:35.359651 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:35.360820 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:35.360903 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 37 D0714 04:46:35.361087 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:35.362493 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:35.362550 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 38 D0714 04:46:35.362589 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:35.364347 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:35.364399 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 37 D0714 04:46:35.364513 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:35.365369 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:35.365395 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 37 D0714 04:46:35.365551 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:35.365980 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:35.366009 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 38 D0714 04:46:35.366022 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:35.366833 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:35.366877 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 38 D0714 04:46:35.366892 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:35.370726 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:35.370756 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 39 D0714 04:46:35.370769 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:35.371945 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:35.372046 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 39 D0714 04:46:35.372071 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:35.372958 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:35.372988 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 38 D0714 04:46:35.373003 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:35.374411 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:35.374616 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 39 D0714 04:46:35.374790 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:35.375519 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:35.375548 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 40 D0714 04:46:35.375561 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:35.376044 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:35.376068 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 41 D0714 04:46:35.376079 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:35.376516 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:35.376546 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 42 D0714 04:46:35.376556 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:35.376852 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:35.376888 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 40 D0714 04:46:35.376900 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:35.376978 789113 usertrap_amd64.go:212] [ 12634(3479): 12637(3480)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:35.377024 789113 usertrap_amd64.go:122] [ 12634(3479): 12637(3480)] Allocate a new trap: 0xc0002aa630 43 D0714 04:46:35.377041 789113 usertrap_amd64.go:225] [ 12634(3479): 12637(3480)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:35.377917 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:35.377990 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 41 D0714 04:46:35.378060 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:35.378828 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:35.378865 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 40 D0714 04:46:35.378867 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:35.378882 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:35.378888 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 42 D0714 04:46:35.378906 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:35.379200 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:35.379238 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 41 D0714 04:46:35.379255 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:35.379258 789113 usertrap_amd64.go:212] [ 12636(3058): 12638(3059)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:35.379276 789113 usertrap_amd64.go:122] [ 12636(3058): 12638(3059)] Allocate a new trap: 0xc0070f8120 43 D0714 04:46:35.379287 789113 usertrap_amd64.go:225] [ 12636(3058): 12638(3059)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:35.380125 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:35.380201 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 39 D0714 04:46:35.380265 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:35.380390 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:35.380546 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 42 D0714 04:46:35.380562 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:35.380655 789113 usertrap_amd64.go:212] [ 12633(3050): 12639(3051)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:35.380673 789113 usertrap_amd64.go:122] [ 12633(3050): 12639(3051)] Allocate a new trap: 0xc007dfa180 43 D0714 04:46:35.380679 789113 usertrap_amd64.go:225] [ 12633(3050): 12639(3051)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:35.382036 789113 usertrap_amd64.go:212] [ 12633(3050): 12639(3051)] Found the pattern at ip 558472d39719:sysno 257 D0714 04:46:35.382122 789113 usertrap_amd64.go:122] [ 12633(3050): 12639(3051)] Allocate a new trap: 0xc007dfa180 44 D0714 04:46:35.382202 789113 usertrap_amd64.go:225] [ 12633(3050): 12639(3051)] Apply the binary patch addr 558472d39719 trap addr 62dc0 ([184 1 1 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:35.383995 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:35.384023 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 40 D0714 04:46:35.384034 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:35.384199 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:35.384247 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 41 D0714 04:46:35.384261 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:35.384812 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:35.384866 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 42 D0714 04:46:35.384898 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:35.384930 789113 usertrap_amd64.go:212] [ 12635(2985): 12642(2986)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:35.384945 789113 usertrap_amd64.go:122] [ 12635(2985): 12642(2986)] Allocate a new trap: 0xc0070f80f0 43 D0714 04:46:35.384957 789113 usertrap_amd64.go:225] [ 12635(2985): 12642(2986)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:35.385840 789113 usertrap_amd64.go:212] [ 12635(2985): 12635(2985)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:35.385877 789113 usertrap_amd64.go:122] [ 12635(2985): 12635(2985)] Allocate a new trap: 0xc0070f80f0 44 D0714 04:46:35.385891 789113 usertrap_amd64.go:225] [ 12635(2985): 12635(2985)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:35.387797 789113 task_exit.go:204] [ 12635(2985): 12635(2985)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.387953 789113 task_exit.go:204] [ 12635(2985): 12635(2985)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.387996 789113 task_signals.go:204] [ 12635(2985): 12642(2986)] Signal 12635, PID: 12642, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:35.388012 789113 task_exit.go:204] [ 12635(2985): 12642(2986)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.388341 789113 task_exit.go:204] [ 12635(2985): 12642(2986)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.388370 789113 task_exit.go:204] [ 12635(2985): 12642(2986)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:35.388386 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:35.389455 789113 task_exit.go:204] [ 12635(2985): 12635(2985)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:35 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44802, 0x111) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:35.399698 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:35.399760 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 37 D0714 04:46:35.399869 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:35.401063 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:35.401104 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 38 D0714 04:46:35.401122 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:35.405846 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:35.405945 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 39 D0714 04:46:35.405975 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:35.409568 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:35.409607 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 40 D0714 04:46:35.409622 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:35.409821 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:35.409862 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 41 D0714 04:46:35.409879 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:35.410587 789113 usertrap_amd64.go:212] [ 12643(2987): 12644(2988)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:35.410619 789113 usertrap_amd64.go:122] [ 12643(2987): 12644(2988)] Allocate a new trap: 0xc00113c900 42 D0714 04:46:35.410631 789113 usertrap_amd64.go:225] [ 12643(2987): 12644(2988)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:35.410662 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:35.410700 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 43 D0714 04:46:35.410768 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:35.413099 789113 usertrap_amd64.go:212] [ 12643(2987): 12643(2987)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:35.413141 789113 usertrap_amd64.go:122] [ 12643(2987): 12643(2987)] Allocate a new trap: 0xc00113c900 44 D0714 04:46:35.413157 789113 usertrap_amd64.go:225] [ 12643(2987): 12643(2987)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:35.413643 789113 task_exit.go:204] [ 12643(2987): 12643(2987)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.413733 789113 task_exit.go:204] [ 12643(2987): 12643(2987)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.413793 789113 task_signals.go:204] [ 12643(2987): 12644(2988)] Signal 12643, PID: 12644, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:35.413812 789113 task_exit.go:204] [ 12643(2987): 12644(2988)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.413826 789113 task_exit.go:204] [ 12643(2987): 12644(2988)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.413832 789113 task_exit.go:204] [ 12643(2987): 12644(2988)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:35.413849 789113 task_signals.go:204] [ 12643(2987): 12645(2989)] Signal 12643, PID: 12645, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:35.413873 789113 task_exit.go:204] [ 12643(2987): 12645(2989)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.414344 789113 task_exit.go:204] [ 12643(2987): 12645(2989)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.414377 789113 task_exit.go:204] [ 12643(2987): 12645(2989)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:35.414389 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:35.414495 789113 task_exit.go:204] [ 12643(2987): 12643(2987)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:35 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44802, 0x111) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x100000001) (rerun: 64) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:35.420822 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:35.420855 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 37 D0714 04:46:35.421008 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:35.421954 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:35.421987 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 38 D0714 04:46:35.422001 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:35.425423 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:35.425449 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 39 D0714 04:46:35.425459 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:35.427521 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:35.427547 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 40 D0714 04:46:35.427563 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:35.427850 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:35.427875 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 41 D0714 04:46:35.427886 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:35.428767 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:35.428794 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 42 D0714 04:46:35.428804 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:35.428889 789113 usertrap_amd64.go:212] [ 12646(2990): 12647(2991)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:35.428898 789113 usertrap_amd64.go:122] [ 12646(2990): 12647(2991)] Allocate a new trap: 0xc001aa8240 43 D0714 04:46:35.428905 789113 usertrap_amd64.go:225] [ 12646(2990): 12647(2991)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:35.430614 789113 usertrap_amd64.go:212] [ 12646(2990): 12646(2990)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:35.430644 789113 usertrap_amd64.go:122] [ 12646(2990): 12646(2990)] Allocate a new trap: 0xc001aa8240 44 D0714 04:46:35.430656 789113 usertrap_amd64.go:225] [ 12646(2990): 12646(2990)] Apply the binary patch addr 55e82c3ffa13 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:35.431127 789113 task_exit.go:204] [ 12646(2990): 12646(2990)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.431160 789113 task_exit.go:204] [ 12646(2990): 12646(2990)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.431180 789113 task_signals.go:204] [ 12646(2990): 12648(2992)] Signal 12646, PID: 12648, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:35.431194 789113 task_exit.go:204] [ 12646(2990): 12648(2992)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.431204 789113 task_signals.go:204] [ 12646(2990): 12647(2991)] Signal 12646, PID: 12647, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:35.431211 789113 task_exit.go:204] [ 12646(2990): 12648(2992)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.431214 789113 task_exit.go:204] [ 12646(2990): 12648(2992)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:35.431222 789113 task_exit.go:204] [ 12646(2990): 12647(2991)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:35.431715 789113 task_exit.go:204] [ 12646(2990): 12647(2991)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:35.431747 789113 task_exit.go:204] [ 12646(2990): 12647(2991)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:35.431759 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:35.431908 789113 task_exit.go:204] [ 12646(2990): 12646(2990)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:35 executing program 2: rt_sigsuspend(&(0x7f0000002200)={[0x1]}, 0x8) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000fcffffffffffffff000000000000001f660000000000000040000000000000003d020000000000000800000000003800"/120], 0x78) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x100, 0x8}) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r1, &(0x7f00000000c0)='attr/exec\x00') D0714 04:46:35.432900 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:35.432923 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 44 D0714 04:46:35.432954 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:35.438171 789113 usertrap_amd64.go:212] [ 12649(2993): 12649(2993)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:35.438198 789113 usertrap_amd64.go:122] [ 12649(2993): 12649(2993)] Allocate a new trap: 0xc0002aa930 37 D0714 04:46:35.438321 789113 usertrap_amd64.go:225] [ 12649(2993): 12649(2993)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:35.439412 789113 usertrap_amd64.go:212] [ 12649(2993): 12649(2993)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:35.439435 789113 usertrap_amd64.go:122] [ 12649(2993): 12649(2993)] Allocate a new trap: 0xc0002aa930 38 D0714 04:46:35.439464 789113 usertrap_amd64.go:225] [ 12649(2993): 12649(2993)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:35.441402 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:46:35.441434 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 44 D0714 04:46:35.441447 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:35.537641 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:35.537702 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 45 D0714 04:46:35.537723 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d65f2e trap addr 62e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:36.198822 789113 usertrap_amd64.go:212] [ 12633(3050): 12633(3050)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:36.198884 789113 usertrap_amd64.go:122] [ 12633(3050): 12633(3050)] Allocate a new trap: 0xc007dfa180 46 D0714 04:46:36.198905 789113 usertrap_amd64.go:225] [ 12633(3050): 12633(3050)] Apply the binary patch addr 558472d39a13 trap addr 62e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 46 6 0]) D0714 04:46:36.199137 789113 task_exit.go:204] [ 12633(3050): 12633(3050)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.199185 789113 task_exit.go:204] [ 12633(3050): 12633(3050)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.203241 789113 usertrap_amd64.go:212] [ 12634(3479): 12634(3479)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:36.203271 789113 usertrap_amd64.go:122] [ 12634(3479): 12634(3479)] Allocate a new trap: 0xc0002aa630 45 D0714 04:46:36.203288 789113 usertrap_amd64.go:225] [ 12634(3479): 12634(3479)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:46:36.203841 789113 usertrap_amd64.go:212] [ 12636(3058): 12636(3058)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:36.203871 789113 usertrap_amd64.go:122] [ 12636(3058): 12636(3058)] Allocate a new trap: 0xc0070f8120 45 D0714 04:46:36.203887 789113 usertrap_amd64.go:225] [ 12636(3058): 12636(3058)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:36.205289 789113 task_exit.go:204] [ 12634(3479): 12634(3479)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.205402 789113 task_exit.go:204] [ 12634(3479): 12634(3479)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.205441 789113 task_signals.go:204] [ 12634(3479): 12640(3481)] Signal 12634, PID: 12640, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.205463 789113 task_signals.go:204] [ 12634(3479): 12651(3482)] Signal 12634, PID: 12651, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.205473 789113 task_exit.go:204] [ 12634(3479): 12651(3482)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.205486 789113 task_exit.go:204] [ 12634(3479): 12651(3482)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.205502 789113 task_exit.go:204] [ 12634(3479): 12651(3482)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.205522 789113 task_signals.go:204] [ 12634(3479): 12652(3483)] Signal 12634, PID: 12652, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.205539 789113 task_exit.go:204] [ 12634(3479): 12640(3481)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.205566 789113 task_exit.go:204] [ 12634(3479): 12640(3481)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.205573 789113 task_exit.go:204] [ 12634(3479): 12640(3481)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.205589 789113 task_exit.go:204] [ 12634(3479): 12652(3483)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.205609 789113 task_signals.go:204] [ 12634(3479): 12653(3484)] Signal 12634, PID: 12653, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.205613 789113 task_exit.go:204] [ 12634(3479): 12652(3483)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.205704 789113 task_exit.go:204] [ 12634(3479): 12652(3483)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.205757 789113 task_signals.go:204] [ 12634(3479): 12637(3480)] Signal 12634, PID: 12637, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.205768 789113 task_exit.go:204] [ 12634(3479): 12653(3484)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.205806 789113 task_exit.go:204] [ 12634(3479): 12653(3484)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.205816 789113 task_exit.go:204] [ 12634(3479): 12653(3484)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.205829 789113 task_exit.go:204] [ 12634(3479): 12637(3480)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.206216 789113 task_exit.go:204] [ 12634(3479): 12637(3480)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.206237 789113 task_exit.go:204] [ 12634(3479): 12637(3480)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.206249 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:36.207545 789113 task_exit.go:204] [ 12634(3479): 12634(3479)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.207800 789113 task_exit.go:204] [ 12636(3058): 12636(3058)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.207837 789113 task_exit.go:204] [ 12636(3058): 12636(3058)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.207839 789113 task_signals.go:204] [ 12636(3058): 12641(3060)] Signal 12636, PID: 12641, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.207860 789113 task_exit.go:204] [ 12636(3058): 12641(3060)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.207862 789113 task_signals.go:204] [ 12636(3058): 12638(3059)] Signal 12636, PID: 12638, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:36.207874 789113 task_exit.go:204] [ 12636(3058): 12641(3060)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.207880 789113 task_exit.go:204] [ 12636(3058): 12641(3060)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.207895 789113 task_exit.go:204] [ 12636(3058): 12638(3059)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:36.208275 789113 task_exit.go:204] [ 12636(3058): 12638(3059)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:36.208303 789113 task_exit.go:204] [ 12636(3058): 12638(3059)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:36.208316 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 04:46:36 executing program 3: r0 = epoll_create(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_IOC_FAIL(r1, 0x5451, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x7080, 0xe066b1bb53e21c0, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x8, @empty, 0x10}, 0x1c) (async) listen(r2, 0x0) (async) r3 = accept4(r2, 0x0, 0x0, 0x80800) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async, rerun: 32) r5 = epoll_create(0x1) (rerun: 32) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) (async) r8 = epoll_create(0x1) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$AUTOFS_IOC_FAIL(r9, 0x5451, 0x0) (async) r10 = accept$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c) (async, rerun: 64) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) (rerun: 64) ioctl$sock_inet_SIOCGARP(r11, 0x8954, &(0x7f0000000300)={{0x2, 0x4e21, @multicast2}, {0x6, @local}, 0x50, {0x2, 0x4e22, @remote}, 'macsec0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000000100), 0x4) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:36.209006 789113 task_exit.go:204] [ 12636(3058): 12636(3058)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:36 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000140)=0x1c, 0x80800) (async) r1 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000280)=""/4096) (async) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgrcv(r2, &(0x7f0000000000)={0x0, ""/129}, 0xffffffffffffff77, 0x3, 0x0) D0714 04:46:38.357351 789113 task_signals.go:481] [ 12633(3050): 12633(3050)] No task notified of signal 9 D0714 04:46:38.357596 789113 task_signals.go:458] [ 12633(3050): 12633(3050)] Discarding duplicate signal 9 D0714 04:46:38.435268 789113 task_signals.go:481] [ 12649(2993): 12649(2993)] No task notified of signal 9 D0714 04:46:38.435396 789113 task_signals.go:458] [ 12649(2993): 12649(2993)] Discarding duplicate signal 9 D0714 04:46:39.452279 789113 task_signals.go:204] [ 12649(2993): 12649(2993)] Signal 12649, PID: 12649, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.452318 789113 task_signals.go:204] [ 12633(3050): 12654(3053)] Signal 12633, PID: 12654, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.452346 789113 task_exit.go:204] [ 12649(2993): 12649(2993)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.452457 789113 task_signals.go:204] [ 12633(3050): 12650(3052)] Signal 12633, PID: 12650, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.452421 789113 task_signals.go:204] [ 12633(3050): 12639(3051)] Signal 12633, PID: 12639, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.452478 789113 task_exit.go:204] [ 12633(3050): 12654(3053)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.452535 789113 task_exit.go:204] [ 12633(3050): 12654(3053)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.452555 789113 task_exit.go:204] [ 12633(3050): 12654(3053)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.452610 789113 task_exit.go:204] [ 12633(3050): 12650(3052)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.452693 789113 task_exit.go:204] [ 12633(3050): 12639(3051)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.452736 789113 task_exit.go:204] [ 12633(3050): 12639(3051)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.452757 789113 task_exit.go:204] [ 12633(3050): 12639(3051)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.452896 789113 task_exit.go:204] [ 12649(2993): 12649(2993)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.452932 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:39.452967 789113 task_exit.go:204] [ 12649(2993): 12649(2993)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.453382 789113 task_exit.go:204] [ 12633(3050): 12650(3052)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.453444 789113 task_exit.go:204] [ 12633(3050): 12650(3052)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.453468 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 04:46:39 executing program 2: rt_sigsuspend(&(0x7f0000002200)={[0x1]}, 0x8) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000fcffffffffffffff000000000000001f660000000000000040000000000000003d020000000000000800000000003800"/120], 0x78) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x100, 0x8}) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r1, &(0x7f00000000c0)='attr/exec\x00') D0714 04:46:39.453507 789113 task_exit.go:204] [ 12633(3050): 12633(3050)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:39 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) tkill(0x0, 0x1004000000015) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') fallocate(r0, 0x0, 0x0, 0x100000001) (async) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:46:39.906362 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:39.906416 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 37 D0714 04:46:39.906560 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:39.907044 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:39.907101 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 37 D0714 04:46:39.907239 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:39.907591 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:39.907653 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 38 D0714 04:46:39.907668 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:39.907798 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:39.907852 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 37 D0714 04:46:39.907946 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:39.908284 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:39.908310 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 38 D0714 04:46:39.908320 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:39.909008 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:39.909029 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 38 D0714 04:46:39.909042 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:39.911801 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:39.911832 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 39 D0714 04:46:39.911843 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:39.912506 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:39.912535 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 39 D0714 04:46:39.912546 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:39.912955 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:39.912985 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 39 D0714 04:46:39.912999 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:39.914643 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:39.914670 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 40 D0714 04:46:39.914681 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:39.914914 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:39.914990 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:39.915052 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 40 D0714 04:46:39.915077 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:39.914996 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 41 D0714 04:46:39.915112 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:39.915269 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:39.915290 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 41 D0714 04:46:39.915302 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:39.915800 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:39.915814 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:39.915822 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 42 D0714 04:46:39.915828 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 40 D0714 04:46:39.915831 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:39.915840 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:39.915849 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:39.915866 789113 usertrap_amd64.go:212] [ 12655(3061): 12659(3062)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:39.915866 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 42 D0714 04:46:39.915873 789113 usertrap_amd64.go:122] [ 12655(3061): 12659(3062)] Allocate a new trap: 0xc001aa8270 43 D0714 04:46:39.915878 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:39.915882 789113 usertrap_amd64.go:225] [ 12655(3061): 12659(3062)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:39.915970 789113 usertrap_amd64.go:212] [ 12656(3485): 12660(3486)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:39.915989 789113 usertrap_amd64.go:122] [ 12656(3485): 12660(3486)] Allocate a new trap: 0xc0032004e0 43 D0714 04:46:39.915998 789113 usertrap_amd64.go:225] [ 12656(3485): 12660(3486)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:39.916144 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:39.916163 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 41 D0714 04:46:39.916175 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:39.916833 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:39.916859 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 42 D0714 04:46:39.916869 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:39.917181 789113 usertrap_amd64.go:212] [ 12658(2994): 12661(2995)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:39.917203 789113 usertrap_amd64.go:122] [ 12658(2994): 12661(2995)] Allocate a new trap: 0xc00113c930 43 D0714 04:46:39.917212 789113 usertrap_amd64.go:225] [ 12658(2994): 12661(2995)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:39.923093 789113 usertrap_amd64.go:212] [ 12656(3485): 12656(3485)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:39.923127 789113 usertrap_amd64.go:122] [ 12656(3485): 12656(3485)] Allocate a new trap: 0xc0032004e0 44 D0714 04:46:39.923138 789113 usertrap_amd64.go:225] [ 12656(3485): 12656(3485)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:39.931762 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:39.931801 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 37 D0714 04:46:39.931922 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:39.932612 789113 task_exit.go:204] [ 12656(3485): 12656(3485)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.932652 789113 task_exit.go:204] [ 12656(3485): 12656(3485)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.932678 789113 task_signals.go:204] [ 12656(3485): 12660(3486)] Signal 12656, PID: 12660, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.932693 789113 task_exit.go:204] [ 12656(3485): 12660(3486)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.932704 789113 task_exit.go:204] [ 12656(3485): 12660(3486)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.932711 789113 task_exit.go:204] [ 12656(3485): 12660(3486)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.932740 789113 task_signals.go:204] [ 12656(3485): 12665(3487)] Signal 12656, PID: 12665, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.932764 789113 task_exit.go:204] [ 12656(3485): 12665(3487)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.932774 789113 task_exit.go:204] [ 12656(3485): 12665(3487)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.932784 789113 task_exit.go:204] [ 12656(3485): 12665(3487)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.932798 789113 task_signals.go:204] [ 12656(3485): 12666(3488)] Signal 12656, PID: 12666, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:39.932807 789113 task_exit.go:204] [ 12656(3485): 12666(3488)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:39.933183 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:39.933209 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 38 D0714 04:46:39.933222 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:39.933190 789113 task_exit.go:204] [ 12656(3485): 12666(3488)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:39.933284 789113 task_exit.go:204] [ 12656(3485): 12666(3488)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.933296 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:39.933346 789113 task_exit.go:204] [ 12656(3485): 12656(3485)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:39.938481 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:39.938541 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 39 D0714 04:46:39.938560 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) 04:46:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r3 = epoll_create(0x1) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000000c0)="e97137c1bc", 0x5) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) r5 = epoll_create(0x1) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) getpeername$packet(r7, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) r9 = epoll_create(0x1) fcntl$dupfd(r9, 0x0, r9) epoll_ctl$EPOLL_CTL_DEL(r8, 0x2, r9) getsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:39.942131 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:39.942164 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 40 D0714 04:46:39.942174 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:39.942346 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:39.942368 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 41 D0714 04:46:39.942381 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:39.943061 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:39.943101 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 42 D0714 04:46:39.943121 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:39.943146 789113 usertrap_amd64.go:212] [ 12657(3054): 12668(3055)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:39.943157 789113 usertrap_amd64.go:122] [ 12657(3054): 12668(3055)] Allocate a new trap: 0xc007cf8540 43 D0714 04:46:39.943166 789113 usertrap_amd64.go:225] [ 12657(3054): 12668(3055)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:39.944441 789113 usertrap_amd64.go:212] [ 12657(3054): 12668(3055)] Found the pattern at ip 558472d39719:sysno 257 D0714 04:46:39.944465 789113 usertrap_amd64.go:122] [ 12657(3054): 12668(3055)] Allocate a new trap: 0xc007cf8540 44 D0714 04:46:39.944474 789113 usertrap_amd64.go:225] [ 12657(3054): 12668(3055)] Apply the binary patch addr 558472d39719 trap addr 62dc0 ([184 1 1 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:39.945159 789113 usertrap_amd64.go:212] [ 12667(3489): 12667(3489)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:39.945223 789113 usertrap_amd64.go:122] [ 12667(3489): 12667(3489)] Allocate a new trap: 0xc0002aa9f0 37 D0714 04:46:39.945429 789113 usertrap_amd64.go:225] [ 12667(3489): 12667(3489)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:39.946695 789113 usertrap_amd64.go:212] [ 12667(3489): 12667(3489)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:39.946730 789113 usertrap_amd64.go:122] [ 12667(3489): 12667(3489)] Allocate a new trap: 0xc0002aa9f0 38 D0714 04:46:39.946768 789113 usertrap_amd64.go:225] [ 12667(3489): 12667(3489)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:39.968346 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:39.968388 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 44 D0714 04:46:39.968408 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:40.822155 789113 usertrap_amd64.go:212] [ 12655(3061): 12655(3061)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:40.822214 789113 usertrap_amd64.go:122] [ 12655(3061): 12655(3061)] Allocate a new trap: 0xc001aa8270 45 D0714 04:46:40.822230 789113 usertrap_amd64.go:225] [ 12655(3061): 12655(3061)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:40.823177 789113 task_exit.go:204] [ 12655(3061): 12655(3061)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:40.823222 789113 task_signals.go:204] [ 12655(3061): 12659(3062)] Signal 12655, PID: 12659, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:40.823253 789113 task_signals.go:204] [ 12655(3061): 12662(3063)] Signal 12655, PID: 12662, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:40.823261 789113 task_exit.go:204] [ 12655(3061): 12655(3061)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:40.823278 789113 task_exit.go:204] [ 12655(3061): 12659(3062)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:40.823306 789113 task_exit.go:204] [ 12655(3061): 12659(3062)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:40.823315 789113 task_exit.go:204] [ 12655(3061): 12659(3062)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:40.823330 789113 task_exit.go:204] [ 12655(3061): 12662(3063)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:41.178585 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.178729 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.182083 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.182224 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.196281 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.196427 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.196474 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.196581 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.208503 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.208661 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.208735 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.208761 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.214138 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.214265 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.219121 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.219279 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.219387 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.219475 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.229908 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.230035 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.230100 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.230142 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.665721 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.665804 789113 task_signals.go:179] [ 7: 10169] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.665826 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.665828 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.665875 789113 task_exit.go:204] [ 12655(3061): 12662(3063)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:41.665938 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.665948 789113 task_exit.go:204] [ 12655(3061): 12662(3063)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:41.666061 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:41.666137 789113 task_exit.go:204] [ 12655(3061): 12655(3061)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:41.666707 789113 task_signals.go:470] [ 7: 39] Notified of signal 23 D0714 04:46:41.666779 789113 task_signals.go:220] [ 7: 39] Signal 23: delivering to handler D0714 04:46:41.666935 789113 task_signals.go:470] [ 7: 18] Notified of signal 23 D0714 04:46:41.667026 789113 task_signals.go:220] [ 7: 18] Signal 23: delivering to handler D0714 04:46:41.668047 789113 task_signals.go:470] [ 7: 30] Notified of signal 23 D0714 04:46:41.668106 789113 task_signals.go:470] [ 7: 33] Notified of signal 23 D0714 04:46:41.668180 789113 task_signals.go:220] [ 7: 33] Signal 23: delivering to handler D0714 04:46:41.669827 789113 task_signals.go:470] [ 7: 5229] Notified of signal 23 D0714 04:46:41.669877 789113 task_signals.go:470] [ 7: 11] Notified of signal 23 D0714 04:46:41.669891 789113 task_signals.go:470] [ 7: 33] Notified of signal 23 D0714 04:46:41.669914 789113 task_signals.go:470] [ 7: 39] Notified of signal 23 D0714 04:46:41.669948 789113 task_signals.go:470] [ 7: 5231] Notified of signal 23 D0714 04:46:41.669982 789113 task_signals.go:470] [ 7: 31] Notified of signal 23 D0714 04:46:41.670004 789113 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0714 04:46:41.670052 789113 task_signals.go:220] [ 7: 33] Signal 23: delivering to handler D0714 04:46:41.670136 789113 task_signals.go:470] [ 7: 11855] Notified of signal 23 D0714 04:46:41.670185 789113 task_signals.go:470] [ 7: 17] Notified of signal 23 D0714 04:46:41.670217 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.670242 789113 task_signals.go:470] [ 7: 5227] Notified of signal 23 D0714 04:46:41.670254 789113 task_signals.go:220] [ 7: 11855] Signal 23: delivering to handler D0714 04:46:41.670260 789113 task_signals.go:470] [ 7: 43] Notified of signal 23 D0714 04:46:41.670300 789113 task_signals.go:220] [ 7: 39] Signal 23: delivering to handler D0714 04:46:41.670310 789113 task_signals.go:220] [ 7: 43] Signal 23: delivering to handler D0714 04:46:41.670345 789113 task_signals.go:220] [ 7: 5229] Signal 23: delivering to handler D0714 04:46:41.670349 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.670392 789113 task_signals.go:470] [ 7: 49] Notified of signal 23 D0714 04:46:41.670326 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.670442 789113 task_signals.go:470] [ 7: 32] Notified of signal 23 D0714 04:46:41.670434 789113 task_signals.go:220] [ 7: 49] Signal 23: delivering to handler D0714 04:46:41.670481 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.670504 789113 task_signals.go:220] [ 7: 32] Signal 23: delivering to handler D0714 04:46:41.670557 789113 task_signals.go:470] [ 7: 5410] Notified of signal 23 D0714 04:46:41.670593 789113 task_signals.go:470] [ 7: 25] Notified of signal 23 D0714 04:46:41.670614 789113 task_signals.go:220] [ 7: 5231] Signal 23: delivering to handler D0714 04:46:41.670612 789113 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0714 04:46:41.670629 789113 task_signals.go:470] [ 7: 5230] Notified of signal 23 D0714 04:46:41.670647 789113 task_signals.go:470] [ 7: 5232] Notified of signal 23 D0714 04:46:41.670658 789113 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0714 04:46:41.670673 789113 task_signals.go:470] [ 7: 11855] Notified of signal 23 D0714 04:46:41.670684 789113 task_signals.go:220] [ 7: 5230] Signal 23: delivering to handler D0714 04:46:41.670699 789113 task_signals.go:470] [ 7: 5231] Notified of signal 23 D0714 04:46:41.670735 789113 task_signals.go:220] [ 7: 5410] Signal 23: delivering to handler D0714 04:46:41.670765 789113 task_signals.go:470] [ 7: 5229] Notified of signal 23 D0714 04:46:41.670798 789113 task_signals.go:179] [ 7: 11855] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.670804 789113 task_signals.go:220] [ 7: 5231] Signal 23: delivering to handler D0714 04:46:41.670694 789113 task_signals.go:220] [ 7: 5227] Signal 23: delivering to handler D0714 04:46:41.670807 789113 task_signals.go:220] [ 7: 11855] Signal 23: delivering to handler D0714 04:46:41.670817 789113 task_signals.go:470] [ 7: 32] Notified of signal 23 D0714 04:46:41.670923 789113 task_signals.go:179] [ 7: 32] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.670944 789113 task_signals.go:220] [ 7: 32] Signal 23: delivering to handler D0714 04:46:41.670975 789113 task_signals.go:179] [ 7: 5229] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671041 789113 task_signals.go:220] [ 7: 5229] Signal 23: delivering to handler D0714 04:46:41.671027 789113 task_signals.go:481] [ 7: 43] No task notified of signal 23 D0714 04:46:41.671069 789113 task_signals.go:481] [ 7: 5410] No task notified of signal 23 D0714 04:46:41.671089 789113 task_signals.go:470] [ 7: 10169] Notified of signal 23 D0714 04:46:41.671107 789113 task_signals.go:220] [ 7: 43] Signal 23: delivering to handler D0714 04:46:41.671129 789113 task_signals.go:179] [ 7: 5232] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671137 789113 task_signals.go:220] [ 7: 5232] Signal 23: delivering to handler D0714 04:46:41.671155 789113 task_signals.go:220] [ 7: 30] Signal 23: delivering to handler D0714 04:46:41.671162 789113 task_signals.go:179] [ 7: 10169] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671186 789113 task_signals.go:220] [ 7: 10169] Signal 23: delivering to handler D0714 04:46:41.671191 789113 task_signals.go:220] [ 7: 31] Signal 23: delivering to handler D0714 04:46:41.671228 789113 task_signals.go:220] [ 7: 5410] Signal 23: delivering to handler D0714 04:46:41.671313 789113 task_signals.go:470] [ 7: 35] Notified of signal 23 D0714 04:46:41.671341 789113 task_signals.go:179] [ 7: 35] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671350 789113 task_signals.go:220] [ 7: 35] Signal 23: delivering to handler D0714 04:46:41.671350 789113 task_signals.go:470] [ 7: 31] Notified of signal 23 D0714 04:46:41.671397 789113 task_signals.go:220] [ 7: 31] Signal 23: delivering to handler D0714 04:46:41.671411 789113 task_signals.go:470] [ 7: 43] Notified of signal 23 D0714 04:46:41.671448 789113 task_signals.go:179] [ 7: 43] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671465 789113 task_signals.go:220] [ 7: 43] Signal 23: delivering to handler D0714 04:46:41.671475 789113 task_signals.go:470] [ 7: 30] Notified of signal 23 D0714 04:46:41.671496 789113 task_signals.go:179] [ 7: 30] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671515 789113 task_signals.go:220] [ 7: 30] Signal 23: delivering to handler D0714 04:46:41.671530 789113 task_signals.go:470] [ 7: 5227] Notified of signal 23 D0714 04:46:41.671564 789113 task_signals.go:179] [ 7: 5227] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.671574 789113 task_signals.go:220] [ 7: 5227] Signal 23: delivering to handler D0714 04:46:41.671787 789113 task_signals.go:470] [ 7: 5227] Notified of signal 23 D0714 04:46:41.671841 789113 task_signals.go:220] [ 7: 5227] Signal 23: delivering to handler D0714 04:46:41.672011 789113 task_signals.go:470] [ 7: 5227] Notified of signal 23 D0714 04:46:41.672056 789113 task_signals.go:179] [ 7: 5227] Restarting syscall 202: interrupted by signal 23 D0714 04:46:41.672065 789113 task_signals.go:220] [ 7: 5227] Signal 23: delivering to handler 04:46:41 executing program 1: ptrace$ARCH_GET_GS(0x1e, 0x0, &(0x7f0000000080), 0x1004) r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgrcv(r0, &(0x7f0000000000)={0x0, ""/117}, 0x7d, 0x1, 0x0) D0714 04:46:41.718450 789113 usertrap_amd64.go:212] [ 12658(2994): 12674(3000)] Found the pattern at ip 55e82c3ff719:sysno 257 D0714 04:46:41.718516 789113 usertrap_amd64.go:122] [ 12658(2994): 12674(3000)] Allocate a new trap: 0xc00113c930 44 D0714 04:46:41.718534 789113 usertrap_amd64.go:225] [ 12658(2994): 12674(3000)] Apply the binary patch addr 55e82c3ff719 trap addr 69dc0 ([184 1 1 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:41.719419 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:41.719508 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 45 D0714 04:46:41.719534 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c42bf2e trap addr 69e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:41.770165 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:41.770250 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 45 D0714 04:46:41.770270 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d65f2e trap addr 62e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:41.821369 789113 usertrap_amd64.go:212] [ 12658(2994): 12658(2994)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:41.821437 789113 usertrap_amd64.go:122] [ 12658(2994): 12658(2994)] Allocate a new trap: 0xc00113c930 46 D0714 04:46:41.821458 789113 usertrap_amd64.go:225] [ 12658(2994): 12658(2994)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 158 6 0]) D0714 04:46:41.821684 789113 task_exit.go:204] [ 12658(2994): 12658(2994)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:41.821723 789113 task_exit.go:204] [ 12658(2994): 12658(2994)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:41.821758 789113 task_signals.go:204] [ 12658(2994): 12661(2995)] Signal 12658, PID: 12661, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:41.821777 789113 task_exit.go:204] [ 12658(2994): 12661(2995)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:41.821787 789113 task_exit.go:204] [ 12658(2994): 12661(2995)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:41.821793 789113 task_exit.go:204] [ 12658(2994): 12661(2995)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:41.821828 789113 task_signals.go:204] [ 12658(2994): 12674(3000)] Signal 12658, PID: 12674, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:41.821854 789113 task_exit.go:204] [ 12658(2994): 12674(3000)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:41.821879 789113 task_exit.go:204] [ 12658(2994): 12674(3000)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:41.821884 789113 task_exit.go:204] [ 12658(2994): 12674(3000)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:41.870739 789113 usertrap_amd64.go:212] [ 12657(3054): 12657(3054)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:41.870803 789113 usertrap_amd64.go:122] [ 12657(3054): 12657(3054)] Allocate a new trap: 0xc007cf8540 46 D0714 04:46:41.870827 789113 usertrap_amd64.go:225] [ 12657(3054): 12657(3054)] Apply the binary patch addr 558472d39a13 trap addr 62e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 46 6 0]) D0714 04:46:41.871228 789113 task_exit.go:204] [ 12657(3054): 12657(3054)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:41.871374 789113 task_exit.go:204] [ 12657(3054): 12657(3054)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:42.953882 789113 task_signals.go:481] [ 12658(2994): 12658(2994)] No task notified of signal 9 D0714 04:46:42.953929 789113 task_signals.go:481] [ 12667(3489): 12667(3489)] No task notified of signal 9 D0714 04:46:42.953968 789113 task_signals.go:458] [ 12667(3489): 12667(3489)] Discarding duplicate signal 9 D0714 04:46:42.953978 789113 task_signals.go:458] [ 12658(2994): 12658(2994)] Discarding duplicate signal 9 D0714 04:46:42.954081 789113 task_signals.go:481] [ 12657(3054): 12657(3054)] No task notified of signal 9 D0714 04:46:42.954218 789113 task_signals.go:458] [ 12657(3054): 12657(3054)] Discarding duplicate signal 9 D0714 04:46:45.850400 789113 task_signals.go:204] [ 12667(3489): 12667(3489)] Signal 12667, PID: 12667, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850455 789113 task_signals.go:204] [ 12658(2994): 12663(2996)] Signal 12658, PID: 12663, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850429 789113 task_signals.go:204] [ 12657(3054): 12668(3055)] Signal 12657, PID: 12668, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850466 789113 task_exit.go:204] [ 12667(3489): 12667(3489)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850506 789113 task_signals.go:204] [ 12658(2994): 12669(2998)] Signal 12658, PID: 12669, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850509 789113 task_signals.go:204] [ 12657(3054): 12675(3059)] Signal 12657, PID: 12675, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850516 789113 task_signals.go:204] [ 12657(3054): 12671(3057)] Signal 12657, PID: 12671, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850534 789113 task_signals.go:204] [ 12658(2994): 12664(2997)] Signal 12658, PID: 12664, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850607 789113 task_signals.go:204] [ 12658(2994): 12673(2999)] Signal 12658, PID: 12673, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850637 789113 task_signals.go:204] [ 12657(3054): 12670(3056)] Signal 12657, PID: 12670, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850639 789113 task_signals.go:204] [ 12657(3054): 12672(3058)] Signal 12657, PID: 12672, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:45.850649 789113 task_exit.go:204] [ 12658(2994): 12673(2999)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850689 789113 task_exit.go:204] [ 12658(2994): 12673(2999)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850705 789113 task_exit.go:204] [ 12658(2994): 12673(2999)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850730 789113 task_exit.go:204] [ 12658(2994): 12663(2996)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850760 789113 task_exit.go:204] [ 12658(2994): 12663(2996)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850768 789113 task_exit.go:204] [ 12658(2994): 12663(2996)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850808 789113 task_exit.go:204] [ 12657(3054): 12670(3056)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850845 789113 task_exit.go:204] [ 12657(3054): 12670(3056)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850853 789113 task_exit.go:204] [ 12657(3054): 12670(3056)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850867 789113 task_exit.go:204] [ 12657(3054): 12668(3055)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850881 789113 task_exit.go:204] [ 12657(3054): 12668(3055)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850888 789113 task_exit.go:204] [ 12657(3054): 12668(3055)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850899 789113 task_exit.go:204] [ 12658(2994): 12669(2998)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850911 789113 task_exit.go:204] [ 12658(2994): 12669(2998)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850929 789113 task_exit.go:204] [ 12658(2994): 12669(2998)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850945 789113 task_exit.go:204] [ 12657(3054): 12675(3059)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.850958 789113 task_exit.go:204] [ 12657(3054): 12675(3059)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.850971 789113 task_exit.go:204] [ 12657(3054): 12675(3059)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.850981 789113 task_exit.go:204] [ 12657(3054): 12671(3057)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.851028 789113 task_exit.go:204] [ 12657(3054): 12671(3057)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.851045 789113 task_exit.go:204] [ 12657(3054): 12671(3057)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.851063 789113 task_exit.go:204] [ 12658(2994): 12664(2997)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.851158 789113 task_exit.go:204] [ 12657(3054): 12672(3058)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:45.851297 789113 task_exit.go:204] [ 12667(3489): 12667(3489)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.851329 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:45.851350 789113 task_exit.go:204] [ 12667(3489): 12667(3489)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.851516 789113 task_exit.go:204] [ 12658(2994): 12664(2997)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.851538 789113 task_exit.go:204] [ 12658(2994): 12664(2997)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.851553 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:45.851570 789113 task_exit.go:204] [ 12658(2994): 12658(2994)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.851675 789113 task_exit.go:204] [ 12657(3054): 12672(3058)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:45.851705 789113 task_exit.go:204] [ 12657(3054): 12672(3058)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:45.851720 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:45.851736 789113 task_exit.go:204] [ 12657(3054): 12657(3054)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) r3 = epoll_create(0x1) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000000c0)="e97137c1bc", 0x5) (async) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) r5 = epoll_create(0x1) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) getpeername$packet(r7, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) (async) r9 = epoll_create(0x1) fcntl$dupfd(r9, 0x0, r9) (async) epoll_ctl$EPOLL_CTL_DEL(r8, 0x2, r9) (async) getsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:46:45 executing program 2: rt_sigsuspend(&(0x7f0000002200)={[0x1]}, 0x8) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000fcffffffffffffff000000000000001f660000000000000040000000000000003d020000000000000800000000003800"/120], 0x78) (async, rerun: 32) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x100, 0x8}) (rerun: 32) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r1, &(0x7f00000000c0)='attr/exec\x00') 04:46:45 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) tkill(0x0, 0x1004000000015) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) tkill(0x0, 0x1004000000015) (async) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) D0714 04:46:46.371131 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:46.371206 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 37 D0714 04:46:46.371355 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:46.372157 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:46.372209 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 37 D0714 04:46:46.372346 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:46.373464 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:46.373504 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 38 D0714 04:46:46.373516 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:46.374764 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:46.374890 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 37 D0714 04:46:46.374994 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:46.375952 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:46.376062 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 37 D0714 04:46:46.376199 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:46.376671 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:46.376708 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 38 D0714 04:46:46.376722 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:46.377173 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:46.377197 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 38 D0714 04:46:46.377208 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:46.377366 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:46.377402 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 39 D0714 04:46:46.377415 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:46.379709 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:46.379742 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 38 D0714 04:46:46.379754 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:46.380528 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:46.380550 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 40 D0714 04:46:46.380561 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:46.380775 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:46.380794 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 41 D0714 04:46:46.380804 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:46.381245 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:46.381272 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 42 D0714 04:46:46.381284 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:46.381469 789113 usertrap_amd64.go:212] [ 12676(3490): 12680(3491)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:46.381500 789113 usertrap_amd64.go:122] [ 12676(3490): 12680(3491)] Allocate a new trap: 0xc005fe0780 43 D0714 04:46:46.381509 789113 usertrap_amd64.go:225] [ 12676(3490): 12680(3491)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:46.381596 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:46.381625 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 39 D0714 04:46:46.381638 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:46.383504 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:46.383526 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 39 D0714 04:46:46.383535 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:46.384478 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:46.384499 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 39 D0714 04:46:46.384507 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:46.387178 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:46.387280 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 40 D0714 04:46:46.387296 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:46.387557 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:46.387653 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 41 D0714 04:46:46.387705 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:46.388038 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:46.388069 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 40 D0714 04:46:46.388078 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:46.388254 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:46.388341 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 41 D0714 04:46:46.388298 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:46.388363 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:46.388372 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 42 D0714 04:46:46.388391 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:46.388415 789113 usertrap_amd64.go:212] [ 12677(3060): 12682(3061)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:46.388432 789113 usertrap_amd64.go:122] [ 12677(3060): 12682(3061)] Allocate a new trap: 0xc0070f88a0 43 D0714 04:46:46.388440 789113 usertrap_amd64.go:225] [ 12677(3060): 12682(3061)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:46.389073 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:46.389098 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 42 D0714 04:46:46.389109 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:46.389415 789113 usertrap_amd64.go:212] [ 12678(3064): 12683(3065)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:46.389444 789113 usertrap_amd64.go:122] [ 12678(3064): 12683(3065)] Allocate a new trap: 0xc003200810 43 D0714 04:46:46.389456 789113 usertrap_amd64.go:225] [ 12678(3064): 12683(3065)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:46.389463 789113 usertrap_amd64.go:212] [ 12677(3060): 12682(3061)] Found the pattern at ip 558472d39719:sysno 257 D0714 04:46:46.389477 789113 usertrap_amd64.go:122] [ 12677(3060): 12682(3061)] Allocate a new trap: 0xc0070f88a0 44 D0714 04:46:46.389487 789113 usertrap_amd64.go:225] [ 12677(3060): 12682(3061)] Apply the binary patch addr 558472d39719 trap addr 62dc0 ([184 1 1 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:46.391964 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:46.391993 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 40 D0714 04:46:46.392003 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:46.392568 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:46.392598 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 41 D0714 04:46:46.392617 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:46.393110 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:46.393131 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 42 D0714 04:46:46.393139 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:46.393266 789113 usertrap_amd64.go:212] [ 12679(3001): 12684(3002)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:46.393285 789113 usertrap_amd64.go:122] [ 12679(3001): 12684(3002)] Allocate a new trap: 0xc007dfa240 43 D0714 04:46:46.393292 789113 usertrap_amd64.go:225] [ 12679(3001): 12684(3002)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:46.436061 789113 usertrap_amd64.go:212] [ 12676(3490): 12676(3490)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:46.436113 789113 usertrap_amd64.go:122] [ 12676(3490): 12676(3490)] Allocate a new trap: 0xc005fe0780 44 D0714 04:46:46.436131 789113 usertrap_amd64.go:225] [ 12676(3490): 12676(3490)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:46.442718 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:46.442778 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 44 D0714 04:46:46.442801 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:46.446385 789113 task_exit.go:204] [ 12676(3490): 12676(3490)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:46.446449 789113 task_exit.go:204] [ 12676(3490): 12676(3490)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:46.446472 789113 task_signals.go:204] [ 12676(3490): 12685(3493)] Signal 12676, PID: 12685, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:46.446486 789113 task_exit.go:204] [ 12676(3490): 12685(3493)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:46.446470 789113 task_signals.go:204] [ 12676(3490): 12681(3492)] Signal 12676, PID: 12681, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:46.446529 789113 task_signals.go:204] [ 12676(3490): 12680(3491)] Signal 12676, PID: 12680, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:46.446581 789113 task_exit.go:204] [ 12676(3490): 12680(3491)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:46.446609 789113 task_exit.go:204] [ 12676(3490): 12680(3491)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:46.446631 789113 task_exit.go:204] [ 12676(3490): 12680(3491)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:46.446648 789113 task_exit.go:204] [ 12676(3490): 12681(3492)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:46.446728 789113 task_exit.go:204] [ 12676(3490): 12685(3493)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:46.446812 789113 task_exit.go:204] [ 12676(3490): 12685(3493)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:46.447030 789113 task_exit.go:204] [ 12676(3490): 12681(3492)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:46.447057 789113 task_exit.go:204] [ 12676(3490): 12681(3492)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:46.447100 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:46.448373 789113 task_exit.go:204] [ 12676(3490): 12676(3490)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) (async) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) epoll_create(0x1) (async) r3 = epoll_create(0x1) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000000c0)="e97137c1bc", 0x5) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) epoll_create(0x1) (async) r5 = epoll_create(0x1) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) getpeername$packet(r7, 0x0, 0x0) (async) getpeername$packet(r7, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) epoll_create(0x1) (async) r9 = epoll_create(0x1) fcntl$dupfd(r9, 0x0, r9) (async) fcntl$dupfd(r9, 0x0, r9) epoll_ctl$EPOLL_CTL_DEL(r8, 0x2, r9) getsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:46.497988 789113 usertrap_amd64.go:212] [ 12679(3001): 12689(3005)] Found the pattern at ip 55e82c3ff719:sysno 257 D0714 04:46:46.498032 789113 usertrap_amd64.go:122] [ 12679(3001): 12689(3005)] Allocate a new trap: 0xc007dfa240 44 D0714 04:46:46.498046 789113 usertrap_amd64.go:225] [ 12679(3001): 12689(3005)] Apply the binary patch addr 55e82c3ff719 trap addr 69dc0 ([184 1 1 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:46.499313 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:46.499373 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 45 D0714 04:46:46.499395 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c42bf2e trap addr 69e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:46.549747 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:46.549794 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 45 D0714 04:46:46.549810 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d65f2e trap addr 62e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:47.105234 789113 task_signals.go:470] [ 7: 31] Notified of signal 23 D0714 04:46:47.105441 789113 task_signals.go:220] [ 7: 31] Signal 23: delivering to handler D0714 04:46:47.213080 789113 usertrap_amd64.go:212] [ 12679(3001): 12679(3001)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:47.213121 789113 usertrap_amd64.go:122] [ 12679(3001): 12679(3001)] Allocate a new trap: 0xc007dfa240 46 D0714 04:46:47.213143 789113 usertrap_amd64.go:225] [ 12679(3001): 12679(3001)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 158 6 0]) D0714 04:46:47.213929 789113 task_exit.go:204] [ 12679(3001): 12679(3001)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.213979 789113 task_signals.go:204] [ 12679(3001): 12689(3005)] Signal 12679, PID: 12689, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:47.213984 789113 task_signals.go:204] [ 12679(3001): 12684(3002)] Signal 12679, PID: 12684, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:47.214010 789113 task_exit.go:204] [ 12679(3001): 12679(3001)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.214026 789113 task_exit.go:204] [ 12679(3001): 12689(3005)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.214038 789113 task_exit.go:204] [ 12679(3001): 12689(3005)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.214045 789113 task_exit.go:204] [ 12679(3001): 12689(3005)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:47.214058 789113 task_exit.go:204] [ 12679(3001): 12684(3002)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.214067 789113 task_exit.go:204] [ 12679(3001): 12684(3002)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.214073 789113 task_exit.go:204] [ 12679(3001): 12684(3002)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:47.214532 789113 usertrap_amd64.go:212] [ 12677(3060): 12677(3060)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:47.214550 789113 usertrap_amd64.go:122] [ 12677(3060): 12677(3060)] Allocate a new trap: 0xc0070f88a0 46 D0714 04:46:47.214565 789113 usertrap_amd64.go:225] [ 12677(3060): 12677(3060)] Apply the binary patch addr 558472d39a13 trap addr 62e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 46 6 0]) D0714 04:46:47.214830 789113 task_exit.go:204] [ 12677(3060): 12677(3060)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.214843 789113 task_exit.go:204] [ 12677(3060): 12677(3060)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.218927 789113 usertrap_amd64.go:212] [ 12678(3064): 12678(3064)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:47.218947 789113 usertrap_amd64.go:122] [ 12678(3064): 12678(3064)] Allocate a new trap: 0xc003200810 45 D0714 04:46:47.218959 789113 usertrap_amd64.go:225] [ 12678(3064): 12678(3064)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:47.220529 789113 task_exit.go:204] [ 12678(3064): 12678(3064)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.220568 789113 task_signals.go:204] [ 12678(3064): 12683(3065)] Signal 12678, PID: 12683, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:47.220571 789113 task_exit.go:204] [ 12678(3064): 12678(3064)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.220592 789113 task_exit.go:204] [ 12678(3064): 12683(3065)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:47.220982 789113 task_exit.go:204] [ 12678(3064): 12683(3065)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:47.221007 789113 task_exit.go:204] [ 12678(3064): 12683(3065)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:47.221020 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:47.225444 789113 task_exit.go:204] [ 12678(3064): 12678(3064)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:47 executing program 1: ptrace$ARCH_GET_GS(0x1e, 0x0, &(0x7f0000000080), 0x1004) r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgrcv(r0, &(0x7f0000000000)={0x0, ""/117}, 0x7d, 0x1, 0x0) ptrace$ARCH_GET_GS(0x1e, 0x0, &(0x7f0000000080), 0x1004) (async) msgget$private(0x0, 0x0) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) msgrcv(r0, &(0x7f0000000000)={0x0, ""/117}, 0x7d, 0x1, 0x0) (async) D0714 04:46:49.360310 789113 task_signals.go:481] [ 12679(3001): 12679(3001)] No task notified of signal 9 D0714 04:46:49.360510 789113 task_signals.go:458] [ 12679(3001): 12679(3001)] Discarding duplicate signal 9 D0714 04:46:49.368926 789113 task_signals.go:481] [ 12677(3060): 12677(3060)] No task notified of signal 9 D0714 04:46:49.369024 789113 task_signals.go:458] [ 12677(3060): 12677(3060)] Discarding duplicate signal 9 D0714 04:46:51.077177 789113 task_signals.go:204] [ 12679(3001): 12687(3003)] Signal 12679, PID: 12687, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077247 789113 task_exit.go:204] [ 12679(3001): 12687(3003)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.077251 789113 task_signals.go:204] [ 12679(3001): 12688(3004)] Signal 12679, PID: 12688, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077222 789113 task_signals.go:204] [ 12677(3060): 12694(3067)] Signal 12677, PID: 12694, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077285 789113 task_exit.go:204] [ 12679(3001): 12688(3004)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.077332 789113 task_signals.go:204] [ 12677(3060): 12682(3061)] Signal 12677, PID: 12682, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077375 789113 task_signals.go:204] [ 12677(3060): 12686(3062)] Signal 12677, PID: 12686, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077398 789113 task_exit.go:204] [ 12677(3060): 12682(3061)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.077426 789113 task_signals.go:204] [ 12677(3060): 12691(3064)] Signal 12677, PID: 12691, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.077177 789113 task_signals.go:204] [ 12677(3060): 12693(3066)] Signal 12677, PID: 12693, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.078667 789113 task_signals.go:204] [ 12677(3060): 12690(3063)] Signal 12677, PID: 12690, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.078712 789113 task_signals.go:204] [ 12677(3060): 12692(3065)] Signal 12677, PID: 12692, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.078722 789113 task_exit.go:204] [ 12679(3001): 12687(3003)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078731 789113 task_exit.go:204] [ 12679(3001): 12687(3003)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.078763 789113 task_exit.go:204] [ 12677(3060): 12686(3062)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.078771 789113 task_exit.go:204] [ 12677(3060): 12694(3067)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.078784 789113 task_exit.go:204] [ 12677(3060): 12691(3064)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.078800 789113 task_exit.go:204] [ 12677(3060): 12693(3066)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.078822 789113 task_exit.go:204] [ 12679(3001): 12688(3004)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078838 789113 task_exit.go:204] [ 12679(3001): 12688(3004)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.078847 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:51.078873 789113 task_exit.go:204] [ 12677(3060): 12682(3061)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078893 789113 task_exit.go:204] [ 12677(3060): 12682(3061)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.078913 789113 task_exit.go:204] [ 12677(3060): 12686(3062)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078927 789113 task_exit.go:204] [ 12677(3060): 12686(3062)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.078943 789113 task_exit.go:204] [ 12677(3060): 12694(3067)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078957 789113 task_exit.go:204] [ 12677(3060): 12694(3067)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.078976 789113 task_exit.go:204] [ 12677(3060): 12691(3064)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.078990 789113 task_exit.go:204] [ 12677(3060): 12691(3064)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.079001 789113 task_exit.go:204] [ 12677(3060): 12693(3066)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.079014 789113 task_exit.go:204] [ 12677(3060): 12693(3066)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.079028 789113 task_exit.go:204] [ 12677(3060): 12690(3063)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.079044 789113 task_exit.go:204] [ 12677(3060): 12690(3063)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.079051 789113 task_exit.go:204] [ 12677(3060): 12690(3063)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.079070 789113 task_exit.go:204] [ 12679(3001): 12679(3001)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.079106 789113 task_exit.go:204] [ 12677(3060): 12692(3065)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.084218 789113 task_exit.go:204] [ 12677(3060): 12692(3065)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.084273 789113 task_exit.go:204] [ 12677(3060): 12692(3065)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.084288 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:51.084466 789113 task_exit.go:204] [ 12677(3060): 12677(3060)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:51 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0x1003, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) 04:46:51 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000180), &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0xc1, 0x1) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'erspan0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x80, 0x0, 0x55, 0x2, {{0x6, 0x4, 0x0, 0x5, 0x18, 0x68, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2c}, {[@noop]}}}}}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:46:51.623514 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:51.623576 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 37 D0714 04:46:51.623726 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:51.624752 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:51.624777 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 38 D0714 04:46:51.624791 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:51.626897 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:51.626920 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 37 D0714 04:46:51.627033 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:51.633303 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:51.633330 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 37 D0714 04:46:51.633442 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:51.634432 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:51.634467 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 39 D0714 04:46:51.634487 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:51.634810 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:51.634843 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 38 D0714 04:46:51.634859 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:51.635184 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:51.635206 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 38 D0714 04:46:51.635217 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:51.638439 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:51.638464 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 39 D0714 04:46:51.638474 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:51.640867 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:51.640902 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 37 D0714 04:46:51.640982 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:51.642223 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:51.642247 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 38 D0714 04:46:51.642255 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:51.643178 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:51.643312 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 39 D0714 04:46:51.643338 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:51.645436 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:51.645466 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 40 D0714 04:46:51.645487 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:51.645656 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:51.645676 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 41 D0714 04:46:51.645687 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:51.646156 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:51.646211 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 39 D0714 04:46:51.646228 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:51.646426 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:51.646451 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 42 D0714 04:46:51.646464 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:51.646847 789113 usertrap_amd64.go:212] [ 12696(3494): 12699(3495)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:51.646878 789113 usertrap_amd64.go:122] [ 12696(3494): 12699(3495)] Allocate a new trap: 0xc00113cab0 43 D0714 04:46:51.646896 789113 usertrap_amd64.go:225] [ 12696(3494): 12699(3495)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:51.650234 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:51.650262 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 40 D0714 04:46:51.650272 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:51.650410 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:51.650474 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 41 D0714 04:46:51.650518 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:51.651214 789113 usertrap_amd64.go:212] [ 12698(3006): 12698(3006)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:51.651278 789113 usertrap_amd64.go:122] [ 12698(3006): 12698(3006)] Allocate a new trap: 0xc0070f88d0 42 D0714 04:46:51.651313 789113 usertrap_amd64.go:225] [ 12698(3006): 12698(3006)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:51.651405 789113 usertrap_amd64.go:212] [ 12698(3006): 12701(3007)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:51.651432 789113 usertrap_amd64.go:122] [ 12698(3006): 12701(3007)] Allocate a new trap: 0xc0070f88d0 43 D0714 04:46:51.651441 789113 usertrap_amd64.go:225] [ 12698(3006): 12701(3007)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:51.652349 789113 task_signals.go:470] [ 12698(3006): 12701(3007)] Notified of signal 25 D0714 04:46:51.652388 789113 task_signals.go:204] [ 12698(3006): 12701(3007)] Signal 12698, PID: 12701, TID: 0, fault addr: 0x19: terminating thread group D0714 04:46:51.652413 789113 task_exit.go:204] [ 12698(3006): 12701(3007)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.652469 789113 task_exit.go:204] [ 12698(3006): 12701(3007)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.652504 789113 task_exit.go:204] [ 12698(3006): 12701(3007)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.652568 789113 task_signals.go:204] [ 12698(3006): 12698(3006)] Signal 12698, PID: 12698, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.652607 789113 task_exit.go:204] [ 12698(3006): 12698(3006)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.652891 789113 task_exit.go:204] [ 12698(3006): 12698(3006)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.652960 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:51.653084 789113 task_exit.go:204] [ 12698(3006): 12698(3006)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:51 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0x1003, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:51.654345 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:51.654429 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 40 D0714 04:46:51.654448 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:51.654737 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:51.654759 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 41 D0714 04:46:51.654769 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:51.655442 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:51.655469 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 42 D0714 04:46:51.655481 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:51.655578 789113 usertrap_amd64.go:212] [ 12697(3066): 12702(3067)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:51.655671 789113 usertrap_amd64.go:122] [ 12697(3066): 12702(3067)] Allocate a new trap: 0xc009ca6780 43 D0714 04:46:51.655695 789113 usertrap_amd64.go:225] [ 12697(3066): 12702(3067)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:51.656675 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:51.656740 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 40 D0714 04:46:51.656764 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:51.656949 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:51.657013 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 41 D0714 04:46:51.657045 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:51.657834 789113 usertrap_amd64.go:212] [ 12695(3068): 12704(3069)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:51.657867 789113 usertrap_amd64.go:122] [ 12695(3068): 12704(3069)] Allocate a new trap: 0xc0042c0d80 42 D0714 04:46:51.657882 789113 usertrap_amd64.go:225] [ 12695(3068): 12704(3069)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:51.658043 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:51.658134 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 43 D0714 04:46:51.658178 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:51.659315 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:51.659362 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 37 D0714 04:46:51.659526 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:51.660905 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:51.660992 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 38 D0714 04:46:51.661020 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:51.664356 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:51.664405 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 39 D0714 04:46:51.664419 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:51.668037 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:51.668054 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 40 D0714 04:46:51.668083 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:51.668221 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:51.668233 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 41 D0714 04:46:51.668244 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:51.668965 789113 usertrap_amd64.go:212] [ 12703(3008): 12703(3008)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:51.669015 789113 usertrap_amd64.go:122] [ 12703(3008): 12703(3008)] Allocate a new trap: 0xc0032a8150 42 D0714 04:46:51.669030 789113 usertrap_amd64.go:225] [ 12703(3008): 12703(3008)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:51.669342 789113 usertrap_amd64.go:212] [ 12703(3008): 12705(3009)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:51.669375 789113 usertrap_amd64.go:122] [ 12703(3008): 12705(3009)] Allocate a new trap: 0xc0032a8150 43 D0714 04:46:51.669505 789113 usertrap_amd64.go:225] [ 12703(3008): 12705(3009)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:51.671233 789113 task_signals.go:470] [ 12703(3008): 12706(3010)] Notified of signal 25 D0714 04:46:51.671320 789113 task_signals.go:204] [ 12703(3008): 12706(3010)] Signal 12703, PID: 12706, TID: 0, fault addr: 0x19: terminating thread group D0714 04:46:51.671354 789113 task_exit.go:204] [ 12703(3008): 12706(3010)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.671376 789113 task_exit.go:204] [ 12703(3008): 12706(3010)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.671384 789113 task_exit.go:204] [ 12703(3008): 12706(3010)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.671398 789113 task_signals.go:204] [ 12703(3008): 12703(3008)] Signal 12703, PID: 12703, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.671430 789113 task_exit.go:204] [ 12703(3008): 12703(3008)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.671440 789113 task_signals.go:204] [ 12703(3008): 12705(3009)] Signal 12703, PID: 12705, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.671453 789113 task_exit.go:204] [ 12703(3008): 12703(3008)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.671463 789113 task_exit.go:204] [ 12703(3008): 12705(3009)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.672016 789113 task_exit.go:204] [ 12703(3008): 12705(3009)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.672069 789113 task_exit.go:204] [ 12703(3008): 12705(3009)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.672080 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:51.672862 789113 task_exit.go:204] [ 12703(3008): 12703(3008)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:51 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0x1003, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) (async, rerun: 32) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) (rerun: 32) D0714 04:46:51.678592 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:51.678624 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 37 D0714 04:46:51.678724 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:51.679940 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:51.679965 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 38 D0714 04:46:51.679979 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:51.684835 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:51.684871 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 39 D0714 04:46:51.684894 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:51.687045 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:51.687076 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 40 D0714 04:46:51.687090 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:51.687252 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:51.687275 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 41 D0714 04:46:51.687294 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:51.687902 789113 usertrap_amd64.go:212] [ 12707(3011): 12707(3011)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:51.687974 789113 usertrap_amd64.go:122] [ 12707(3011): 12707(3011)] Allocate a new trap: 0xc003200960 42 D0714 04:46:51.688016 789113 usertrap_amd64.go:225] [ 12707(3011): 12707(3011)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:51.688225 789113 usertrap_amd64.go:212] [ 12707(3011): 12708(3012)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:51.688267 789113 usertrap_amd64.go:122] [ 12707(3011): 12708(3012)] Allocate a new trap: 0xc003200960 43 D0714 04:46:51.688285 789113 usertrap_amd64.go:225] [ 12707(3011): 12708(3012)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:51.688691 789113 task_signals.go:470] [ 12707(3011): 12708(3012)] Notified of signal 25 D0714 04:46:51.688742 789113 task_signals.go:204] [ 12707(3011): 12708(3012)] Signal 12707, PID: 12708, TID: 0, fault addr: 0x19: terminating thread group D0714 04:46:51.688762 789113 task_exit.go:204] [ 12707(3011): 12708(3012)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.688791 789113 task_exit.go:204] [ 12707(3011): 12708(3012)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.688800 789113 task_exit.go:204] [ 12707(3011): 12708(3012)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.688915 789113 task_signals.go:204] [ 12707(3011): 12707(3011)] Signal 12707, PID: 12707, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.688935 789113 task_exit.go:204] [ 12707(3011): 12707(3011)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.689296 789113 task_exit.go:204] [ 12707(3011): 12707(3011)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.689323 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:51.692894 789113 task_exit.go:204] [ 12707(3011): 12707(3011)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:51 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0xb4001, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f00000001c0)={{r2}, "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"}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:51.699851 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:51.700823 789113 usertrap_amd64.go:212] [ 12696(3494): 12696(3494)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:51.700884 789113 usertrap_amd64.go:122] [ 12696(3494): 12696(3494)] Allocate a new trap: 0xc00113cab0 44 D0714 04:46:51.700927 789113 usertrap_amd64.go:225] [ 12696(3494): 12696(3494)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:51.700859 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 37 D0714 04:46:51.701146 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:51.702194 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:51.702225 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 38 D0714 04:46:51.702242 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:51.709379 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:51.709412 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 39 D0714 04:46:51.709443 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:51.712282 789113 task_exit.go:204] [ 12696(3494): 12696(3494)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.712331 789113 task_exit.go:204] [ 12696(3494): 12696(3494)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.712388 789113 task_signals.go:204] [ 12696(3494): 12700(3496)] Signal 12696, PID: 12700, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.712416 789113 task_exit.go:204] [ 12696(3494): 12700(3496)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.712377 789113 task_signals.go:204] [ 12696(3494): 12699(3495)] Signal 12696, PID: 12699, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:51.712428 789113 task_exit.go:204] [ 12696(3494): 12700(3496)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.712451 789113 task_exit.go:204] [ 12696(3494): 12700(3496)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.712490 789113 task_exit.go:204] [ 12696(3494): 12699(3495)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:51.712888 789113 task_exit.go:204] [ 12696(3494): 12699(3495)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:51.712920 789113 task_exit.go:204] [ 12696(3494): 12699(3495)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.712932 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:51.713286 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:51.713323 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 40 D0714 04:46:51.713356 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:51.713600 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:51.713625 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 41 D0714 04:46:51.713635 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:51.713648 789113 task_exit.go:204] [ 12696(3494): 12696(3494)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:51.714448 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:51.714484 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 42 D0714 04:46:51.714501 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:51.714585 789113 usertrap_amd64.go:212] [ 12709(3013): 12711(3014)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:51.714622 789113 usertrap_amd64.go:122] [ 12709(3013): 12711(3014)] Allocate a new trap: 0xc005fe0810 43 D0714 04:46:51.714699 789113 usertrap_amd64.go:225] [ 12709(3013): 12711(3014)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:51.715729 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:51.715820 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 44 D0714 04:46:51.715842 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) 04:46:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000000)={0x0, @remote, 0x4e20, 0x2, 'lblcr\x00', 0x8, 0x8, 0x13}, 0x2c) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:51.767818 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:51.767881 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 44 D0714 04:46:51.767908 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:51.866293 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:51.866336 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 44 D0714 04:46:51.866354 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:46:52.462508 789113 usertrap_amd64.go:212] [ 12695(3068): 12695(3068)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:52.462565 789113 usertrap_amd64.go:122] [ 12695(3068): 12695(3068)] Allocate a new trap: 0xc0042c0d80 45 D0714 04:46:52.462583 789113 usertrap_amd64.go:225] [ 12695(3068): 12695(3068)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:52.463877 789113 task_exit.go:204] [ 12695(3068): 12695(3068)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.463938 789113 task_exit.go:204] [ 12695(3068): 12695(3068)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.470682 789113 usertrap_amd64.go:212] [ 12697(3066): 12697(3066)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:52.470720 789113 usertrap_amd64.go:122] [ 12697(3066): 12697(3066)] Allocate a new trap: 0xc009ca6780 45 D0714 04:46:52.470738 789113 usertrap_amd64.go:225] [ 12697(3066): 12697(3066)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:52.472405 789113 task_exit.go:204] [ 12697(3066): 12697(3066)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.472475 789113 task_signals.go:204] [ 12697(3066): 12712(3068)] Signal 12697, PID: 12712, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:52.472495 789113 task_exit.go:204] [ 12697(3066): 12697(3066)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.472511 789113 task_signals.go:204] [ 12697(3066): 12702(3067)] Signal 12697, PID: 12702, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:52.472523 789113 task_signals.go:204] [ 12697(3066): 12714(3070)] Signal 12697, PID: 12714, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:52.472533 789113 task_exit.go:204] [ 12697(3066): 12702(3067)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.472549 789113 task_signals.go:204] [ 12697(3066): 12713(3069)] Signal 12697, PID: 12713, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:52.472574 789113 task_exit.go:204] [ 12697(3066): 12702(3067)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.472580 789113 task_exit.go:204] [ 12697(3066): 12702(3067)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:52.472596 789113 task_exit.go:204] [ 12697(3066): 12714(3070)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.472606 789113 task_exit.go:204] [ 12697(3066): 12714(3070)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.472622 789113 task_exit.go:204] [ 12697(3066): 12714(3070)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:52.472638 789113 task_exit.go:204] [ 12697(3066): 12712(3068)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.472655 789113 task_exit.go:204] [ 12697(3066): 12712(3068)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.472677 789113 task_exit.go:204] [ 12697(3066): 12712(3068)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:52.472687 789113 task_exit.go:204] [ 12697(3066): 12713(3069)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.473142 789113 task_exit.go:204] [ 12697(3066): 12713(3069)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.473159 789113 task_exit.go:204] [ 12697(3066): 12713(3069)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:52.473168 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:52.474236 789113 task_exit.go:204] [ 12697(3066): 12697(3066)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:52 executing program 1: ptrace$ARCH_GET_GS(0x1e, 0x0, &(0x7f0000000080), 0x1004) (async) r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) msgrcv(r0, &(0x7f0000000000)={0x0, ""/117}, 0x7d, 0x1, 0x0) D0714 04:46:52.539094 789113 usertrap_amd64.go:212] [ 12709(3013): 12709(3013)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:52.539141 789113 usertrap_amd64.go:122] [ 12709(3013): 12709(3013)] Allocate a new trap: 0xc005fe0810 45 D0714 04:46:52.539155 789113 usertrap_amd64.go:225] [ 12709(3013): 12709(3013)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:52.543939 789113 task_exit.go:204] [ 12709(3013): 12709(3013)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.543985 789113 task_exit.go:204] [ 12709(3013): 12709(3013)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.544016 789113 task_signals.go:204] [ 12709(3013): 12716(3015)] Signal 12709, PID: 12716, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:52.544036 789113 task_exit.go:204] [ 12709(3013): 12716(3015)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:52.544044 789113 task_exit.go:204] [ 12709(3013): 12716(3015)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:52.544052 789113 task_exit.go:204] [ 12709(3013): 12716(3015)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.631116 789113 task_signals.go:481] [ 12695(3068): 12695(3068)] No task notified of signal 9 D0714 04:46:54.631226 789113 task_signals.go:458] [ 12695(3068): 12695(3068)] Discarding duplicate signal 9 D0714 04:46:54.697623 789113 task_signals.go:481] [ 12709(3013): 12709(3013)] No task notified of signal 9 D0714 04:46:54.697702 789113 task_signals.go:458] [ 12709(3013): 12709(3013)] Discarding duplicate signal 9 D0714 04:46:54.905231 789113 task_signals.go:204] [ 12709(3013): 12711(3014)] Signal 12709, PID: 12711, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:54.905312 789113 task_exit.go:204] [ 12709(3013): 12711(3014)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:54.905314 789113 task_signals.go:204] [ 12695(3068): 12704(3069)] Signal 12695, PID: 12704, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:54.905252 789113 task_signals.go:204] [ 12695(3068): 12717(3072)] Signal 12695, PID: 12717, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:54.905251 789113 task_signals.go:204] [ 12695(3068): 12710(3070)] Signal 12695, PID: 12710, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:54.905371 789113 task_signals.go:204] [ 12695(3068): 12715(3071)] Signal 12695, PID: 12715, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:54.905388 789113 task_exit.go:204] [ 12695(3068): 12717(3072)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:54.905423 789113 task_exit.go:204] [ 12695(3068): 12717(3072)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:54.905446 789113 task_exit.go:204] [ 12695(3068): 12717(3072)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.905477 789113 task_exit.go:204] [ 12695(3068): 12710(3070)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:54.905508 789113 task_exit.go:204] [ 12695(3068): 12710(3070)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:54.905516 789113 task_exit.go:204] [ 12695(3068): 12710(3070)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.905534 789113 task_exit.go:204] [ 12695(3068): 12715(3071)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:54.905544 789113 task_exit.go:204] [ 12695(3068): 12715(3071)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:54.905550 789113 task_exit.go:204] [ 12695(3068): 12715(3071)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.905561 789113 task_exit.go:204] [ 12695(3068): 12704(3069)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:54.905843 789113 task_exit.go:204] [ 12709(3013): 12711(3014)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:54.905882 789113 task_exit.go:204] [ 12709(3013): 12711(3014)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.905926 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:46:54.905982 789113 task_exit.go:204] [ 12709(3013): 12709(3013)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:54 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0xb4001, 0x0) (async) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f00000001c0)={{r2}, "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"}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:46:54.907090 789113 task_exit.go:204] [ 12695(3068): 12704(3069)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:54.907129 789113 task_exit.go:204] [ 12695(3068): 12704(3069)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:54.907151 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:46:54.907200 789113 task_exit.go:204] [ 12695(3068): 12695(3068)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:54 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000180), &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0xc1, 0x1) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'erspan0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x80, 0x0, 0x55, 0x2, {{0x6, 0x4, 0x0, 0x5, 0x18, 0x68, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2c}, {[@noop]}}}}}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000180), &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0xc1, 0x1) (async) epoll_create(0x1) (async) fcntl$dupfd(r1, 0x0, r1) (async) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'erspan0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x80, 0x0, 0x55, 0x2, {{0x6, 0x4, 0x0, 0x5, 0x18, 0x68, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2c}, {[@noop]}}}}}) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) D0714 04:46:55.383488 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:46:55.383530 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 37 D0714 04:46:55.383643 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:46:55.384095 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:46:55.384122 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 37 D0714 04:46:55.384224 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:46:55.384539 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:46:55.384607 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 38 D0714 04:46:55.384625 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:46:55.385070 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:46:55.385132 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 37 D0714 04:46:55.385145 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:46:55.385167 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 37 D0714 04:46:55.385270 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:46:55.385268 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:46:55.386324 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:46:55.386358 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 38 D0714 04:46:55.386371 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:46:55.386443 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:46:55.386468 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 38 D0714 04:46:55.386482 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:46:55.386659 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:46:55.386680 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 38 D0714 04:46:55.386696 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:46:55.390121 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:46:55.390157 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 39 D0714 04:46:55.390170 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:46:55.391820 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:46:55.391852 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 39 D0714 04:46:55.391875 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:46:55.393119 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:46:55.393148 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 40 D0714 04:46:55.393159 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:46:55.393320 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:46:55.393386 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 41 D0714 04:46:55.393407 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:46:55.394158 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:46:55.394185 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 42 D0714 04:46:55.394196 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:46:55.394380 789113 usertrap_amd64.go:212] [ 12718(3497): 12722(3498)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:46:55.394444 789113 usertrap_amd64.go:122] [ 12718(3497): 12722(3498)] Allocate a new trap: 0xc0032009f0 43 D0714 04:46:55.394496 789113 usertrap_amd64.go:225] [ 12718(3497): 12722(3498)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:46:55.394627 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:46:55.394653 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 40 D0714 04:46:55.394667 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:46:55.394858 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:46:55.394873 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 41 D0714 04:46:55.394885 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:46:55.395496 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:46:55.395523 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 42 D0714 04:46:55.395533 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:46:55.395553 789113 usertrap_amd64.go:212] [ 12720(3073): 12723(3074)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:46:55.395561 789113 usertrap_amd64.go:122] [ 12720(3073): 12723(3074)] Allocate a new trap: 0xc0070f8930 43 D0714 04:46:55.395569 789113 usertrap_amd64.go:225] [ 12720(3073): 12723(3074)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:46:55.397878 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:46:55.397901 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 39 D0714 04:46:55.397914 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:46:55.397928 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:46:55.397946 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 39 D0714 04:46:55.397958 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:46:55.399908 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:46:55.399967 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 40 D0714 04:46:55.399986 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:46:55.400285 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:46:55.400318 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 41 D0714 04:46:55.400331 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:46:55.400374 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:46:55.400395 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 40 D0714 04:46:55.400423 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:46:55.400647 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:46:55.400671 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 41 D0714 04:46:55.400837 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:46:55.400993 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:46:55.401029 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 42 D0714 04:46:55.401042 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:46:55.401192 789113 usertrap_amd64.go:212] [ 12721(3016): 12724(3017)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:46:55.401213 789113 usertrap_amd64.go:122] [ 12721(3016): 12724(3017)] Allocate a new trap: 0xc0042c0e10 43 D0714 04:46:55.401221 789113 usertrap_amd64.go:225] [ 12721(3016): 12724(3017)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:46:55.401503 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:46:55.401533 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 42 D0714 04:46:55.401546 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:46:55.401618 789113 usertrap_amd64.go:212] [ 12719(3071): 12725(3072)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:46:55.401638 789113 usertrap_amd64.go:122] [ 12719(3071): 12725(3072)] Allocate a new trap: 0xc0042c0de0 43 D0714 04:46:55.401647 789113 usertrap_amd64.go:225] [ 12719(3071): 12725(3072)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:46:55.504296 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:46:55.504358 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 44 D0714 04:46:55.504381 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:46:56.430068 789113 usertrap_amd64.go:212] [ 12721(3016): 12721(3016)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:46:56.430110 789113 usertrap_amd64.go:122] [ 12721(3016): 12721(3016)] Allocate a new trap: 0xc0042c0e10 45 D0714 04:46:56.430123 789113 usertrap_amd64.go:225] [ 12721(3016): 12721(3016)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:46:56.430763 789113 task_exit.go:204] [ 12721(3016): 12721(3016)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.430832 789113 task_exit.go:204] [ 12721(3016): 12721(3016)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.430856 789113 task_signals.go:204] [ 12721(3016): 12726(3018)] Signal 12721, PID: 12726, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.430873 789113 task_exit.go:204] [ 12721(3016): 12726(3018)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.430888 789113 task_exit.go:204] [ 12721(3016): 12726(3018)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.430894 789113 task_exit.go:204] [ 12721(3016): 12726(3018)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.430915 789113 usertrap_amd64.go:212] [ 12718(3497): 12718(3497)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:46:56.430942 789113 usertrap_amd64.go:122] [ 12718(3497): 12718(3497)] Allocate a new trap: 0xc0032009f0 44 D0714 04:46:56.430957 789113 usertrap_amd64.go:225] [ 12718(3497): 12718(3497)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:46:56.432341 789113 task_exit.go:204] [ 12718(3497): 12718(3497)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.432389 789113 task_exit.go:204] [ 12718(3497): 12718(3497)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.432415 789113 task_signals.go:204] [ 12718(3497): 12730(3499)] Signal 12718, PID: 12730, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.432429 789113 task_exit.go:204] [ 12718(3497): 12730(3499)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.432438 789113 task_exit.go:204] [ 12718(3497): 12730(3499)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.432444 789113 task_exit.go:204] [ 12718(3497): 12730(3499)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.432458 789113 task_signals.go:204] [ 12718(3497): 12722(3498)] Signal 12718, PID: 12722, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.432468 789113 task_exit.go:204] [ 12718(3497): 12722(3498)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.432936 789113 task_exit.go:204] [ 12718(3497): 12722(3498)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.432959 789113 task_exit.go:204] [ 12718(3497): 12722(3498)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.432977 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:46:56.433168 789113 task_exit.go:204] [ 12718(3497): 12718(3497)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:46:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) (async) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000000)={0x0, @remote, 0x4e20, 0x2, 'lblcr\x00', 0x8, 0x8, 0x13}, 0x2c) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:46:56.478556 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:46:56.478625 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 44 D0714 04:46:56.478649 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:46:56.580247 789113 usertrap_amd64.go:212] [ 12719(3071): 12719(3071)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:46:56.580312 789113 usertrap_amd64.go:122] [ 12719(3071): 12719(3071)] Allocate a new trap: 0xc0042c0de0 45 D0714 04:46:56.580333 789113 usertrap_amd64.go:225] [ 12719(3071): 12719(3071)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:46:56.581298 789113 task_exit.go:204] [ 12719(3071): 12719(3071)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.581337 789113 task_exit.go:204] [ 12719(3071): 12719(3071)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.581336 789113 task_signals.go:204] [ 12719(3071): 12725(3072)] Signal 12719, PID: 12725, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.581381 789113 task_exit.go:204] [ 12719(3071): 12725(3072)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.581400 789113 task_exit.go:204] [ 12719(3071): 12725(3072)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.581407 789113 task_exit.go:204] [ 12719(3071): 12725(3072)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.581363 789113 task_signals.go:204] [ 12719(3071): 12728(3073)] Signal 12719, PID: 12728, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.581424 789113 task_exit.go:204] [ 12719(3071): 12728(3073)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.581768 789113 task_exit.go:204] [ 12719(3071): 12728(3073)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.581793 789113 task_exit.go:204] [ 12719(3071): 12728(3073)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.581805 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:46:56.582624 789113 task_exit.go:204] [ 12719(3071): 12719(3071)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.584358 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:46:56.584386 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 44 D0714 04:46:56.584401 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) 04:46:56 executing program 1: r0 = msgget$private(0x0, 0x45) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x3, 0x3000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:46:56.686901 789113 usertrap_amd64.go:212] [ 12720(3073): 12720(3073)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:46:56.686965 789113 usertrap_amd64.go:122] [ 12720(3073): 12720(3073)] Allocate a new trap: 0xc0070f8930 45 D0714 04:46:56.686980 789113 usertrap_amd64.go:225] [ 12720(3073): 12720(3073)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:46:56.687765 789113 task_exit.go:204] [ 12720(3073): 12720(3073)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.687825 789113 task_exit.go:204] [ 12720(3073): 12720(3073)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.687854 789113 task_signals.go:204] [ 12720(3073): 12738(3083)] Signal 12720, PID: 12738, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.687873 789113 task_exit.go:204] [ 12720(3073): 12738(3083)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.687885 789113 task_exit.go:204] [ 12720(3073): 12738(3083)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.687869 789113 task_signals.go:204] [ 12720(3073): 12739(3084)] Signal 12720, PID: 12739, TID: 0, fault addr: 0x9: terminating thread group D0714 04:46:56.687904 789113 task_exit.go:204] [ 12720(3073): 12738(3083)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:56.687972 789113 task_exit.go:204] [ 12720(3073): 12739(3084)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:46:56.688006 789113 task_exit.go:204] [ 12720(3073): 12739(3084)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:46:56.688021 789113 task_exit.go:204] [ 12720(3073): 12739(3084)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:46:59.105260 789113 task_signals.go:470] [ 7: 5227] Notified of signal 23 D0714 04:46:59.105353 789113 task_signals.go:220] [ 7: 5227] Signal 23: delivering to handler D0714 04:46:59.539784 789113 task_signals.go:481] [ 12721(3016): 12721(3016)] No task notified of signal 9 D0714 04:46:59.539960 789113 task_signals.go:481] [ 12720(3073): 12720(3073)] No task notified of signal 9 D0714 04:46:59.540087 789113 task_signals.go:458] [ 12720(3073): 12720(3073)] Discarding duplicate signal 9 D0714 04:46:59.540203 789113 task_signals.go:458] [ 12721(3016): 12721(3016)] Discarding duplicate signal 9 D0714 04:47:00.583629 789113 task_signals.go:204] [ 12720(3073): 12734(3079)] Signal 12720, PID: 12734, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.583708 789113 task_exit.go:204] [ 12720(3073): 12734(3079)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.583691 789113 task_signals.go:204] [ 12720(3073): 12723(3074)] Signal 12720, PID: 12723, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.583754 789113 task_exit.go:204] [ 12720(3073): 12734(3079)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.583766 789113 task_exit.go:204] [ 12720(3073): 12734(3079)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.583783 789113 task_signals.go:204] [ 12720(3073): 12737(3082)] Signal 12720, PID: 12737, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.583807 789113 task_exit.go:204] [ 12720(3073): 12723(3074)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.583933 789113 task_exit.go:204] [ 12720(3073): 12723(3074)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.583970 789113 task_exit.go:204] [ 12720(3073): 12723(3074)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.584003 789113 task_exit.go:204] [ 12720(3073): 12737(3082)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.584020 789113 task_exit.go:204] [ 12720(3073): 12737(3082)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.584038 789113 task_exit.go:204] [ 12720(3073): 12737(3082)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.584065 789113 task_signals.go:204] [ 12720(3073): 12729(3075)] Signal 12720, PID: 12729, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.584088 789113 task_exit.go:204] [ 12720(3073): 12729(3075)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.584099 789113 task_exit.go:204] [ 12720(3073): 12729(3075)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.584105 789113 task_exit.go:204] [ 12720(3073): 12729(3075)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.583794 789113 task_signals.go:204] [ 12720(3073): 12732(3077)] Signal 12720, PID: 12732, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.660432 789113 task_exit.go:204] [ 12720(3073): 12732(3077)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.660486 789113 task_exit.go:204] [ 12720(3073): 12732(3077)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.660509 789113 task_exit.go:204] [ 12720(3073): 12732(3077)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.660535 789113 task_signals.go:204] [ 12720(3073): 12736(3081)] Signal 12720, PID: 12736, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.660566 789113 task_signals.go:204] [ 12720(3073): 12733(3078)] Signal 12720, PID: 12733, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.660570 789113 task_exit.go:204] [ 12720(3073): 12736(3081)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.660592 789113 task_exit.go:204] [ 12720(3073): 12736(3081)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.660607 789113 task_exit.go:204] [ 12720(3073): 12736(3081)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.660545 789113 task_signals.go:204] [ 12720(3073): 12731(3076)] Signal 12720, PID: 12731, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.660625 789113 task_exit.go:204] [ 12720(3073): 12731(3076)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.660623 789113 task_signals.go:204] [ 12720(3073): 12735(3080)] Signal 12720, PID: 12735, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:00.660634 789113 task_exit.go:204] [ 12720(3073): 12731(3076)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.660640 789113 task_exit.go:204] [ 12720(3073): 12731(3076)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.660652 789113 task_exit.go:204] [ 12720(3073): 12735(3080)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.660661 789113 task_exit.go:204] [ 12720(3073): 12735(3080)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.660667 789113 task_exit.go:204] [ 12720(3073): 12735(3080)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.660677 789113 task_exit.go:204] [ 12720(3073): 12733(3078)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:00.661128 789113 task_exit.go:204] [ 12720(3073): 12733(3078)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:00.661166 789113 task_exit.go:204] [ 12720(3073): 12733(3078)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:00.661181 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:00.661201 789113 task_exit.go:204] [ 12720(3073): 12720(3073)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:00 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000180), &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0xc1, 0x1) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'erspan0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x80, 0x0, 0x55, 0x2, {{0x6, 0x4, 0x0, 0x5, 0x18, 0x68, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2c}, {[@noop]}}}}}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:01.106626 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:01.106675 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 37 D0714 04:47:01.106812 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:01.107798 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:01.107849 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 38 D0714 04:47:01.107865 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:01.113777 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:01.113874 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 37 D0714 04:47:01.114002 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:01.114046 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 39 D0714 04:47:01.114068 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:01.114017 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:01.114134 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:01.114171 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 37 D0714 04:47:01.114366 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:01.115520 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:01.115646 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 38 D0714 04:47:01.115714 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:01.115736 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 38 D0714 04:47:01.115747 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:01.115760 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:01.116920 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:01.116960 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 40 D0714 04:47:01.116977 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:01.117167 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:01.117192 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 41 D0714 04:47:01.117202 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:01.117790 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:01.117818 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 42 D0714 04:47:01.117829 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:01.118051 789113 usertrap_amd64.go:212] [ 12740(3500): 12743(3501)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:01.118080 789113 usertrap_amd64.go:122] [ 12740(3500): 12743(3501)] Allocate a new trap: 0xc003b44d80 43 D0714 04:47:01.118093 789113 usertrap_amd64.go:225] [ 12740(3500): 12743(3501)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:01.121108 789113 usertrap_amd64.go:212] [ 12740(3500): 12740(3500)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:01.121136 789113 usertrap_amd64.go:122] [ 12740(3500): 12740(3500)] Allocate a new trap: 0xc003b44d80 44 D0714 04:47:01.121150 789113 usertrap_amd64.go:225] [ 12740(3500): 12740(3500)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:01.124184 789113 task_exit.go:204] [ 12740(3500): 12740(3500)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:01.124243 789113 task_exit.go:204] [ 12740(3500): 12740(3500)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:01.124266 789113 task_signals.go:204] [ 12740(3500): 12744(3502)] Signal 12740, PID: 12744, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:01.124293 789113 task_exit.go:204] [ 12740(3500): 12744(3502)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:01.124304 789113 task_exit.go:204] [ 12740(3500): 12744(3502)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:01.124311 789113 task_exit.go:204] [ 12740(3500): 12744(3502)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:01.124327 789113 task_signals.go:204] [ 12740(3500): 12743(3501)] Signal 12740, PID: 12743, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:01.124343 789113 task_exit.go:204] [ 12740(3500): 12743(3501)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:01.124355 789113 task_exit.go:204] [ 12740(3500): 12743(3501)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:01.124370 789113 task_exit.go:204] [ 12740(3500): 12743(3501)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:01.124399 789113 task_signals.go:204] [ 12740(3500): 12745(3503)] Signal 12740, PID: 12745, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:01.124416 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:01.124434 789113 task_exit.go:204] [ 12740(3500): 12745(3503)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:01.124435 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 39 D0714 04:47:01.124469 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:01.124449 789113 task_exit.go:204] [ 12740(3500): 12745(3503)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:01.124531 789113 task_exit.go:204] [ 12740(3500): 12745(3503)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:01.124553 789113 task_signals.go:204] [ 12740(3500): 12746(3504)] Signal 12740, PID: 12746, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:01.124581 789113 task_exit.go:204] [ 12740(3500): 12746(3504)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:01.124611 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:01.124632 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 39 D0714 04:47:01.124644 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:01.124877 789113 task_exit.go:204] [ 12740(3500): 12746(3504)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:01.124924 789113 task_exit.go:204] [ 12740(3500): 12746(3504)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:01.124936 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:01.125977 789113 task_exit.go:204] [ 12740(3500): 12740(3500)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) (async) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) (async) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000000)={0x0, @remote, 0x4e20, 0x2, 'lblcr\x00', 0x8, 0x8, 0x13}, 0x2c) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:01.126905 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:01.126936 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 40 D0714 04:47:01.126952 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:01.127175 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:01.127234 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 41 D0714 04:47:01.127264 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:01.127943 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:01.127971 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 42 D0714 04:47:01.127986 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:01.128002 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:01.128009 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 40 D0714 04:47:01.128018 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:01.128139 789113 usertrap_amd64.go:212] [ 12741(3074): 12747(3075)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:01.128160 789113 usertrap_amd64.go:122] [ 12741(3074): 12747(3075)] Allocate a new trap: 0xc009734090 43 D0714 04:47:01.128169 789113 usertrap_amd64.go:225] [ 12741(3074): 12747(3075)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:01.128295 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:01.128324 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 41 D0714 04:47:01.128337 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:01.129142 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:01.129167 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 42 D0714 04:47:01.129176 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:01.129206 789113 usertrap_amd64.go:212] [ 12742(3085): 12748(3086)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:01.129221 789113 usertrap_amd64.go:122] [ 12742(3085): 12748(3086)] Allocate a new trap: 0xc0042c0e40 43 D0714 04:47:01.129233 789113 usertrap_amd64.go:225] [ 12742(3085): 12748(3086)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) I0714 04:47:02.702325 789113 watchdog.go:295] Watchdog starting loop, tasks: 75, discount: 0s D0714 04:47:02.702406 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:02.702499 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler D0714 04:47:03.336297 789113 usertrap_amd64.go:212] [ 12749(3505): 12749(3505)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:03.336367 789113 usertrap_amd64.go:122] [ 12749(3505): 12749(3505)] Allocate a new trap: 0xc005fe08a0 37 D0714 04:47:03.423674 789113 task_signals.go:204] [ 12721(3016): 12727(3019)] Signal 12721, PID: 12727, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.423767 789113 task_exit.go:204] [ 12721(3016): 12727(3019)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.423756 789113 task_signals.go:204] [ 12721(3016): 12724(3017)] Signal 12721, PID: 12724, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.423812 789113 task_exit.go:204] [ 12721(3016): 12724(3017)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.423861 789113 usertrap_amd64.go:225] [ 12749(3505): 12749(3505)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:03.423937 789113 task_exit.go:204] [ 12721(3016): 12727(3019)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.423971 789113 task_exit.go:204] [ 12721(3016): 12727(3019)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.424234 789113 task_exit.go:204] [ 12721(3016): 12724(3017)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.424264 789113 task_exit.go:204] [ 12721(3016): 12724(3017)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.424274 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:03.424294 789113 task_exit.go:204] [ 12721(3016): 12721(3016)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.424883 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:03.424907 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 44 D0714 04:47:03.424922 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) 04:47:03 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0xb4001, 0x0) (async) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f00000001c0)={{r2}, "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"}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x100000001) (async, rerun: 64) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:47:03.425556 789113 usertrap_amd64.go:212] [ 12749(3505): 12749(3505)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:03.425607 789113 usertrap_amd64.go:122] [ 12749(3505): 12749(3505)] Allocate a new trap: 0xc005fe08a0 38 D0714 04:47:03.425626 789113 usertrap_amd64.go:225] [ 12749(3505): 12749(3505)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:03.427741 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:03.427788 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 44 D0714 04:47:03.427809 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:03.526484 789113 usertrap_amd64.go:212] [ 12741(3074): 12741(3074)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:03.526547 789113 usertrap_amd64.go:122] [ 12741(3074): 12741(3074)] Allocate a new trap: 0xc009734090 45 D0714 04:47:03.526565 789113 usertrap_amd64.go:225] [ 12741(3074): 12741(3074)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:03.527053 789113 usertrap_amd64.go:212] [ 12742(3085): 12742(3085)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:03.527093 789113 usertrap_amd64.go:122] [ 12742(3085): 12742(3085)] Allocate a new trap: 0xc0042c0e40 45 D0714 04:47:03.527106 789113 usertrap_amd64.go:225] [ 12742(3085): 12742(3085)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:03.527525 789113 task_exit.go:204] [ 12741(3074): 12741(3074)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527566 789113 task_exit.go:204] [ 12741(3074): 12741(3074)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.527578 789113 task_signals.go:204] [ 12741(3074): 12750(3076)] Signal 12741, PID: 12750, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.527599 789113 task_signals.go:204] [ 12741(3074): 12752(3077)] Signal 12741, PID: 12752, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.527648 789113 task_exit.go:204] [ 12741(3074): 12750(3076)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527679 789113 task_exit.go:204] [ 12741(3074): 12750(3076)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.527686 789113 task_exit.go:204] [ 12741(3074): 12750(3076)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.527704 789113 task_exit.go:204] [ 12741(3074): 12752(3077)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527754 789113 task_signals.go:204] [ 12741(3074): 12747(3075)] Signal 12741, PID: 12747, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.527803 789113 task_exit.go:204] [ 12742(3085): 12742(3085)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527839 789113 task_signals.go:204] [ 12742(3085): 12753(3088)] Signal 12742, PID: 12753, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:03.527852 789113 task_exit.go:204] [ 12742(3085): 12742(3085)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.527881 789113 task_exit.go:204] [ 12741(3074): 12747(3075)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527914 789113 task_exit.go:204] [ 12741(3074): 12747(3075)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.527936 789113 task_exit.go:204] [ 12741(3074): 12747(3075)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.527958 789113 task_exit.go:204] [ 12742(3085): 12753(3088)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:03.527991 789113 task_exit.go:204] [ 12742(3085): 12753(3088)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.527999 789113 task_exit.go:204] [ 12742(3085): 12753(3088)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.534618 789113 task_exit.go:204] [ 12741(3074): 12752(3077)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:03.534649 789113 task_exit.go:204] [ 12741(3074): 12752(3077)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:03.534661 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:03.534802 789113 task_exit.go:204] [ 12741(3074): 12741(3074)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:03 executing program 1: r0 = msgget$private(0x0, 0x45) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) (async) msgrcv(r1, 0x0, 0x0, 0x3, 0x3000) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:47:04.526508 789113 task_signals.go:481] [ 12742(3085): 12742(3085)] No task notified of signal 9 D0714 04:47:04.526641 789113 task_signals.go:458] [ 12742(3085): 12742(3085)] Discarding duplicate signal 9 D0714 04:47:04.866771 789113 task_signals.go:204] [ 12742(3085): 12751(3087)] Signal 12742, PID: 12751, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:04.866842 789113 task_exit.go:204] [ 12742(3085): 12751(3087)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:04.866893 789113 task_exit.go:204] [ 12742(3085): 12751(3087)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:04.866904 789113 task_exit.go:204] [ 12742(3085): 12751(3087)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:04.866964 789113 task_signals.go:204] [ 12742(3085): 12748(3086)] Signal 12742, PID: 12748, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:04.867050 789113 task_exit.go:204] [ 12742(3085): 12748(3086)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:04.867466 789113 task_exit.go:204] [ 12742(3085): 12748(3086)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:04.867505 789113 task_exit.go:204] [ 12742(3085): 12748(3086)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:04.867530 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:04.867572 789113 task_exit.go:204] [ 12742(3085): 12742(3085)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:04 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x1, r3}) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1}) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="5e5c1e"], 0x3, 0x3) D0714 04:47:05.090864 789113 task_signals.go:481] [ 12749(3505): 12749(3505)] No task notified of signal 9 D0714 04:47:05.090950 789113 task_signals.go:458] [ 12749(3505): 12749(3505)] Discarding duplicate signal 9 D0714 04:47:05.259766 789113 task_signals.go:204] [ 12749(3505): 12749(3505)] Signal 12749, PID: 12749, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:05.259853 789113 task_exit.go:204] [ 12749(3505): 12749(3505)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:05.263889 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:05.263939 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 37 D0714 04:47:05.264050 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:05.265287 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:05.265316 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 38 D0714 04:47:05.265332 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:05.265743 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:05.265771 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 37 D0714 04:47:05.265872 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:05.267131 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:05.267239 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 37 D0714 04:47:05.267259 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:05.267280 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 38 D0714 04:47:05.267293 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:05.267360 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:05.267788 789113 task_exit.go:204] [ 12749(3505): 12749(3505)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:05.267857 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:05.267888 789113 task_exit.go:204] [ 12749(3505): 12749(3505)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:05.268472 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:05.268502 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 38 D0714 04:47:05.268518 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:05.269495 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:05.269522 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 39 D0714 04:47:05.269537 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:05.271397 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:05.271431 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 39 D0714 04:47:05.271444 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:05.273959 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:05.273989 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 40 D0714 04:47:05.274003 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:05.274195 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:05.274220 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 41 D0714 04:47:05.274232 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:05.274819 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:05.274846 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 39 D0714 04:47:05.274858 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:05.274881 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:05.274893 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 42 D0714 04:47:05.274903 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:05.275238 789113 usertrap_amd64.go:212] [ 12755(3078): 12757(3079)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:05.275309 789113 usertrap_amd64.go:122] [ 12755(3078): 12757(3079)] Allocate a new trap: 0xc001aa84e0 43 D0714 04:47:05.275374 789113 usertrap_amd64.go:225] [ 12755(3078): 12757(3079)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:05.277684 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:05.277706 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 44 D0714 04:47:05.277717 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:05.278029 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:05.278050 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 40 D0714 04:47:05.278060 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:05.278261 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:05.278287 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 41 D0714 04:47:05.278297 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:05.278920 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:05.278996 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 42 D0714 04:47:05.279025 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:05.279064 789113 usertrap_amd64.go:212] [ 12756(3089): 12760(3090)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:05.279072 789113 usertrap_amd64.go:122] [ 12756(3089): 12760(3090)] Allocate a new trap: 0xc007dfa420 43 D0714 04:47:05.279080 789113 usertrap_amd64.go:225] [ 12756(3089): 12760(3090)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:05.279489 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:05.279582 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler D0714 04:47:05.280507 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:05.280534 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 40 D0714 04:47:05.280545 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:05.280669 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:05.280692 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 41 D0714 04:47:05.280705 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:05.281095 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:05.281122 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 42 D0714 04:47:05.281139 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:05.281348 789113 usertrap_amd64.go:212] [ 12754(3020): 12761(3021)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:05.281374 789113 usertrap_amd64.go:122] [ 12754(3020): 12761(3021)] Allocate a new trap: 0xc009ca67e0 43 D0714 04:47:05.281387 789113 usertrap_amd64.go:225] [ 12754(3020): 12761(3021)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:05.298186 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:05.298317 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler 04:47:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @private=0xa010102}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x8) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000040)="5d5a13997661c4632e1d5a3ab38d00da90d89716d952f5d7f289ceec97f0c17e65af1fd61a45d1304d", 0x29) r4 = socket(0x15, 0x5, 0x8001) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000140)={@loopback, @remote, r5}, 0xc) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000001440)={'gre0\x00', &(0x7f0000001380)={'syztnl0\x00', r5, 0x10, 0x8000, 0x3, 0x8ed9, {{0x23, 0x4, 0x3, 0x9, 0x8c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast2, @empty, {[@generic={0x82, 0x7, "3d5babafb1"}, @end, @lsrr={0x83, 0x13, 0x4f, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty]}, @generic={0x7, 0x5, "281a15"}, @timestamp_prespec={0x44, 0x2c, 0x7d, 0x3, 0x4, [{@empty, 0x9}, {@broadcast, 0x6}, {@remote}, {@multicast1, 0x80}, {@rand_addr=0x64010100, 0x3f}]}, @timestamp_addr={0x44, 0x2c, 0x8c, 0x1, 0x8, [{@broadcast, 0x2}, {@multicast1, 0x4}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@loopback, 0x200}]}]}}}}}) getpeername$packet(r3, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000014c0)=0x14) sendmsg$inet(r3, &(0x7f00000015c0)={&(0x7f0000001180)={0x2, 0x4e20, @private=0xa010102}, 0x10, &(0x7f0000001340)=[{&(0x7f00000011c0)="85c5a7886fb7a29e8e7762688d0542f890363b508bc681f019a439f1f30ed12c40c4d5c2ce3c21f6d56642fee12d6f7a47443045ff0b6f6c666c3d7607b56966c4a7b7791c5c444f777b86da5a", 0x4d}, {&(0x7f0000001240)="439a69fc2eec7549c186bef7b922cd72692fe8e48d218ffab90c8832b01e6f948bfb1579ab167b208f4b94", 0x2b}, {&(0x7f0000001280)="e459c18ec8f49578c7cba9880f75088fd6494f9bbf095e22b53e5fd51b6d74a422bd90178515c9b4e5f696d4598221ed5ecd83513cf375ce6f429006ef3caf3c00d7eaaf5d5bcb6c380d1e8e2c9b662e74864fa229fc118c6972d2f6f8549a39c5", 0x61}, {&(0x7f0000001300)="f1d6ba44b2e5377f23ac3971e7de73c1777d67dda2c5ff1a524d4bcaae233709f8b0bd94204c", 0x26}], 0x4, &(0x7f0000001500)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0x34}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @private=0xa010101, @rand_addr=0x64010101}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @dev={0xac, 0x14, 0x14, 0x3a}}}}], 0xc0}, 0xe2bbc61f33e08353) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', r7, 0x2f, 0xce, 0x1, 0x4e, 0x30, @private2, @local, 0x1, 0x8, 0x3, 0x8}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@initdev, @private}, &(0x7f0000000040)=0xc) D0714 04:47:06.472183 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:06.472291 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler D0714 04:47:06.472471 789113 usertrap_amd64.go:212] [ 12755(3078): 12755(3078)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:06.472509 789113 usertrap_amd64.go:122] [ 12755(3078): 12755(3078)] Allocate a new trap: 0xc001aa84e0 45 D0714 04:47:06.472524 789113 usertrap_amd64.go:225] [ 12755(3078): 12755(3078)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:06.474234 789113 task_exit.go:204] [ 12755(3078): 12755(3078)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.474297 789113 task_signals.go:204] [ 12755(3078): 12759(3081)] Signal 12755, PID: 12759, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:06.474339 789113 task_exit.go:204] [ 12755(3078): 12759(3081)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.474337 789113 task_signals.go:204] [ 12755(3078): 12757(3079)] Signal 12755, PID: 12757, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:06.474359 789113 task_exit.go:204] [ 12755(3078): 12757(3079)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.474383 789113 task_exit.go:204] [ 12755(3078): 12757(3079)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.474394 789113 task_exit.go:204] [ 12755(3078): 12757(3079)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:06.474407 789113 task_exit.go:204] [ 12755(3078): 12759(3081)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.474412 789113 task_exit.go:204] [ 12755(3078): 12759(3081)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:06.474431 789113 task_signals.go:204] [ 12755(3078): 12758(3080)] Signal 12755, PID: 12758, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:06.474452 789113 task_exit.go:204] [ 12755(3078): 12755(3078)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.474471 789113 task_exit.go:204] [ 12755(3078): 12758(3080)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.482623 789113 usertrap_amd64.go:212] [ 12765(3506): 12765(3506)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:06.482657 789113 usertrap_amd64.go:122] [ 12765(3506): 12765(3506)] Allocate a new trap: 0xc0032a8270 37 D0714 04:47:06.482812 789113 usertrap_amd64.go:225] [ 12765(3506): 12765(3506)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:06.484089 789113 task_exit.go:204] [ 12755(3078): 12758(3080)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.484124 789113 task_exit.go:204] [ 12755(3078): 12758(3080)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:06.484139 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:06.484102 789113 usertrap_amd64.go:212] [ 12765(3506): 12765(3506)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:06.484165 789113 usertrap_amd64.go:122] [ 12765(3506): 12765(3506)] Allocate a new trap: 0xc0032a8270 38 D0714 04:47:06.484182 789113 usertrap_amd64.go:225] [ 12765(3506): 12765(3506)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:06.485088 789113 task_exit.go:204] [ 12755(3078): 12755(3078)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:06 executing program 1: r0 = msgget$private(0x0, 0x45) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x3, 0x3000) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) D0714 04:47:06.523374 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:47:06.523430 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 44 D0714 04:47:06.523449 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:47:06.624325 789113 usertrap_amd64.go:212] [ 12754(3020): 12754(3020)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:47:06.624380 789113 usertrap_amd64.go:122] [ 12754(3020): 12754(3020)] Allocate a new trap: 0xc009ca67e0 45 D0714 04:47:06.624408 789113 usertrap_amd64.go:225] [ 12754(3020): 12754(3020)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:47:06.625090 789113 task_exit.go:204] [ 12754(3020): 12754(3020)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.625137 789113 task_exit.go:204] [ 12754(3020): 12754(3020)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.625164 789113 task_signals.go:204] [ 12754(3020): 12762(3022)] Signal 12754, PID: 12762, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:06.625181 789113 task_exit.go:204] [ 12754(3020): 12762(3022)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.625211 789113 task_exit.go:204] [ 12754(3020): 12762(3022)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:06.625219 789113 task_exit.go:204] [ 12754(3020): 12762(3022)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:06.626728 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:06.626744 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 44 D0714 04:47:06.626757 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:06.728202 789113 usertrap_amd64.go:212] [ 12756(3089): 12756(3089)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:06.728246 789113 usertrap_amd64.go:122] [ 12756(3089): 12756(3089)] Allocate a new trap: 0xc007dfa420 45 D0714 04:47:06.728261 789113 usertrap_amd64.go:225] [ 12756(3089): 12756(3089)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:06.729469 789113 task_exit.go:204] [ 12756(3089): 12756(3089)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:06.729547 789113 task_exit.go:204] [ 12756(3089): 12756(3089)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:08.905385 789113 task_signals.go:481] [ 12754(3020): 12754(3020)] No task notified of signal 9 D0714 04:47:08.905555 789113 task_signals.go:458] [ 12754(3020): 12754(3020)] Discarding duplicate signal 9 D0714 04:47:08.905800 789113 task_signals.go:481] [ 12756(3089): 12756(3089)] No task notified of signal 9 D0714 04:47:08.905853 789113 task_signals.go:458] [ 12756(3089): 12756(3089)] Discarding duplicate signal 9 D0714 04:47:09.474686 789113 task_signals.go:481] [ 12765(3506): 12765(3506)] No task notified of signal 9 D0714 04:47:09.474758 789113 task_signals.go:458] [ 12765(3506): 12765(3506)] Discarding duplicate signal 9 D0714 04:47:11.164590 789113 task_signals.go:204] [ 12765(3506): 12765(3506)] Signal 12765, PID: 12765, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:11.164649 789113 task_signals.go:204] [ 12756(3089): 12766(3092)] Signal 12756, PID: 12766, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:11.164598 789113 task_signals.go:204] [ 12756(3089): 12767(3093)] Signal 12756, PID: 12767, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:11.164658 789113 task_exit.go:204] [ 12765(3506): 12765(3506)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:11.164613 789113 task_signals.go:204] [ 12756(3089): 12760(3090)] Signal 12756, PID: 12760, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:11.164715 789113 task_signals.go:204] [ 12756(3089): 12764(3091)] Signal 12756, PID: 12764, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:11.164715 789113 task_exit.go:204] [ 12756(3089): 12760(3090)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:11.164760 789113 task_exit.go:204] [ 12756(3089): 12764(3091)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:11.164791 789113 task_exit.go:204] [ 12756(3089): 12764(3091)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:11.164811 789113 task_exit.go:204] [ 12756(3089): 12764(3091)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:11.164835 789113 task_exit.go:204] [ 12756(3089): 12766(3092)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:11.164853 789113 task_exit.go:204] [ 12756(3089): 12766(3092)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:11.164858 789113 task_exit.go:204] [ 12756(3089): 12766(3092)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:11.164879 789113 task_exit.go:204] [ 12756(3089): 12760(3090)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:11.164896 789113 task_exit.go:204] [ 12756(3089): 12760(3090)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:11.164913 789113 task_exit.go:204] [ 12756(3089): 12767(3093)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:11.165110 789113 task_exit.go:204] [ 12765(3506): 12765(3506)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:11.165142 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:11.165185 789113 task_exit.go:204] [ 12765(3506): 12765(3506)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:11.165355 789113 task_exit.go:204] [ 12756(3089): 12767(3093)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:11.165387 789113 task_exit.go:204] [ 12756(3089): 12767(3093)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:11.165407 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:11.165450 789113 task_exit.go:204] [ 12756(3089): 12756(3089)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:11 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x1, r3}) (async) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1}) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="5e5c1e"], 0x3, 0x3) 04:47:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) r2 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @private=0xa010102}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x8) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000040)="5d5a13997661c4632e1d5a3ab38d00da90d89716d952f5d7f289ceec97f0c17e65af1fd61a45d1304d", 0x29) (async) r4 = socket(0x15, 0x5, 0x8001) (async) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000140)={@loopback, @remote, r5}, 0xc) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000001440)={'gre0\x00', &(0x7f0000001380)={'syztnl0\x00', r5, 0x10, 0x8000, 0x3, 0x8ed9, {{0x23, 0x4, 0x3, 0x9, 0x8c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast2, @empty, {[@generic={0x82, 0x7, "3d5babafb1"}, @end, @lsrr={0x83, 0x13, 0x4f, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty]}, @generic={0x7, 0x5, "281a15"}, @timestamp_prespec={0x44, 0x2c, 0x7d, 0x3, 0x4, [{@empty, 0x9}, {@broadcast, 0x6}, {@remote}, {@multicast1, 0x80}, {@rand_addr=0x64010100, 0x3f}]}, @timestamp_addr={0x44, 0x2c, 0x8c, 0x1, 0x8, [{@broadcast, 0x2}, {@multicast1, 0x4}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@loopback, 0x200}]}]}}}}}) (async) getpeername$packet(r3, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000014c0)=0x14) sendmsg$inet(r3, &(0x7f00000015c0)={&(0x7f0000001180)={0x2, 0x4e20, @private=0xa010102}, 0x10, &(0x7f0000001340)=[{&(0x7f00000011c0)="85c5a7886fb7a29e8e7762688d0542f890363b508bc681f019a439f1f30ed12c40c4d5c2ce3c21f6d56642fee12d6f7a47443045ff0b6f6c666c3d7607b56966c4a7b7791c5c444f777b86da5a", 0x4d}, {&(0x7f0000001240)="439a69fc2eec7549c186bef7b922cd72692fe8e48d218ffab90c8832b01e6f948bfb1579ab167b208f4b94", 0x2b}, {&(0x7f0000001280)="e459c18ec8f49578c7cba9880f75088fd6494f9bbf095e22b53e5fd51b6d74a422bd90178515c9b4e5f696d4598221ed5ecd83513cf375ce6f429006ef3caf3c00d7eaaf5d5bcb6c380d1e8e2c9b662e74864fa229fc118c6972d2f6f8549a39c5", 0x61}, {&(0x7f0000001300)="f1d6ba44b2e5377f23ac3971e7de73c1777d67dda2c5ff1a524d4bcaae233709f8b0bd94204c", 0x26}], 0x4, &(0x7f0000001500)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0x34}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @private=0xa010101, @rand_addr=0x64010101}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @dev={0xac, 0x14, 0x14, 0x3a}}}}], 0xc0}, 0xe2bbc61f33e08353) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', r7, 0x2f, 0xce, 0x1, 0x4e, 0x30, @private2, @local, 0x1, 0x8, 0x3, 0x8}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@initdev, @private}, &(0x7f0000000040)=0xc) D0714 04:47:11.717022 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:11.717056 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 37 D0714 04:47:11.717197 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:11.718191 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:11.718218 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 38 D0714 04:47:11.718231 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:11.720037 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:11.720058 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 37 D0714 04:47:11.720171 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:11.721715 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:11.721736 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 38 D0714 04:47:11.721756 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:11.722482 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:11.722506 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 39 D0714 04:47:11.722518 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:11.722562 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:11.722592 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 37 D0714 04:47:11.722725 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:11.723529 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:11.723556 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 38 D0714 04:47:11.723569 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:11.727357 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:11.727391 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 40 D0714 04:47:11.727405 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:11.727677 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:11.727767 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 41 D0714 04:47:11.727783 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:11.728075 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:11.728100 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 39 D0714 04:47:11.728114 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:11.729206 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:11.729227 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 42 D0714 04:47:11.729238 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:11.731182 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:11.731205 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 40 D0714 04:47:11.731215 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:11.731919 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:11.731955 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 41 D0714 04:47:11.731968 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:11.732581 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:11.732616 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 42 D0714 04:47:11.732635 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:11.732660 789113 usertrap_amd64.go:212] [ 12769(3094): 12772(3095)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:11.732668 789113 usertrap_amd64.go:122] [ 12769(3094): 12772(3095)] Allocate a new trap: 0xc007dfa450 43 D0714 04:47:11.732675 789113 usertrap_amd64.go:225] [ 12769(3094): 12772(3095)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:11.736027 789113 usertrap_amd64.go:212] [ 12768(3082): 12771(3083)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:11.736054 789113 usertrap_amd64.go:122] [ 12768(3082): 12771(3083)] Allocate a new trap: 0xc005fe0930 43 D0714 04:47:11.736067 789113 usertrap_amd64.go:225] [ 12768(3082): 12771(3083)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:12.434453 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:12.434505 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 44 D0714 04:47:12.434528 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:12.437057 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:12.437114 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 39 D0714 04:47:12.437132 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:12.439212 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:12.439239 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 40 D0714 04:47:12.439252 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:12.439413 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:12.439429 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 41 D0714 04:47:12.439435 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:12.440155 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:12.440266 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 42 D0714 04:47:12.440300 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:12.440516 789113 usertrap_amd64.go:212] [ 12770(3507): 12776(3508)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:12.440538 789113 usertrap_amd64.go:122] [ 12770(3507): 12776(3508)] Allocate a new trap: 0xc007dfa480 43 D0714 04:47:12.440551 789113 usertrap_amd64.go:225] [ 12770(3507): 12776(3508)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:12.444614 789113 usertrap_amd64.go:212] [ 12770(3507): 12770(3507)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:12.444641 789113 usertrap_amd64.go:122] [ 12770(3507): 12770(3507)] Allocate a new trap: 0xc007dfa480 44 D0714 04:47:12.444666 789113 usertrap_amd64.go:225] [ 12770(3507): 12770(3507)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:12.445725 789113 task_exit.go:204] [ 12770(3507): 12770(3507)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:12.445794 789113 task_signals.go:204] [ 12770(3507): 12777(3509)] Signal 12770, PID: 12777, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:12.445832 789113 task_signals.go:204] [ 12770(3507): 12778(3510)] Signal 12770, PID: 12778, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:12.445845 789113 task_exit.go:204] [ 12770(3507): 12770(3507)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:12.445862 789113 task_signals.go:204] [ 12770(3507): 12776(3508)] Signal 12770, PID: 12776, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:12.445882 789113 task_exit.go:204] [ 12770(3507): 12776(3508)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:12.445895 789113 task_exit.go:204] [ 12770(3507): 12777(3509)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:12.445953 789113 task_exit.go:204] [ 12770(3507): 12777(3509)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:12.445961 789113 task_exit.go:204] [ 12770(3507): 12777(3509)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:12.445976 789113 task_exit.go:204] [ 12770(3507): 12778(3510)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:12.446302 789113 task_exit.go:204] [ 12770(3507): 12778(3510)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:12.446337 789113 task_exit.go:204] [ 12770(3507): 12778(3510)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:12.446354 789113 task_exit.go:204] [ 12770(3507): 12776(3508)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:12.446361 789113 task_exit.go:204] [ 12770(3507): 12776(3508)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:12.446371 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:12.447095 789113 task_exit.go:204] [ 12770(3507): 12770(3507)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) r2 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @private=0xa010102}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async) r3 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x8) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000040)="5d5a13997661c4632e1d5a3ab38d00da90d89716d952f5d7f289ceec97f0c17e65af1fd61a45d1304d", 0x29) (async) r4 = socket(0x15, 0x5, 0x8001) (async) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000140)={@loopback, @remote, r5}, 0xc) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000001440)={'gre0\x00', &(0x7f0000001380)={'syztnl0\x00', r5, 0x10, 0x8000, 0x3, 0x8ed9, {{0x23, 0x4, 0x3, 0x9, 0x8c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast2, @empty, {[@generic={0x82, 0x7, "3d5babafb1"}, @end, @lsrr={0x83, 0x13, 0x4f, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty]}, @generic={0x7, 0x5, "281a15"}, @timestamp_prespec={0x44, 0x2c, 0x7d, 0x3, 0x4, [{@empty, 0x9}, {@broadcast, 0x6}, {@remote}, {@multicast1, 0x80}, {@rand_addr=0x64010100, 0x3f}]}, @timestamp_addr={0x44, 0x2c, 0x8c, 0x1, 0x8, [{@broadcast, 0x2}, {@multicast1, 0x4}, {@empty, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@loopback, 0x200}]}]}}}}}) (async) getpeername$packet(r3, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000014c0)=0x14) sendmsg$inet(r3, &(0x7f00000015c0)={&(0x7f0000001180)={0x2, 0x4e20, @private=0xa010102}, 0x10, &(0x7f0000001340)=[{&(0x7f00000011c0)="85c5a7886fb7a29e8e7762688d0542f890363b508bc681f019a439f1f30ed12c40c4d5c2ce3c21f6d56642fee12d6f7a47443045ff0b6f6c666c3d7607b56966c4a7b7791c5c444f777b86da5a", 0x4d}, {&(0x7f0000001240)="439a69fc2eec7549c186bef7b922cd72692fe8e48d218ffab90c8832b01e6f948bfb1579ab167b208f4b94", 0x2b}, {&(0x7f0000001280)="e459c18ec8f49578c7cba9880f75088fd6494f9bbf095e22b53e5fd51b6d74a422bd90178515c9b4e5f696d4598221ed5ecd83513cf375ce6f429006ef3caf3c00d7eaaf5d5bcb6c380d1e8e2c9b662e74864fa229fc118c6972d2f6f8549a39c5", 0x61}, {&(0x7f0000001300)="f1d6ba44b2e5377f23ac3971e7de73c1777d67dda2c5ff1a524d4bcaae233709f8b0bd94204c", 0x26}], 0x4, &(0x7f0000001500)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0x34}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @private=0xa010101, @rand_addr=0x64010101}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @dev={0xac, 0x14, 0x14, 0x3a}}}}], 0xc0}, 0xe2bbc61f33e08353) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', r7, 0x2f, 0xce, 0x1, 0x4e, 0x30, @private2, @local, 0x1, 0x8, 0x3, 0x8}}) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@initdev, @private}, &(0x7f0000000040)=0xc) D0714 04:47:13.282090 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:13.282150 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 44 D0714 04:47:13.282170 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:13.287907 789113 usertrap_amd64.go:212] [ 12769(3094): 12769(3094)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:13.287968 789113 usertrap_amd64.go:122] [ 12769(3094): 12769(3094)] Allocate a new trap: 0xc007dfa450 45 D0714 04:47:13.287994 789113 usertrap_amd64.go:225] [ 12769(3094): 12769(3094)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:13.288836 789113 task_exit.go:204] [ 12769(3094): 12769(3094)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.288894 789113 task_exit.go:204] [ 12769(3094): 12769(3094)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.288922 789113 task_signals.go:204] [ 12769(3094): 12774(3097)] Signal 12769, PID: 12774, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:13.288947 789113 task_exit.go:204] [ 12769(3094): 12774(3097)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.288984 789113 task_exit.go:204] [ 12769(3094): 12774(3097)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.288993 789113 task_exit.go:204] [ 12769(3094): 12774(3097)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:13.288920 789113 task_signals.go:204] [ 12769(3094): 12775(3098)] Signal 12769, PID: 12775, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:13.289025 789113 task_exit.go:204] [ 12769(3094): 12775(3098)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.289036 789113 task_exit.go:204] [ 12769(3094): 12775(3098)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.289042 789113 task_exit.go:204] [ 12769(3094): 12775(3098)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:13.383384 789113 usertrap_amd64.go:212] [ 12768(3082): 12768(3082)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:13.383443 789113 usertrap_amd64.go:122] [ 12768(3082): 12768(3082)] Allocate a new trap: 0xc005fe0930 45 D0714 04:47:13.383460 789113 usertrap_amd64.go:225] [ 12768(3082): 12768(3082)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:13.384570 789113 task_exit.go:204] [ 12768(3082): 12768(3082)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.384639 789113 task_exit.go:204] [ 12768(3082): 12768(3082)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.384672 789113 task_signals.go:204] [ 12768(3082): 12771(3083)] Signal 12768, PID: 12771, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:13.384693 789113 task_exit.go:204] [ 12768(3082): 12771(3083)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.384704 789113 task_exit.go:204] [ 12768(3082): 12771(3083)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.384711 789113 task_exit.go:204] [ 12768(3082): 12771(3083)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:13.384727 789113 task_signals.go:204] [ 12768(3082): 12779(3084)] Signal 12768, PID: 12779, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:13.384753 789113 task_exit.go:204] [ 12768(3082): 12779(3084)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.384769 789113 task_signals.go:204] [ 12768(3082): 12780(3085)] Signal 12768, PID: 12780, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:13.384794 789113 task_exit.go:204] [ 12768(3082): 12779(3084)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.384801 789113 task_exit.go:204] [ 12768(3082): 12779(3084)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:13.384814 789113 task_exit.go:204] [ 12768(3082): 12780(3085)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:13.385238 789113 task_exit.go:204] [ 12768(3082): 12780(3085)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:13.385265 789113 task_exit.go:204] [ 12768(3082): 12780(3085)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:13.385282 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:13.385367 789113 task_exit.go:204] [ 12768(3082): 12768(3082)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:14.105817 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:14.105916 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler D0714 04:47:14.784008 789113 task_signals.go:481] [ 12769(3094): 12769(3094)] No task notified of signal 9 D0714 04:47:14.784121 789113 task_signals.go:458] [ 12769(3094): 12769(3094)] Discarding duplicate signal 9 D0714 04:47:15.542622 789113 task_signals.go:204] [ 12769(3094): 12773(3096)] Signal 12769, PID: 12773, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:15.542680 789113 task_signals.go:204] [ 12754(3020): 12761(3021)] Signal 12754, PID: 12761, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:15.542702 789113 task_exit.go:204] [ 12769(3094): 12773(3096)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:15.542732 789113 task_exit.go:204] [ 12769(3094): 12773(3096)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:15.542738 789113 task_exit.go:204] [ 12769(3094): 12773(3096)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:15.542641 789113 task_signals.go:204] [ 12754(3020): 12763(3023)] Signal 12754, PID: 12763, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:15.542757 789113 task_exit.go:204] [ 12754(3020): 12763(3023)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:15.542867 789113 task_signals.go:204] [ 12769(3094): 12772(3095)] Signal 12769, PID: 12772, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:15.542917 789113 task_exit.go:204] [ 12754(3020): 12763(3023)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:15.542929 789113 task_exit.go:204] [ 12754(3020): 12763(3023)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:15.542953 789113 task_exit.go:204] [ 12754(3020): 12761(3021)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:15.543041 789113 task_exit.go:204] [ 12769(3094): 12772(3095)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:15.543766 789113 task_exit.go:204] [ 12769(3094): 12772(3095)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:15.543825 789113 task_exit.go:204] [ 12769(3094): 12772(3095)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:15.543847 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:15.543879 789113 task_exit.go:204] [ 12769(3094): 12769(3094)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:15.544043 789113 task_exit.go:204] [ 12754(3020): 12761(3021)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:15.544133 789113 task_exit.go:204] [ 12754(3020): 12761(3021)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:15.544175 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:15.544229 789113 task_exit.go:204] [ 12754(3020): 12754(3020)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:15 executing program 1: r0 = msgget$private(0x0, 0x4b2) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgrcv(r0, &(0x7f0000000000)={0x0, ""/155}, 0xa3, 0x3, 0x1000) 04:47:15 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) 04:47:15 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) (async) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x1, r3}) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)={0x1, 0x1}) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="5e5c1e"], 0x3, 0x3) D0714 04:47:15.970949 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:15.971064 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 37 D0714 04:47:15.971050 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:15.971145 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 37 D0714 04:47:15.971329 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:15.971497 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:15.972749 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:15.972797 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 38 D0714 04:47:15.972820 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:15.973187 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:15.973221 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 37 D0714 04:47:15.973319 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:15.974398 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:15.974433 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 38 D0714 04:47:15.974447 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:15.977471 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:15.977525 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 38 D0714 04:47:15.977544 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:15.977743 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:15.977769 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 39 D0714 04:47:15.977791 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:15.979513 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:15.979542 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 39 D0714 04:47:15.979557 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:15.981027 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:15.981072 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 37 D0714 04:47:15.981164 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:15.981804 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:15.981855 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 40 D0714 04:47:15.981873 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:15.982059 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:15.982082 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 39 D0714 04:47:15.982093 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:15.982131 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:15.982147 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 41 D0714 04:47:15.982159 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:15.982544 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:15.982694 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 38 D0714 04:47:15.982722 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:15.982734 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:15.982752 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 40 D0714 04:47:15.982765 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:15.982849 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:15.982863 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 42 D0714 04:47:15.982872 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:15.983000 789113 usertrap_amd64.go:212] [ 12782(3086): 12785(3087)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:15.983011 789113 usertrap_amd64.go:122] [ 12782(3086): 12785(3087)] Allocate a new trap: 0xc003b50900 43 D0714 04:47:15.983020 789113 usertrap_amd64.go:225] [ 12782(3086): 12785(3087)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:15.983050 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:15.983067 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 41 D0714 04:47:15.983080 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:15.983784 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:15.983814 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 42 D0714 04:47:15.983827 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:15.984020 789113 usertrap_amd64.go:212] [ 12784(3099): 12786(3100)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:15.984046 789113 usertrap_amd64.go:122] [ 12784(3099): 12786(3100)] Allocate a new trap: 0xc0097341e0 43 D0714 04:47:15.984058 789113 usertrap_amd64.go:225] [ 12784(3099): 12786(3100)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:15.986500 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:15.986603 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 40 D0714 04:47:15.986622 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:15.986809 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:15.986833 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 41 D0714 04:47:15.986842 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:15.987395 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:15.987512 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 42 D0714 04:47:15.987557 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:15.987597 789113 usertrap_amd64.go:212] [ 12781(3511): 12788(3512)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:15.987730 789113 usertrap_amd64.go:122] [ 12781(3511): 12788(3512)] Allocate a new trap: 0xc007cf8d20 43 D0714 04:47:15.987784 789113 usertrap_amd64.go:225] [ 12781(3511): 12788(3512)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:15.990845 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:15.990877 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 39 D0714 04:47:15.990897 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:15.993062 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:15.993093 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 44 D0714 04:47:15.993107 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:15.994061 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:15.994096 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 40 D0714 04:47:15.994111 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:15.994375 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:15.994396 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 41 D0714 04:47:15.994404 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:15.995205 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:15.995222 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 42 D0714 04:47:15.995236 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:15.995377 789113 usertrap_amd64.go:212] [ 12783(3024): 12792(3025)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:15.995408 789113 usertrap_amd64.go:122] [ 12783(3024): 12792(3025)] Allocate a new trap: 0xc0002aab40 43 D0714 04:47:15.995422 789113 usertrap_amd64.go:225] [ 12783(3024): 12792(3025)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:17.565480 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:17.565547 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 44 D0714 04:47:17.565573 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:17.566251 789113 usertrap_amd64.go:212] [ 12781(3511): 12781(3511)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:17.566314 789113 usertrap_amd64.go:122] [ 12781(3511): 12781(3511)] Allocate a new trap: 0xc007cf8d20 45 D0714 04:47:17.566334 789113 usertrap_amd64.go:225] [ 12781(3511): 12781(3511)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:17.567555 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:17.567686 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 44 D0714 04:47:17.567707 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:17.568362 789113 task_exit.go:204] [ 12781(3511): 12781(3511)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.568425 789113 task_exit.go:204] [ 12781(3511): 12781(3511)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.568455 789113 task_signals.go:204] [ 12781(3511): 12788(3512)] Signal 12781, PID: 12788, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:17.568495 789113 task_signals.go:204] [ 12781(3511): 12791(3515)] Signal 12781, PID: 12791, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:17.568501 789113 task_exit.go:204] [ 12781(3511): 12788(3512)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.568455 789113 task_signals.go:204] [ 12781(3511): 12790(3514)] Signal 12781, PID: 12790, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:17.568472 789113 task_signals.go:204] [ 12781(3511): 12789(3513)] Signal 12781, PID: 12789, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:17.568524 789113 task_exit.go:204] [ 12781(3511): 12791(3515)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.568547 789113 task_exit.go:204] [ 12781(3511): 12791(3515)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.568569 789113 task_exit.go:204] [ 12781(3511): 12791(3515)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:17.568584 789113 task_exit.go:204] [ 12781(3511): 12790(3514)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.568608 789113 task_exit.go:204] [ 12781(3511): 12788(3512)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.568643 789113 task_exit.go:204] [ 12781(3511): 12788(3512)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:17.568658 789113 task_exit.go:204] [ 12781(3511): 12789(3513)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.568674 789113 task_exit.go:204] [ 12781(3511): 12789(3513)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.568692 789113 task_exit.go:204] [ 12781(3511): 12789(3513)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:17.569153 789113 task_exit.go:204] [ 12781(3511): 12790(3514)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.569185 789113 task_exit.go:204] [ 12781(3511): 12790(3514)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:17.569198 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:17.569238 789113 usertrap_amd64.go:212] [ 12782(3086): 12782(3086)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:17.569249 789113 usertrap_amd64.go:122] [ 12782(3086): 12782(3086)] Allocate a new trap: 0xc003b50900 45 D0714 04:47:17.569263 789113 usertrap_amd64.go:225] [ 12782(3086): 12782(3086)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:17.569412 789113 task_exit.go:204] [ 12781(3511): 12781(3511)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x610a00, 0x24) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:17.596264 789113 task_exit.go:204] [ 12782(3086): 12782(3086)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.596355 789113 task_exit.go:204] [ 12782(3086): 12782(3086)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.596413 789113 task_signals.go:204] [ 12782(3086): 12785(3087)] Signal 12782, PID: 12785, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:17.596434 789113 task_exit.go:204] [ 12782(3086): 12785(3087)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.596738 789113 task_exit.go:204] [ 12782(3086): 12785(3087)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:17.596753 789113 task_exit.go:204] [ 12782(3086): 12785(3087)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:17.596765 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:17.598196 789113 task_exit.go:204] [ 12782(3086): 12782(3086)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:17 executing program 1: r0 = msgget$private(0x0, 0x4b2) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgrcv(r0, &(0x7f0000000000)={0x0, ""/155}, 0xa3, 0x3, 0x1000) D0714 04:47:17.619940 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:47:17.620009 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 44 D0714 04:47:17.620030 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:47:17.669865 789113 usertrap_amd64.go:212] [ 12784(3099): 12784(3099)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:17.669941 789113 usertrap_amd64.go:122] [ 12784(3099): 12784(3099)] Allocate a new trap: 0xc0097341e0 45 D0714 04:47:17.669964 789113 usertrap_amd64.go:225] [ 12784(3099): 12784(3099)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:17.721946 789113 usertrap_amd64.go:212] [ 12783(3024): 12783(3024)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:47:17.722011 789113 usertrap_amd64.go:122] [ 12783(3024): 12783(3024)] Allocate a new trap: 0xc0002aab40 45 D0714 04:47:17.722026 789113 usertrap_amd64.go:225] [ 12783(3024): 12783(3024)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:47:17.723919 789113 task_exit.go:204] [ 12783(3024): 12783(3024)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:17.723989 789113 task_exit.go:204] [ 12783(3024): 12783(3024)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:19.058731 789113 task_signals.go:476] [ 12784(3099): 12793(3102)] Notified of group signal 9 D0714 04:47:19.058826 789113 task_signals.go:204] [ 12784(3099): 12793(3102)] Signal 12784, PID: 12793, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:19.058853 789113 task_signals.go:458] [ 12784(3099): 12784(3099)] Discarding duplicate signal 9 D0714 04:47:19.058888 789113 task_signals.go:204] [ 12784(3099): 12794(3103)] Signal 12784, PID: 12794, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:19.058897 789113 task_exit.go:204] [ 12784(3099): 12793(3102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:19.058976 789113 task_exit.go:204] [ 12784(3099): 12793(3102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:19.058987 789113 task_exit.go:204] [ 12784(3099): 12793(3102)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:19.059006 789113 task_exit.go:204] [ 12784(3099): 12794(3103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:19.059028 789113 task_exit.go:204] [ 12784(3099): 12794(3103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:19.059036 789113 task_exit.go:204] [ 12784(3099): 12794(3103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:19.927162 789113 task_signals.go:481] [ 12783(3024): 12783(3024)] No task notified of signal 9 D0714 04:47:19.927256 789113 task_signals.go:458] [ 12783(3024): 12783(3024)] Discarding duplicate signal 9 D0714 04:47:21.072596 789113 task_signals.go:204] [ 12784(3099): 12784(3099)] Signal 12784, PID: 12784, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:21.072618 789113 task_signals.go:204] [ 12784(3099): 12787(3101)] Signal 12784, PID: 12787, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:21.072672 789113 task_exit.go:204] [ 12784(3099): 12784(3099)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:21.072597 789113 task_signals.go:204] [ 12784(3099): 12786(3100)] Signal 12784, PID: 12786, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:21.072702 789113 task_exit.go:204] [ 12784(3099): 12784(3099)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:21.072730 789113 task_exit.go:204] [ 12784(3099): 12787(3101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:21.072751 789113 task_exit.go:204] [ 12784(3099): 12787(3101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:21.072757 789113 task_exit.go:204] [ 12784(3099): 12787(3101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:21.072777 789113 task_exit.go:204] [ 12784(3099): 12786(3100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:21.073203 789113 task_exit.go:204] [ 12784(3099): 12786(3100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:21.073228 789113 task_exit.go:204] [ 12784(3099): 12786(3100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:21.073240 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:21.073285 789113 task_exit.go:204] [ 12784(3099): 12784(3099)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:21 executing program 0: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) utime(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) r0 = gettid() tkill(r0, 0x1004000000015) r1 = gettid() tkill(r1, 0x1004000000015) timer_create(0x0, &(0x7f0000000180)={0x0, 0xd, 0x2, @tid=r0}, &(0x7f00000001c0)) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/net\x00') prlimit64(r0, 0x1, 0x0, &(0x7f0000000040)) D0714 04:47:21.084229 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:21.084279 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 37 D0714 04:47:21.084381 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:21.086197 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:21.086255 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 38 D0714 04:47:21.086272 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:21.617308 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:21.617375 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 37 D0714 04:47:21.617494 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:21.619692 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:21.619902 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 38 D0714 04:47:21.620022 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:21.620598 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:21.620661 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 39 D0714 04:47:21.620710 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:21.623057 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:21.623106 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 40 D0714 04:47:21.623119 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:21.623322 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:21.623371 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 41 D0714 04:47:21.623388 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:21.623975 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:21.624183 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 42 D0714 04:47:21.624212 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:21.624230 789113 usertrap_amd64.go:212] [ 12797(3516): 12798(3517)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:21.624272 789113 usertrap_amd64.go:122] [ 12797(3516): 12798(3517)] Allocate a new trap: 0xc007cf8d50 43 D0714 04:47:21.624289 789113 usertrap_amd64.go:225] [ 12797(3516): 12798(3517)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:21.626587 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:21.626628 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 39 D0714 04:47:21.626643 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:21.632050 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:21.632088 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 40 D0714 04:47:21.632103 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:21.632551 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:21.632576 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 41 D0714 04:47:21.632588 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:21.632913 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:21.632930 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 37 D0714 04:47:21.633138 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:21.633828 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:21.633856 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 42 D0714 04:47:21.633869 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:21.634244 789113 usertrap_amd64.go:212] [ 12796(3088): 12800(3089)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:21.634281 789113 usertrap_amd64.go:122] [ 12796(3088): 12800(3089)] Allocate a new trap: 0xc0057ce2a0 43 D0714 04:47:21.634298 789113 usertrap_amd64.go:225] [ 12796(3088): 12800(3089)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:21.634761 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:21.634788 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 38 D0714 04:47:21.634801 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:21.641632 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:21.641681 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 39 D0714 04:47:21.641701 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:21.644061 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:21.644089 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 40 D0714 04:47:21.644102 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:21.644294 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:21.644328 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 41 D0714 04:47:21.644344 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:21.646307 789113 usertrap_amd64.go:212] [ 12799(3104): 12799(3104)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:21.646339 789113 usertrap_amd64.go:122] [ 12799(3104): 12799(3104)] Allocate a new trap: 0xc0032a8300 42 D0714 04:47:21.646351 789113 usertrap_amd64.go:225] [ 12799(3104): 12799(3104)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:21.646404 789113 usertrap_amd64.go:212] [ 12799(3104): 12801(3105)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:21.646422 789113 usertrap_amd64.go:122] [ 12799(3104): 12801(3105)] Allocate a new trap: 0xc0032a8300 43 D0714 04:47:21.646431 789113 usertrap_amd64.go:225] [ 12799(3104): 12801(3105)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:21.647393 789113 task_signals.go:470] [ 12799(3104): 12801(3105)] Notified of signal 21 D0714 04:47:21.647474 789113 task_signals.go:808] [ 12799(3104): 12801(3105)] Signal 21: stopping 2 threads in thread group D0714 04:47:21.647497 789113 task_stop.go:118] [ 12799(3104): 12801(3105)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:21.647522 789113 task_signals.go:885] [ 12799(3104): 12799(3104)] Completing group stop D0714 04:47:21.647534 789113 task_stop.go:118] [ 12799(3104): 12799(3104)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:21.647546 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:21.686582 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:21.686637 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 44 D0714 04:47:21.686653 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:21.691657 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:21.691739 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 44 D0714 04:47:21.691757 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:22.451994 789113 usertrap_amd64.go:212] [ 12797(3516): 12797(3516)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:22.452073 789113 usertrap_amd64.go:122] [ 12797(3516): 12797(3516)] Allocate a new trap: 0xc007cf8d50 45 D0714 04:47:22.452094 789113 usertrap_amd64.go:225] [ 12797(3516): 12797(3516)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:22.452888 789113 task_exit.go:204] [ 12797(3516): 12797(3516)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:22.452934 789113 task_exit.go:204] [ 12797(3516): 12797(3516)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:22.452964 789113 task_signals.go:204] [ 12797(3516): 12802(3518)] Signal 12797, PID: 12802, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:22.452981 789113 task_exit.go:204] [ 12797(3516): 12802(3518)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:22.452992 789113 task_exit.go:204] [ 12797(3516): 12802(3518)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:22.452997 789113 task_exit.go:204] [ 12797(3516): 12802(3518)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:22.452982 789113 task_signals.go:204] [ 12797(3516): 12798(3517)] Signal 12797, PID: 12798, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:22.453034 789113 task_exit.go:204] [ 12797(3516): 12798(3517)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:22.453444 789113 task_exit.go:204] [ 12797(3516): 12798(3517)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:22.453482 789113 task_exit.go:204] [ 12797(3516): 12798(3517)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:22.453498 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:22.454380 789113 task_exit.go:204] [ 12797(3516): 12797(3516)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x610a00, 0x24) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x610a00, 0x24) (async) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async) D0714 04:47:22.458463 789113 usertrap_amd64.go:212] [ 12796(3088): 12796(3088)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:22.458523 789113 usertrap_amd64.go:122] [ 12796(3088): 12796(3088)] Allocate a new trap: 0xc0057ce2a0 45 D0714 04:47:22.458545 789113 usertrap_amd64.go:225] [ 12796(3088): 12796(3088)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:22.460200 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:22.460242 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 37 D0714 04:47:22.460359 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:22.460695 789113 task_exit.go:204] [ 12796(3088): 12796(3088)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:22.460741 789113 task_signals.go:204] [ 12796(3088): 12800(3089)] Signal 12796, PID: 12800, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:22.460759 789113 task_exit.go:204] [ 12796(3088): 12796(3088)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:22.460771 789113 task_exit.go:204] [ 12796(3088): 12800(3089)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:22.461116 789113 task_exit.go:204] [ 12796(3088): 12800(3089)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:22.461141 789113 task_exit.go:204] [ 12796(3088): 12800(3089)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:22.461159 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:22.461599 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:22.461628 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 38 D0714 04:47:22.461643 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:22.462069 789113 task_exit.go:204] [ 12796(3088): 12796(3088)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:22 executing program 1: r0 = msgget$private(0x0, 0x4b2) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) msgrcv(r0, &(0x7f0000000000)={0x0, ""/155}, 0xa3, 0x3, 0x1000) D0714 04:47:22.465421 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:22.465448 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 39 D0714 04:47:22.465463 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:22.467830 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:22.467859 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 40 D0714 04:47:22.467873 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:22.468046 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:22.468078 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 41 D0714 04:47:22.468093 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:22.468536 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:22.468561 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 42 D0714 04:47:22.468580 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:22.468677 789113 usertrap_amd64.go:212] [ 12803(3519): 12805(3520)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:22.468693 789113 usertrap_amd64.go:122] [ 12803(3519): 12805(3520)] Allocate a new trap: 0xc007cf8db0 43 D0714 04:47:22.468701 789113 usertrap_amd64.go:225] [ 12803(3519): 12805(3520)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:22.469299 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:22.469325 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 37 D0714 04:47:22.469442 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:22.471198 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:22.471225 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 38 D0714 04:47:22.471238 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:22.474774 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:22.474797 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 39 D0714 04:47:22.474808 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:22.477151 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:22.477178 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 40 D0714 04:47:22.477195 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:22.477410 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:22.477460 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 41 D0714 04:47:22.477517 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:22.478355 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:22.478383 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 42 D0714 04:47:22.478403 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:22.478578 789113 usertrap_amd64.go:212] [ 12804(3090): 12806(3091)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:22.478604 789113 usertrap_amd64.go:122] [ 12804(3090): 12806(3091)] Allocate a new trap: 0xc009ca6870 43 D0714 04:47:22.478617 789113 usertrap_amd64.go:225] [ 12804(3090): 12806(3091)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:22.531767 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:22.531819 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 44 D0714 04:47:22.531838 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:22.532553 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:22.532614 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 44 D0714 04:47:22.532634 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:23.025613 789113 task_signals.go:204] [ 12783(3024): 12792(3025)] Signal 12783, PID: 12792, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.025678 789113 task_exit.go:204] [ 12783(3024): 12792(3025)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.025714 789113 task_exit.go:204] [ 12783(3024): 12792(3025)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.025724 789113 task_exit.go:204] [ 12783(3024): 12792(3025)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.025791 789113 task_signals.go:204] [ 12783(3024): 12795(3026)] Signal 12783, PID: 12795, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.025817 789113 task_exit.go:204] [ 12783(3024): 12795(3026)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.026183 789113 task_exit.go:204] [ 12783(3024): 12795(3026)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.026205 789113 task_exit.go:204] [ 12783(3024): 12795(3026)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.026222 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:23.026256 789113 task_exit.go:204] [ 12783(3024): 12783(3024)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:23 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) (async) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) D0714 04:47:23.487434 789113 usertrap_amd64.go:212] [ 12803(3519): 12803(3519)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:23.487501 789113 usertrap_amd64.go:122] [ 12803(3519): 12803(3519)] Allocate a new trap: 0xc007cf8db0 45 D0714 04:47:23.487526 789113 usertrap_amd64.go:225] [ 12803(3519): 12803(3519)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:23.487738 789113 usertrap_amd64.go:212] [ 12804(3090): 12804(3090)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:23.487797 789113 usertrap_amd64.go:122] [ 12804(3090): 12804(3090)] Allocate a new trap: 0xc009ca6870 45 D0714 04:47:23.487816 789113 usertrap_amd64.go:225] [ 12804(3090): 12804(3090)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:23.489187 789113 task_exit.go:204] [ 12804(3090): 12804(3090)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489248 789113 task_exit.go:204] [ 12804(3090): 12804(3090)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489287 789113 task_signals.go:204] [ 12804(3090): 12807(3092)] Signal 12804, PID: 12807, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489313 789113 task_exit.go:204] [ 12804(3090): 12807(3092)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489323 789113 task_exit.go:204] [ 12804(3090): 12807(3092)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489330 789113 task_exit.go:204] [ 12804(3090): 12807(3092)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.489290 789113 task_signals.go:204] [ 12804(3090): 12806(3091)] Signal 12804, PID: 12806, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489351 789113 task_exit.go:204] [ 12804(3090): 12806(3091)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489667 789113 task_exit.go:204] [ 12804(3090): 12806(3091)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489699 789113 task_exit.go:204] [ 12804(3090): 12806(3091)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.489712 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:23.489740 789113 task_exit.go:204] [ 12803(3519): 12803(3519)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489780 789113 task_exit.go:204] [ 12803(3519): 12803(3519)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489800 789113 task_signals.go:204] [ 12803(3519): 12811(3524)] Signal 12803, PID: 12811, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489812 789113 task_exit.go:204] [ 12803(3519): 12811(3524)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489814 789113 task_signals.go:204] [ 12803(3519): 12805(3520)] Signal 12803, PID: 12805, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489822 789113 task_exit.go:204] [ 12803(3519): 12811(3524)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489838 789113 task_exit.go:204] [ 12803(3519): 12811(3524)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.489867 789113 task_signals.go:204] [ 12803(3519): 12810(3523)] Signal 12803, PID: 12810, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489877 789113 task_exit.go:204] [ 12803(3519): 12810(3523)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489887 789113 task_exit.go:204] [ 12803(3519): 12810(3523)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489893 789113 task_exit.go:204] [ 12803(3519): 12810(3523)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.489904 789113 task_exit.go:204] [ 12803(3519): 12805(3520)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.489800 789113 task_signals.go:204] [ 12803(3519): 12808(3521)] Signal 12803, PID: 12808, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489914 789113 task_exit.go:204] [ 12803(3519): 12805(3520)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.489954 789113 task_exit.go:204] [ 12803(3519): 12805(3520)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.489876 789113 task_signals.go:204] [ 12803(3519): 12809(3522)] Signal 12803, PID: 12809, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:23.489982 789113 task_exit.go:204] [ 12803(3519): 12808(3521)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.490006 789113 task_exit.go:204] [ 12803(3519): 12808(3521)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.490020 789113 task_exit.go:204] [ 12803(3519): 12808(3521)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.490050 789113 task_exit.go:204] [ 12803(3519): 12809(3522)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:23.490221 789113 task_exit.go:204] [ 12804(3090): 12804(3090)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.490434 789113 task_exit.go:204] [ 12803(3519): 12809(3522)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:23.490465 789113 task_exit.go:204] [ 12803(3519): 12809(3522)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:23.490476 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 04:47:23 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00'], 0x43, 0x3, 0x2000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4112) D0714 04:47:23.491418 789113 task_exit.go:204] [ 12803(3519): 12803(3519)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x610a00, 0x24) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:23.493976 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:23.494042 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 37 D0714 04:47:23.494470 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:23.495808 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:23.495851 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 38 D0714 04:47:23.495868 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:23.499185 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:23.499249 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 37 D0714 04:47:23.499366 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:23.501508 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:23.501548 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 39 D0714 04:47:23.501565 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:23.502910 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:23.502938 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 38 D0714 04:47:23.502949 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:23.504214 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:23.504247 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 40 D0714 04:47:23.504260 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:23.504453 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:23.504476 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 41 D0714 04:47:23.504485 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:23.505355 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:23.505488 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:23.505498 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 42 D0714 04:47:23.505518 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 37 D0714 04:47:23.505526 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:23.505570 789113 usertrap_amd64.go:212] [ 12812(3027): 12815(3028)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:23.505593 789113 usertrap_amd64.go:122] [ 12812(3027): 12815(3028)] Allocate a new trap: 0xc0029221e0 43 D0714 04:47:23.505604 789113 usertrap_amd64.go:225] [ 12812(3027): 12815(3028)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:23.505617 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:23.506781 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:23.506820 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 38 D0714 04:47:23.506831 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:23.507676 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:23.507710 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 39 D0714 04:47:23.507721 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:23.512606 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:23.512654 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 39 D0714 04:47:23.512669 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:23.513320 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:23.513354 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 40 D0714 04:47:23.513366 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:23.513682 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:23.513706 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 41 D0714 04:47:23.513716 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:23.514716 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:23.514742 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 42 D0714 04:47:23.514753 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:23.515636 789113 usertrap_amd64.go:212] [ 12813(3093): 12817(3094)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:23.515654 789113 usertrap_amd64.go:122] [ 12813(3093): 12817(3094)] Allocate a new trap: 0xc003b50960 43 D0714 04:47:23.515667 789113 usertrap_amd64.go:225] [ 12813(3093): 12817(3094)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:23.515792 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:23.515821 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 40 D0714 04:47:23.515833 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:23.515989 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:23.516019 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 41 D0714 04:47:23.516030 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:23.516912 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:23.516940 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 42 D0714 04:47:23.516951 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:23.517310 789113 usertrap_amd64.go:212] [ 12814(3525): 12818(3526)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:23.517340 789113 usertrap_amd64.go:122] [ 12814(3525): 12818(3526)] Allocate a new trap: 0xc002922210 43 D0714 04:47:23.517358 789113 usertrap_amd64.go:225] [ 12814(3525): 12818(3526)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:23.519308 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:23.519336 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 44 D0714 04:47:23.519349 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:23.568230 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:23.568285 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 44 D0714 04:47:23.568307 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:23.609850 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:47:23.609911 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 44 D0714 04:47:23.609931 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:47:24.331769 789113 usertrap_amd64.go:212] [ 12812(3027): 12812(3027)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:47:24.331828 789113 usertrap_amd64.go:122] [ 12812(3027): 12812(3027)] Allocate a new trap: 0xc0029221e0 45 D0714 04:47:24.331846 789113 usertrap_amd64.go:225] [ 12812(3027): 12812(3027)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:47:24.332720 789113 task_exit.go:204] [ 12812(3027): 12812(3027)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.332808 789113 task_exit.go:204] [ 12812(3027): 12812(3027)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.332847 789113 task_signals.go:204] [ 12812(3027): 12821(3030)] Signal 12812, PID: 12821, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.332867 789113 task_exit.go:204] [ 12812(3027): 12821(3030)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.332877 789113 task_exit.go:204] [ 12812(3027): 12821(3030)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.332882 789113 task_exit.go:204] [ 12812(3027): 12821(3030)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.340579 789113 usertrap_amd64.go:212] [ 12813(3093): 12813(3093)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:24.340640 789113 usertrap_amd64.go:122] [ 12813(3093): 12813(3093)] Allocate a new trap: 0xc003b50960 45 D0714 04:47:24.340659 789113 usertrap_amd64.go:225] [ 12813(3093): 12813(3093)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:24.341737 789113 task_exit.go:204] [ 12813(3093): 12813(3093)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.341790 789113 task_exit.go:204] [ 12813(3093): 12813(3093)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.341793 789113 task_signals.go:204] [ 12813(3093): 12822(3095)] Signal 12813, PID: 12822, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.341809 789113 task_signals.go:204] [ 12813(3093): 12817(3094)] Signal 12813, PID: 12817, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.341812 789113 task_exit.go:204] [ 12813(3093): 12822(3095)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.341832 789113 task_exit.go:204] [ 12813(3093): 12822(3095)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.341838 789113 task_exit.go:204] [ 12813(3093): 12822(3095)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.341851 789113 task_exit.go:204] [ 12813(3093): 12817(3094)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.342142 789113 task_exit.go:204] [ 12813(3093): 12817(3094)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.342163 789113 task_exit.go:204] [ 12813(3093): 12817(3094)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.342175 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:24.343052 789113 task_exit.go:204] [ 12813(3093): 12813(3093)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:24 executing program 1: msgget$private(0x0, 0x0) (async) r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00'], 0x43, 0x3, 0x2000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4112) D0714 04:47:24.344256 789113 usertrap_amd64.go:212] [ 12814(3525): 12814(3525)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:24.344297 789113 usertrap_amd64.go:122] [ 12814(3525): 12814(3525)] Allocate a new trap: 0xc002922210 45 D0714 04:47:24.344329 789113 usertrap_amd64.go:225] [ 12814(3525): 12814(3525)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:24.345382 789113 task_exit.go:204] [ 12814(3525): 12814(3525)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.345424 789113 task_exit.go:204] [ 12814(3525): 12814(3525)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.345445 789113 task_signals.go:204] [ 12814(3525): 12819(3527)] Signal 12814, PID: 12819, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.345456 789113 task_exit.go:204] [ 12814(3525): 12819(3527)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.345466 789113 task_exit.go:204] [ 12814(3525): 12819(3527)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.345472 789113 task_exit.go:204] [ 12814(3525): 12819(3527)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.345485 789113 task_signals.go:204] [ 12814(3525): 12818(3526)] Signal 12814, PID: 12818, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.345511 789113 task_exit.go:204] [ 12814(3525): 12818(3526)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.345497 789113 task_signals.go:204] [ 12814(3525): 12820(3528)] Signal 12814, PID: 12820, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.345521 789113 task_exit.go:204] [ 12814(3525): 12818(3526)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.345568 789113 task_exit.go:204] [ 12814(3525): 12818(3526)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.345627 789113 task_exit.go:204] [ 12814(3525): 12820(3528)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.346270 789113 task_exit.go:204] [ 12814(3525): 12820(3528)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.346302 789113 task_exit.go:204] [ 12814(3525): 12820(3528)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.346315 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:24.346650 789113 task_exit.go:204] [ 12814(3525): 12814(3525)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.350807 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:24.350838 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 37 D0714 04:47:24.350980 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:24.352593 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad8802a0:sysno 266 04:47:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) getsockname$unix(r4, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x400, 0x3}], 0x1) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000200)=""/212, 0x10000}) r5 = epoll_create(0x3e39) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) getsockname$unix(r6, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0x6e) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) r7 = epoll_create(0x1) fcntl$dupfd(r7, 0x0, r7) read(r7, &(0x7f0000000540)=""/4096, 0x1000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x9, 0x4) D0714 04:47:24.352748 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 38 D0714 04:47:24.352849 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:24.358692 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:24.358748 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 39 D0714 04:47:24.358766 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:24.361785 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:24.361831 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 37 D0714 04:47:24.362031 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:24.363829 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:24.363923 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 38 D0714 04:47:24.363953 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:24.365276 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:24.365308 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 40 D0714 04:47:24.365328 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:24.365581 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:24.365614 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 41 D0714 04:47:24.365627 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:24.366615 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:24.366641 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 42 D0714 04:47:24.366652 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:24.366947 789113 usertrap_amd64.go:212] [ 12823(3096): 12825(3097)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:24.366970 789113 usertrap_amd64.go:122] [ 12823(3096): 12825(3097)] Allocate a new trap: 0xc009734240 43 D0714 04:47:24.366983 789113 usertrap_amd64.go:225] [ 12823(3096): 12825(3097)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:24.370566 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:24.370597 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 39 D0714 04:47:24.370612 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:24.375261 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:24.375305 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 40 D0714 04:47:24.375321 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:24.376009 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:24.376032 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 41 D0714 04:47:24.376043 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:24.376917 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:24.376942 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 42 D0714 04:47:24.376954 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:24.377692 789113 usertrap_amd64.go:212] [ 12824(3529): 12826(3530)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:24.377717 789113 usertrap_amd64.go:122] [ 12824(3529): 12826(3530)] Allocate a new trap: 0xc0070f8960 43 D0714 04:47:24.377730 789113 usertrap_amd64.go:225] [ 12824(3529): 12826(3530)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:24.421588 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:24.421649 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 44 D0714 04:47:24.421670 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:24.433517 789113 usertrap_amd64.go:212] [ 12824(3529): 12824(3529)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:24.433563 789113 usertrap_amd64.go:122] [ 12824(3529): 12824(3529)] Allocate a new trap: 0xc0070f8960 44 D0714 04:47:24.433578 789113 usertrap_amd64.go:225] [ 12824(3529): 12824(3529)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:24.434899 789113 task_exit.go:204] [ 12824(3529): 12824(3529)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.434940 789113 task_signals.go:204] [ 12824(3529): 12828(3531)] Signal 12824, PID: 12828, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.434995 789113 task_exit.go:204] [ 12824(3529): 12828(3531)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.435021 789113 task_exit.go:204] [ 12824(3529): 12828(3531)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.435034 789113 task_exit.go:204] [ 12824(3529): 12828(3531)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.435056 789113 task_exit.go:204] [ 12824(3529): 12824(3529)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.435072 789113 task_signals.go:204] [ 12824(3529): 12826(3530)] Signal 12824, PID: 12826, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.435082 789113 task_exit.go:204] [ 12824(3529): 12826(3530)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.435428 789113 task_exit.go:204] [ 12824(3529): 12826(3530)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.435459 789113 task_exit.go:204] [ 12824(3529): 12826(3530)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.435471 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:24.435785 789113 task_exit.go:204] [ 12824(3529): 12824(3529)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.712802 789113 task_stop.go:138] [ 12799(3104): 12799(3104)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:24.712873 789113 task_stop.go:138] [ 12799(3104): 12801(3105)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:24.712886 789113 task_signals.go:481] [ 12799(3104): 12799(3104)] No task notified of signal 9 D0714 04:47:24.712932 789113 task_signals.go:458] [ 12799(3104): 12799(3104)] Discarding duplicate signal 9 D0714 04:47:24.712929 789113 task_signals.go:204] [ 12799(3104): 12799(3104)] Signal 12799, PID: 12799, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.712965 789113 task_exit.go:204] [ 12799(3104): 12799(3104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.713002 789113 task_exit.go:204] [ 12799(3104): 12799(3104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.713022 789113 task_signals.go:204] [ 12799(3104): 12801(3105)] Signal 12799, PID: 12801, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:24.713043 789113 task_exit.go:204] [ 12799(3104): 12801(3105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:24.713533 789113 task_exit.go:204] [ 12799(3104): 12801(3105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:24.713572 789113 task_exit.go:204] [ 12799(3104): 12801(3105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:24.713591 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:24.714356 789113 task_exit.go:204] [ 12799(3104): 12799(3104)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:24 executing program 0: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) utime(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) r0 = gettid() tkill(r0, 0x1004000000015) (async) r1 = gettid() tkill(r1, 0x1004000000015) (async) timer_create(0x0, &(0x7f0000000180)={0x0, 0xd, 0x2, @tid=r0}, &(0x7f00000001c0)) (async) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/net\x00') (async) prlimit64(r0, 0x1, 0x0, &(0x7f0000000040)) 04:47:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r3 = epoll_create(0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) (async) getsockname$unix(r4, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x400, 0x3}], 0x1) (async) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000200)=""/212, 0x10000}) (async) r5 = epoll_create(0x3e39) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) getsockname$unix(r6, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0x6e) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r7 = epoll_create(0x1) (rerun: 64) fcntl$dupfd(r7, 0x0, r7) (async, rerun: 64) read(r7, &(0x7f0000000540)=""/4096, 0x1000) (async, rerun: 64) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x9, 0x4) D0714 04:47:24.725141 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:24.725196 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 37 D0714 04:47:24.725614 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:24.728068 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:24.728126 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 37 D0714 04:47:24.728139 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:24.728174 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 38 D0714 04:47:24.728193 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:24.728426 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:24.730015 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:24.730046 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 38 D0714 04:47:24.730062 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:24.736732 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:24.736766 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 39 D0714 04:47:24.736779 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:24.740002 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:24.740062 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 40 D0714 04:47:24.740084 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:24.740290 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:24.740320 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 41 D0714 04:47:24.740335 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:24.741545 789113 usertrap_amd64.go:212] [ 12829(3106): 12831(3107)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:24.741588 789113 usertrap_amd64.go:122] [ 12829(3106): 12831(3107)] Allocate a new trap: 0xc009ca6930 42 D0714 04:47:24.741606 789113 usertrap_amd64.go:225] [ 12829(3106): 12831(3107)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:24.741629 789113 usertrap_amd64.go:212] [ 12829(3106): 12829(3106)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:24.741637 789113 usertrap_amd64.go:122] [ 12829(3106): 12829(3106)] Allocate a new trap: 0xc009ca6930 43 D0714 04:47:24.741646 789113 usertrap_amd64.go:225] [ 12829(3106): 12829(3106)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:24.743650 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:24.743677 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 39 D0714 04:47:24.743694 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:24.747967 789113 task_signals.go:470] [ 12829(3106): 12831(3107)] Notified of signal 21 D0714 04:47:24.748004 789113 task_signals.go:808] [ 12829(3106): 12831(3107)] Signal 21: stopping 2 threads in thread group D0714 04:47:24.748016 789113 task_stop.go:118] [ 12829(3106): 12831(3107)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:24.748029 789113 task_signals.go:885] [ 12829(3106): 12829(3106)] Completing group stop D0714 04:47:24.748057 789113 task_stop.go:118] [ 12829(3106): 12829(3106)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:24.748074 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:24.748727 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:24.748765 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 40 D0714 04:47:24.748781 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:24.749282 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:24.749313 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 41 D0714 04:47:24.749328 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:24.750076 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:24.750102 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 42 D0714 04:47:24.750115 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:24.751171 789113 usertrap_amd64.go:212] [ 12830(3532): 12832(3533)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:24.751195 789113 usertrap_amd64.go:122] [ 12830(3532): 12832(3533)] Allocate a new trap: 0xc002922270 43 D0714 04:47:24.751206 789113 usertrap_amd64.go:225] [ 12830(3532): 12832(3533)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:24.756821 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:24.756866 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 44 D0714 04:47:24.756884 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:25.191769 789113 usertrap_amd64.go:212] [ 12823(3096): 12823(3096)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:25.191824 789113 usertrap_amd64.go:122] [ 12823(3096): 12823(3096)] Allocate a new trap: 0xc009734240 45 D0714 04:47:25.191845 789113 usertrap_amd64.go:225] [ 12823(3096): 12823(3096)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:25.193083 789113 task_exit.go:204] [ 12823(3096): 12823(3096)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.193141 789113 task_exit.go:204] [ 12823(3096): 12823(3096)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.193175 789113 task_signals.go:204] [ 12823(3096): 12825(3097)] Signal 12823, PID: 12825, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.193203 789113 task_exit.go:204] [ 12823(3096): 12825(3097)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.193218 789113 task_exit.go:204] [ 12823(3096): 12825(3097)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.193225 789113 task_exit.go:204] [ 12823(3096): 12825(3097)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.193296 789113 task_signals.go:204] [ 12823(3096): 12827(3098)] Signal 12823, PID: 12827, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.193311 789113 task_exit.go:204] [ 12823(3096): 12827(3098)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.193686 789113 task_exit.go:204] [ 12823(3096): 12827(3098)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.193715 789113 task_exit.go:204] [ 12823(3096): 12827(3098)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.193726 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:25.194845 789113 task_exit.go:204] [ 12823(3096): 12823(3096)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:25 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00'], 0x43, 0x3, 0x2000) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4112) D0714 04:47:25.202736 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:25.202779 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 37 D0714 04:47:25.203021 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:25.204214 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:25.204241 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 38 D0714 04:47:25.204253 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:25.208809 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:25.208840 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 39 D0714 04:47:25.208856 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:25.211763 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:25.211794 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 40 D0714 04:47:25.211818 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:25.212422 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:25.212446 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 41 D0714 04:47:25.212458 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:25.213519 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:25.213550 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 42 D0714 04:47:25.213564 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:25.214116 789113 usertrap_amd64.go:212] [ 12836(3099): 12837(3100)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:25.214356 789113 usertrap_amd64.go:122] [ 12836(3099): 12837(3100)] Allocate a new trap: 0xc0032a8360 43 D0714 04:47:25.214422 789113 usertrap_amd64.go:225] [ 12836(3099): 12837(3100)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:25.266257 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:25.266303 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 44 D0714 04:47:25.266326 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:25.574738 789113 usertrap_amd64.go:212] [ 12830(3532): 12830(3532)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:25.574795 789113 usertrap_amd64.go:122] [ 12830(3532): 12830(3532)] Allocate a new trap: 0xc002922270 45 D0714 04:47:25.574815 789113 usertrap_amd64.go:225] [ 12830(3532): 12830(3532)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:25.575895 789113 task_exit.go:204] [ 12830(3532): 12830(3532)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.575972 789113 task_exit.go:204] [ 12830(3532): 12830(3532)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.576140 789113 task_signals.go:204] [ 12830(3532): 12833(3534)] Signal 12830, PID: 12833, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.576178 789113 task_exit.go:204] [ 12830(3532): 12833(3534)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.576194 789113 task_exit.go:204] [ 12830(3532): 12833(3534)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.576201 789113 task_exit.go:204] [ 12830(3532): 12833(3534)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.576331 789113 task_signals.go:204] [ 12830(3532): 12832(3533)] Signal 12830, PID: 12832, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.576356 789113 task_exit.go:204] [ 12830(3532): 12832(3533)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.576368 789113 task_exit.go:204] [ 12830(3532): 12832(3533)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.576374 789113 task_exit.go:204] [ 12830(3532): 12832(3533)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.576415 789113 task_signals.go:204] [ 12830(3532): 12834(3535)] Signal 12830, PID: 12834, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.576428 789113 task_exit.go:204] [ 12830(3532): 12834(3535)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.576438 789113 task_exit.go:204] [ 12830(3532): 12834(3535)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.576444 789113 task_exit.go:204] [ 12830(3532): 12834(3535)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.576475 789113 task_signals.go:204] [ 12830(3532): 12835(3536)] Signal 12830, PID: 12835, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:25.576485 789113 task_exit.go:204] [ 12830(3532): 12835(3536)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:25.577293 789113 task_exit.go:204] [ 12830(3532): 12835(3536)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:25.577376 789113 task_exit.go:204] [ 12830(3532): 12835(3536)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:25.577444 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:25.578074 789113 task_exit.go:204] [ 12830(3532): 12830(3532)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:26.041504 789113 usertrap_amd64.go:212] [ 12836(3099): 12836(3099)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:26.041556 789113 usertrap_amd64.go:122] [ 12836(3099): 12836(3099)] Allocate a new trap: 0xc0032a8360 45 D0714 04:47:26.041570 789113 usertrap_amd64.go:225] [ 12836(3099): 12836(3099)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:26.043550 789113 task_exit.go:204] [ 12836(3099): 12836(3099)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:26.043645 789113 task_exit.go:204] [ 12836(3099): 12836(3099)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:26.043674 789113 task_signals.go:204] [ 12836(3099): 12837(3100)] Signal 12836, PID: 12837, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:26.043700 789113 task_exit.go:204] [ 12836(3099): 12837(3100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:26.043709 789113 task_exit.go:204] [ 12836(3099): 12837(3100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:26.043716 789113 task_exit.go:204] [ 12836(3099): 12837(3100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:26.043681 789113 task_signals.go:204] [ 12836(3099): 12838(3101)] Signal 12836, PID: 12838, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:26.043731 789113 task_exit.go:204] [ 12836(3099): 12838(3101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:26.044176 789113 task_exit.go:204] [ 12836(3099): 12838(3101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:26.044223 789113 task_exit.go:204] [ 12836(3099): 12838(3101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:26.044237 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:26.046276 789113 task_exit.go:204] [ 12836(3099): 12836(3099)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:26.105035 789113 task_signals.go:470] [ 7: 44] Notified of signal 23 D0714 04:47:26.105112 789113 task_signals.go:220] [ 7: 44] Signal 23: delivering to handler D0714 04:47:26.489450 789113 task_signals.go:481] [ 12812(3027): 12812(3027)] No task notified of signal 9 D0714 04:47:26.489677 789113 task_signals.go:458] [ 12812(3027): 12812(3027)] Discarding duplicate signal 9 D0714 04:47:27.157865 789113 task_signals.go:204] [ 12812(3027): 12815(3028)] Signal 12812, PID: 12815, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.157947 789113 task_exit.go:204] [ 12812(3027): 12815(3028)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.157982 789113 task_exit.go:204] [ 12812(3027): 12815(3028)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.157988 789113 task_exit.go:204] [ 12812(3027): 12815(3028)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.158025 789113 task_signals.go:204] [ 12812(3027): 12816(3029)] Signal 12812, PID: 12816, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.158111 789113 task_exit.go:204] [ 12812(3027): 12816(3029)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.158522 789113 task_exit.go:204] [ 12812(3027): 12816(3029)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.158555 789113 task_exit.go:204] [ 12812(3027): 12816(3029)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.158594 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:27.158660 789113 task_exit.go:204] [ 12812(3027): 12812(3027)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:27 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) r1 = epoll_create(0x1) fcntl$dupfd(r1, 0x0, r1) (async) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x23d}, [{}]}, 0x78) 04:47:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r3 = epoll_create(0x1) fcntl$dupfd(r3, 0x0, r3) (async) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) (async) ioctl$AUTOFS_IOC_FAIL(r4, 0x5451, 0x0) getsockname$unix(r4, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x400, 0x3}], 0x1) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000200)=""/212, 0x10000}) (async) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000200)=""/212, 0x10000}) r5 = epoll_create(0x3e39) fcntl$dupfd(r5, 0x0, r5) (async) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$AUTOFS_IOC_FAIL(r6, 0x5451, 0x0) getsockname$unix(r6, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0x6e) (async) getsockname$unix(r6, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0x6e) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) (async) connect$packet(0xffffffffffffffff, 0x0, 0x0) r7 = epoll_create(0x1) fcntl$dupfd(r7, 0x0, r7) read(r7, &(0x7f0000000540)=""/4096, 0x1000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x9, 0x4) (async) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x9, 0x4) 04:47:27 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) D0714 04:47:27.666674 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:27.666739 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 37 D0714 04:47:27.666922 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:27.668162 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:27.668195 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 37 D0714 04:47:27.668306 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:27.668377 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:27.668400 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 38 D0714 04:47:27.668413 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:27.669166 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:27.669191 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 37 D0714 04:47:27.669353 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:27.669353 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:27.669368 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 38 D0714 04:47:27.669378 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:27.670974 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:27.671001 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 38 D0714 04:47:27.671015 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:27.673391 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:27.673414 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 39 D0714 04:47:27.673427 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:27.674881 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:27.674910 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 39 D0714 04:47:27.674939 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:27.675360 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:27.675424 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 39 D0714 04:47:27.675441 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:27.676755 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:27.676809 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 40 D0714 04:47:27.676826 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:27.677041 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:27.677060 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 41 D0714 04:47:27.677073 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:27.678079 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:27.678142 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 42 D0714 04:47:27.678160 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:27.678217 789113 usertrap_amd64.go:212] [ 12839(3102): 12842(3103)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:27.678242 789113 usertrap_amd64.go:122] [ 12839(3102): 12842(3103)] Allocate a new trap: 0xc0032a84b0 43 D0714 04:47:27.678257 789113 usertrap_amd64.go:225] [ 12839(3102): 12842(3103)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:27.678375 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:27.678419 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 40 D0714 04:47:27.678437 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:27.678656 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:27.678682 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 41 D0714 04:47:27.678696 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:27.679240 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:27.679262 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 42 D0714 04:47:27.679281 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:27.679377 789113 usertrap_amd64.go:212] [ 12840(3537): 12843(3538)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:27.679394 789113 usertrap_amd64.go:122] [ 12840(3537): 12843(3538)] Allocate a new trap: 0xc0057ce540 43 D0714 04:47:27.679404 789113 usertrap_amd64.go:225] [ 12840(3537): 12843(3538)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:27.679750 789113 usertrap_amd64.go:212] [ 12839(3102): 12839(3102)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:27.679767 789113 usertrap_amd64.go:122] [ 12839(3102): 12839(3102)] Allocate a new trap: 0xc0032a84b0 44 D0714 04:47:27.679773 789113 usertrap_amd64.go:225] [ 12839(3102): 12839(3102)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:27.680837 789113 task_exit.go:204] [ 12839(3102): 12839(3102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.680893 789113 task_signals.go:204] [ 12839(3102): 12842(3103)] Signal 12839, PID: 12842, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.680914 789113 task_exit.go:204] [ 12839(3102): 12839(3102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.680930 789113 task_exit.go:204] [ 12839(3102): 12842(3103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.681262 789113 task_exit.go:204] [ 12839(3102): 12842(3103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.681290 789113 task_exit.go:204] [ 12839(3102): 12842(3103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.681302 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:27.681384 789113 task_exit.go:204] [ 12839(3102): 12839(3102)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:27 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) D0714 04:47:27.686827 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:27.686867 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 40 D0714 04:47:27.686884 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:27.687166 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:27.687195 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 41 D0714 04:47:27.687208 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:27.687582 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:27.687659 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 37 D0714 04:47:27.687811 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:27.687965 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:27.687982 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 42 D0714 04:47:27.688005 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:27.688416 789113 usertrap_amd64.go:212] [ 12841(3031): 12845(3032)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:27.688460 789113 usertrap_amd64.go:122] [ 12841(3031): 12845(3032)] Allocate a new trap: 0xc003b44ea0 43 D0714 04:47:27.688478 789113 usertrap_amd64.go:225] [ 12841(3031): 12845(3032)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:27.689319 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:27.689379 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 38 D0714 04:47:27.689398 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:27.695811 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:27.695849 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 39 D0714 04:47:27.695864 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:27.698304 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:27.698347 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 40 D0714 04:47:27.698360 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:27.698624 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:27.698651 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 41 D0714 04:47:27.698663 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:27.699715 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:27.699753 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 42 D0714 04:47:27.699767 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:27.699798 789113 usertrap_amd64.go:212] [ 12844(3104): 12846(3105)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:27.699805 789113 usertrap_amd64.go:122] [ 12844(3104): 12846(3105)] Allocate a new trap: 0xc007cf8f90 43 D0714 04:47:27.699813 789113 usertrap_amd64.go:225] [ 12844(3104): 12846(3105)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:27.701927 789113 usertrap_amd64.go:212] [ 12844(3104): 12844(3104)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:27.701966 789113 usertrap_amd64.go:122] [ 12844(3104): 12844(3104)] Allocate a new trap: 0xc007cf8f90 44 D0714 04:47:27.701989 789113 usertrap_amd64.go:225] [ 12844(3104): 12844(3104)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:27.703220 789113 task_exit.go:204] [ 12844(3104): 12844(3104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.703362 789113 task_exit.go:204] [ 12844(3104): 12844(3104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.703410 789113 task_signals.go:204] [ 12844(3104): 12846(3105)] Signal 12844, PID: 12846, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.703465 789113 task_signals.go:204] [ 12844(3104): 12847(3106)] Signal 12844, PID: 12847, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.703505 789113 task_exit.go:204] [ 12844(3104): 12846(3105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.703521 789113 task_exit.go:204] [ 12844(3104): 12846(3105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.703529 789113 task_exit.go:204] [ 12844(3104): 12846(3105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.703556 789113 task_exit.go:204] [ 12844(3104): 12847(3106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.704010 789113 task_exit.go:204] [ 12844(3104): 12847(3106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.704121 789113 task_exit.go:204] [ 12844(3104): 12847(3106)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.704137 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:27.705076 789113 task_exit.go:204] [ 12844(3104): 12844(3104)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:27 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) D0714 04:47:27.714539 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:27.714578 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 37 D0714 04:47:27.714720 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:27.716000 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:27.716024 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 38 D0714 04:47:27.716045 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:27.720456 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:27.720482 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 39 D0714 04:47:27.720496 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:27.722160 789113 task_stop.go:138] [ 12829(3106): 12829(3106)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:27.722201 789113 task_stop.go:138] [ 12829(3106): 12831(3107)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:27.722210 789113 task_signals.go:481] [ 12829(3106): 12829(3106)] No task notified of signal 9 D0714 04:47:27.722248 789113 task_signals.go:204] [ 12829(3106): 12831(3107)] Signal 12829, PID: 12831, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.722266 789113 task_exit.go:204] [ 12829(3106): 12831(3107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.722288 789113 task_exit.go:204] [ 12829(3106): 12831(3107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.722313 789113 task_exit.go:204] [ 12829(3106): 12831(3107)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.722247 789113 task_signals.go:204] [ 12829(3106): 12829(3106)] Signal 12829, PID: 12829, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.722333 789113 task_exit.go:204] [ 12829(3106): 12829(3106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.722374 789113 task_signals.go:458] [ 12829(3106): 12829(3106)] Discarding duplicate signal 9 D0714 04:47:27.722675 789113 task_exit.go:204] [ 12829(3106): 12829(3106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.722710 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:27.723030 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:27.723072 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 40 D0714 04:47:27.723091 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:27.723236 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:27.723252 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 41 D0714 04:47:27.723267 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:27.723843 789113 task_exit.go:204] [ 12829(3106): 12829(3106)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.724056 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:27.724079 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 42 D0714 04:47:27.724091 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) 04:47:27 executing program 0: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) utime(&(0x7f0000000080)='./bus\x00', 0x0) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) r0 = gettid() tkill(r0, 0x1004000000015) r1 = gettid() tkill(r1, 0x1004000000015) (async) timer_create(0x0, &(0x7f0000000180)={0x0, 0xd, 0x2, @tid=r0}, &(0x7f00000001c0)) (async) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/net\x00') (async) prlimit64(r0, 0x1, 0x0, &(0x7f0000000040)) D0714 04:47:27.724379 789113 usertrap_amd64.go:212] [ 12848(3107): 12849(3108)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:27.724394 789113 usertrap_amd64.go:122] [ 12848(3107): 12849(3108)] Allocate a new trap: 0xc0032a8690 43 D0714 04:47:27.724405 789113 usertrap_amd64.go:225] [ 12848(3107): 12849(3108)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:27.725225 789113 usertrap_amd64.go:212] [ 12848(3107): 12848(3107)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:27.725253 789113 usertrap_amd64.go:122] [ 12848(3107): 12848(3107)] Allocate a new trap: 0xc0032a8690 44 D0714 04:47:27.725265 789113 usertrap_amd64.go:225] [ 12848(3107): 12848(3107)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:27.726100 789113 task_exit.go:204] [ 12848(3107): 12848(3107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.726159 789113 task_exit.go:204] [ 12848(3107): 12848(3107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.726191 789113 task_signals.go:204] [ 12848(3107): 12849(3108)] Signal 12848, PID: 12849, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:27.726223 789113 task_exit.go:204] [ 12848(3107): 12849(3108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:27.726591 789113 task_exit.go:204] [ 12848(3107): 12849(3108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:27.726618 789113 task_exit.go:204] [ 12848(3107): 12849(3108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:27.726629 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:27.727003 789113 task_exit.go:204] [ 12848(3107): 12848(3107)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:27 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) r1 = msgget(0x2, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/171}, 0xb3, 0x0, 0x2000) D0714 04:47:27.734054 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:27.734099 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 44 D0714 04:47:27.734116 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:27.735870 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:27.735893 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 37 D0714 04:47:27.736163 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:27.737241 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:27.737267 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 38 D0714 04:47:27.737278 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:27.737823 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:27.737861 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 37 D0714 04:47:27.738085 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:27.740533 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:27.740564 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 38 D0714 04:47:27.740580 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:27.740774 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:27.740801 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 39 D0714 04:47:27.740813 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:27.743114 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:27.743138 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 40 D0714 04:47:27.743149 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:27.743280 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:27.743300 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 41 D0714 04:47:27.743308 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:27.743758 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:27.743783 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 42 D0714 04:47:27.743793 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:27.743947 789113 usertrap_amd64.go:212] [ 12851(3109): 12856(3110)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:27.743972 789113 usertrap_amd64.go:122] [ 12851(3109): 12856(3110)] Allocate a new trap: 0xc0032a86c0 43 D0714 04:47:27.743983 789113 usertrap_amd64.go:225] [ 12851(3109): 12856(3110)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:27.746155 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:27.746179 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 39 D0714 04:47:27.746189 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:27.748883 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:27.748908 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 40 D0714 04:47:27.748917 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:27.749219 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:27.749235 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 41 D0714 04:47:27.749241 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:27.750058 789113 usertrap_amd64.go:212] [ 12850(3108): 12850(3108)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:27.750080 789113 usertrap_amd64.go:122] [ 12850(3108): 12850(3108)] Allocate a new trap: 0xc0057ce570 42 D0714 04:47:27.750090 789113 usertrap_amd64.go:225] [ 12850(3108): 12850(3108)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:27.750164 789113 usertrap_amd64.go:212] [ 12850(3108): 12857(3109)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:27.750180 789113 usertrap_amd64.go:122] [ 12850(3108): 12857(3109)] Allocate a new trap: 0xc0057ce570 43 D0714 04:47:27.750189 789113 usertrap_amd64.go:225] [ 12850(3108): 12857(3109)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:27.751706 789113 task_signals.go:470] [ 12850(3108): 12857(3109)] Notified of signal 21 D0714 04:47:27.751749 789113 task_signals.go:808] [ 12850(3108): 12857(3109)] Signal 21: stopping 3 threads in thread group D0714 04:47:27.751761 789113 task_stop.go:118] [ 12850(3108): 12857(3109)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:27.751773 789113 task_stop.go:118] [ 12850(3108): 12858(3110)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:27.751790 789113 task_signals.go:885] [ 12850(3108): 12850(3108)] Completing group stop D0714 04:47:27.751806 789113 task_stop.go:118] [ 12850(3108): 12850(3108)] Entering internal stop (*kernel.groupStop)(nil) D0714 04:47:27.751819 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:27.793480 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c42bf2e:sysno 230 D0714 04:47:27.793554 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 44 D0714 04:47:27.793576 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c42bf2e trap addr 69dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0714 04:47:27.796341 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:27.796399 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 44 D0714 04:47:27.796419 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:28.505553 789113 usertrap_amd64.go:212] [ 12840(3537): 12840(3537)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:28.505613 789113 usertrap_amd64.go:122] [ 12840(3537): 12840(3537)] Allocate a new trap: 0xc0057ce540 45 D0714 04:47:28.505644 789113 usertrap_amd64.go:225] [ 12840(3537): 12840(3537)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:28.506479 789113 task_exit.go:204] [ 12840(3537): 12840(3537)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.506532 789113 task_exit.go:204] [ 12840(3537): 12840(3537)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.506611 789113 task_signals.go:204] [ 12840(3537): 12853(3540)] Signal 12840, PID: 12853, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:28.506634 789113 task_exit.go:204] [ 12840(3537): 12853(3540)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.506646 789113 task_exit.go:204] [ 12840(3537): 12853(3540)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.506653 789113 task_exit.go:204] [ 12840(3537): 12853(3540)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.506633 789113 task_signals.go:204] [ 12840(3537): 12852(3539)] Signal 12840, PID: 12852, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:28.506696 789113 task_exit.go:204] [ 12840(3537): 12852(3539)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.506730 789113 task_exit.go:204] [ 12840(3537): 12852(3539)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.506740 789113 task_exit.go:204] [ 12840(3537): 12852(3539)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.506769 789113 task_signals.go:204] [ 12840(3537): 12843(3538)] Signal 12840, PID: 12843, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:28.506802 789113 task_exit.go:204] [ 12840(3537): 12843(3538)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.506894 789113 usertrap_amd64.go:212] [ 12841(3031): 12841(3031)] Found the pattern at ip 55e82c3ffa13:sysno 3 D0714 04:47:28.506929 789113 usertrap_amd64.go:122] [ 12841(3031): 12841(3031)] Allocate a new trap: 0xc003b44ea0 45 D0714 04:47:28.506944 789113 usertrap_amd64.go:225] [ 12841(3031): 12841(3031)] Apply the binary patch addr 55e82c3ffa13 trap addr 69e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 158 6 0]) D0714 04:47:28.507250 789113 task_exit.go:204] [ 12840(3537): 12843(3538)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.507275 789113 task_exit.go:204] [ 12840(3537): 12843(3538)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.507285 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:28.508083 789113 task_exit.go:204] [ 12841(3031): 12841(3031)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.508122 789113 task_exit.go:204] [ 12841(3031): 12841(3031)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.508162 789113 task_exit.go:204] [ 12840(3537): 12840(3537)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.508604 789113 task_signals.go:204] [ 12841(3031): 12855(3034)] Signal 12841, PID: 12855, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:28.508638 789113 task_exit.go:204] [ 12841(3031): 12855(3034)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.508655 789113 task_exit.go:204] [ 12841(3031): 12855(3034)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.508662 789113 task_exit.go:204] [ 12841(3031): 12855(3034)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty, 0x1f}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "554ad5c58e21e01d", "743f939605f0826b4cb4fd3c8980da9a", "6c50abf4", "fc767233aa144f17"}, 0x28) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:28.516114 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:28.516184 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 37 D0714 04:47:28.516432 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:28.517389 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:28.517432 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 38 D0714 04:47:28.517449 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:28.522179 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:28.522206 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 39 D0714 04:47:28.522218 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:28.524487 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:28.524519 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 40 D0714 04:47:28.524535 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:28.524700 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:28.524721 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 41 D0714 04:47:28.524732 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:28.525348 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:28.525372 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 42 D0714 04:47:28.525385 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:28.525496 789113 usertrap_amd64.go:212] [ 12859(3541): 12860(3542)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:28.525515 789113 usertrap_amd64.go:122] [ 12859(3541): 12860(3542)] Allocate a new trap: 0xc007cf8fc0 43 D0714 04:47:28.525523 789113 usertrap_amd64.go:225] [ 12859(3541): 12860(3542)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:28.573594 789113 usertrap_amd64.go:212] [ 12851(3109): 12851(3109)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:28.573641 789113 usertrap_amd64.go:122] [ 12851(3109): 12851(3109)] Allocate a new trap: 0xc0032a86c0 45 D0714 04:47:28.573659 789113 usertrap_amd64.go:225] [ 12851(3109): 12851(3109)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:28.574758 789113 task_exit.go:204] [ 12851(3109): 12851(3109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.574807 789113 task_exit.go:204] [ 12851(3109): 12851(3109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.574833 789113 task_signals.go:204] [ 12851(3109): 12856(3110)] Signal 12851, PID: 12856, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:28.574846 789113 task_exit.go:204] [ 12851(3109): 12856(3110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:28.575157 789113 task_exit.go:204] [ 12851(3109): 12856(3110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:28.575176 789113 task_exit.go:204] [ 12851(3109): 12856(3110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.575186 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:28.576150 789113 task_exit.go:204] [ 12851(3109): 12851(3109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:28.581313 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:28.581360 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 44 D0714 04:47:28.581384 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:29.104760 789113 task_signals.go:470] [ 7: 31] Notified of signal 23 D0714 04:47:29.104859 789113 task_signals.go:220] [ 7: 31] Signal 23: delivering to handler D0714 04:47:29.353512 789113 usertrap_amd64.go:212] [ 12859(3541): 12859(3541)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:29.353569 789113 usertrap_amd64.go:122] [ 12859(3541): 12859(3541)] Allocate a new trap: 0xc007cf8fc0 45 D0714 04:47:29.353588 789113 usertrap_amd64.go:225] [ 12859(3541): 12859(3541)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:29.354517 789113 task_exit.go:204] [ 12859(3541): 12859(3541)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:29.354577 789113 task_exit.go:204] [ 12859(3541): 12859(3541)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:29.354608 789113 task_signals.go:204] [ 12859(3541): 12860(3542)] Signal 12859, PID: 12860, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:29.354684 789113 task_exit.go:204] [ 12859(3541): 12860(3542)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:29.354703 789113 task_exit.go:204] [ 12859(3541): 12860(3542)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:29.354710 789113 task_exit.go:204] [ 12859(3541): 12860(3542)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:29.354625 789113 task_signals.go:204] [ 12859(3541): 12861(3543)] Signal 12859, PID: 12861, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:29.354740 789113 task_exit.go:204] [ 12859(3541): 12861(3543)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:29.355146 789113 task_exit.go:204] [ 12859(3541): 12861(3543)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:29.355179 789113 task_exit.go:204] [ 12859(3541): 12861(3543)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:29.355201 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:29.355842 789113 task_exit.go:204] [ 12859(3541): 12859(3541)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:30.764537 789113 task_stop.go:138] [ 12850(3108): 12850(3108)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:30.764598 789113 task_stop.go:138] [ 12850(3108): 12857(3109)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:30.764606 789113 task_stop.go:138] [ 12850(3108): 12858(3110)] Leaving internal stop (*kernel.groupStop)(nil) D0714 04:47:30.764615 789113 task_signals.go:481] [ 12850(3108): 12850(3108)] No task notified of signal 9 D0714 04:47:30.764611 789113 task_signals.go:481] [ 12841(3031): 12841(3031)] No task notified of signal 9 D0714 04:47:30.764662 789113 task_signals.go:204] [ 12850(3108): 12850(3108)] Signal 12850, PID: 12850, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:30.764694 789113 task_exit.go:204] [ 12850(3108): 12850(3108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:30.764694 789113 task_signals.go:204] [ 12850(3108): 12858(3110)] Signal 12850, PID: 12858, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:30.764741 789113 task_signals.go:458] [ 12850(3108): 12850(3108)] Discarding duplicate signal 9 D0714 04:47:30.764776 789113 task_signals.go:204] [ 12850(3108): 12857(3109)] Signal 12850, PID: 12857, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:30.764801 789113 task_signals.go:458] [ 12841(3031): 12841(3031)] Discarding duplicate signal 9 D0714 04:47:30.764820 789113 task_exit.go:204] [ 12850(3108): 12850(3108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:30.764843 789113 task_exit.go:204] [ 12850(3108): 12858(3110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:30.764852 789113 task_exit.go:204] [ 12850(3108): 12858(3110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:30.764861 789113 task_exit.go:204] [ 12850(3108): 12858(3110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:30.764871 789113 task_exit.go:204] [ 12850(3108): 12857(3109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:30.765405 789113 task_exit.go:204] [ 12850(3108): 12857(3109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:30.765436 789113 task_exit.go:204] [ 12850(3108): 12857(3109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:30.765454 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:30.767225 789113 task_exit.go:204] [ 12850(3108): 12850(3108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:31.616441 789113 task_signals.go:204] [ 12841(3031): 12845(3032)] Signal 12841, PID: 12845, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:31.616530 789113 task_exit.go:204] [ 12841(3031): 12845(3032)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:31.616567 789113 task_exit.go:204] [ 12841(3031): 12845(3032)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:31.616575 789113 task_exit.go:204] [ 12841(3031): 12845(3032)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:31.616620 789113 task_signals.go:204] [ 12841(3031): 12854(3033)] Signal 12841, PID: 12854, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:31.616657 789113 task_exit.go:204] [ 12841(3031): 12854(3033)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:31.617108 789113 task_exit.go:204] [ 12841(3031): 12854(3033)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:31.617137 789113 task_exit.go:204] [ 12841(3031): 12854(3033)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:31.617158 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:31.617203 789113 task_exit.go:204] [ 12841(3031): 12841(3031)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:31 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) r1 = msgget(0x2, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/171}, 0xb3, 0x0, 0x2000) 04:47:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty, 0x1f}, 0x1c) (async) listen(r0, 0x0) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "554ad5c58e21e01d", "743f939605f0826b4cb4fd3c8980da9a", "6c50abf4", "fc767233aa144f17"}, 0x28) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:47:31 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xfffffffffffffffe}) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x8, 0x8000000000000001}) fallocate(r0, 0x0, 0x0, 0x100000001) 04:47:31 executing program 0: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=@fuse_with_parent={0x18, 0x82, {{0x1f, 0x0, 0x9}, {0x2, 0x6}}}, 0x420000) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000280)={{r0}, 0x2, &(0x7f0000000240)=[0x4, 0x9], 0x5, 0x0, 0x1}) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0xffffffff) utime(&(0x7f0000000040)='./bus\x00', 0x0) utime(&(0x7f00000001c0)='./bus/file0/file0\x00', &(0x7f0000000200)={0x2, 0x6}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:32.115419 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:32.115467 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 37 D0714 04:47:32.115565 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:32.115957 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 37 D0714 04:47:32.115688 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:32.116132 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:32.117192 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:32.117221 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 38 D0714 04:47:32.117235 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:32.117713 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:32.117735 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 38 D0714 04:47:32.117747 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:32.118433 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:32.118504 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 37 D0714 04:47:32.118648 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:32.120215 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:32.120246 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 38 D0714 04:47:32.120262 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:32.122339 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:32.122366 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 39 D0714 04:47:32.122378 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:32.124216 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:32.124256 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 37 D0714 04:47:32.124416 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:32.125071 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:32.125205 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 39 D0714 04:47:32.125241 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:32.125481 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:32.125532 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 40 D0714 04:47:32.125547 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:32.125924 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:32.125961 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:32.125986 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 39 D0714 04:47:32.126001 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:32.125972 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 41 D0714 04:47:32.126092 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:32.126748 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:32.126782 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 42 D0714 04:47:32.126798 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:32.126987 789113 usertrap_amd64.go:212] [ 12863(3544): 12866(3545)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:32.127016 789113 usertrap_amd64.go:122] [ 12863(3544): 12866(3545)] Allocate a new trap: 0xc0057ce5d0 43 D0714 04:47:32.127035 789113 usertrap_amd64.go:225] [ 12863(3544): 12866(3545)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:32.127393 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:32.127421 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 38 D0714 04:47:32.127439 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:32.129189 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:32.129240 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 40 D0714 04:47:32.129261 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:32.130887 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:32.130912 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 40 D0714 04:47:32.130923 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:32.131059 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:32.131077 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 41 D0714 04:47:32.131098 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:32.131923 789113 usertrap_amd64.go:212] [ 12864(3111): 12868(3112)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:32.131942 789113 usertrap_amd64.go:122] [ 12864(3111): 12868(3112)] Allocate a new trap: 0xc0070f89f0 42 D0714 04:47:32.131953 789113 usertrap_amd64.go:225] [ 12864(3111): 12868(3112)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:32.131964 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:32.131972 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 43 D0714 04:47:32.131981 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:32.131993 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:32.132000 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 41 D0714 04:47:32.132008 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:32.132643 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:32.132691 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 39 D0714 04:47:32.132696 789113 usertrap_amd64.go:212] [ 12862(3111): 12869(3112)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:32.132713 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:32.132718 789113 usertrap_amd64.go:122] [ 12862(3111): 12869(3112)] Allocate a new trap: 0xc009ca6990 42 D0714 04:47:32.132737 789113 usertrap_amd64.go:225] [ 12862(3111): 12869(3112)] Apply the binary patch addr 5560ad8550b0 trap addr 63d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:32.132759 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:32.132766 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 43 D0714 04:47:32.132774 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad8559a0 trap addr 63d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:32.134455 789113 usertrap_amd64.go:212] [ 12864(3111): 12864(3111)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:32.134480 789113 usertrap_amd64.go:122] [ 12864(3111): 12864(3111)] Allocate a new trap: 0xc0070f89f0 44 D0714 04:47:32.134499 789113 usertrap_amd64.go:225] [ 12864(3111): 12864(3111)] Apply the binary patch addr 558472d39a13 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:32.135864 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:32.135883 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 40 D0714 04:47:32.135894 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:32.135894 789113 task_exit.go:204] [ 12864(3111): 12864(3111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.135935 789113 task_exit.go:204] [ 12864(3111): 12864(3111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.135966 789113 task_signals.go:204] [ 12864(3111): 12868(3112)] Signal 12864, PID: 12868, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.135995 789113 task_exit.go:204] [ 12864(3111): 12868(3112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.136417 789113 task_exit.go:204] [ 12864(3111): 12868(3112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.136461 789113 task_exit.go:204] [ 12864(3111): 12868(3112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.136476 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:32.136613 789113 task_exit.go:204] [ 12864(3111): 12864(3111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.136672 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:32.136685 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 41 D0714 04:47:32.136696 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:32.137259 789113 usertrap_amd64.go:212] [ 12865(3035): 12865(3035)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:32.137290 789113 usertrap_amd64.go:122] [ 12865(3035): 12865(3035)] Allocate a new trap: 0xc009ca69c0 42 D0714 04:47:32.137306 789113 usertrap_amd64.go:225] [ 12865(3035): 12865(3035)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) 04:47:32 executing program 0: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=@fuse_with_parent={0x18, 0x82, {{0x1f, 0x0, 0x9}, {0x2, 0x6}}}, 0x420000) (async) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000280)={{r0}, 0x2, &(0x7f0000000240)=[0x4, 0x9], 0x5, 0x0, 0x1}) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0xffffffff) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) utime(&(0x7f00000001c0)='./bus/file0/file0\x00', &(0x7f0000000200)={0x2, 0x6}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:32.137725 789113 usertrap_amd64.go:212] [ 12865(3035): 12870(3036)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:32.137763 789113 usertrap_amd64.go:122] [ 12865(3035): 12870(3036)] Allocate a new trap: 0xc009ca69c0 43 D0714 04:47:32.137778 789113 usertrap_amd64.go:225] [ 12865(3035): 12870(3036)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:32.138443 789113 task_signals.go:470] [ 12865(3035): 12870(3036)] Notified of signal 25 D0714 04:47:32.138492 789113 task_signals.go:204] [ 12865(3035): 12870(3036)] Signal 12865, PID: 12870, TID: 0, fault addr: 0x19: terminating thread group D0714 04:47:32.138542 789113 task_exit.go:204] [ 12865(3035): 12870(3036)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.138585 789113 task_exit.go:204] [ 12865(3035): 12870(3036)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.138595 789113 task_exit.go:204] [ 12865(3035): 12870(3036)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.138627 789113 task_signals.go:204] [ 12865(3035): 12865(3035)] Signal 12865, PID: 12865, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.138640 789113 task_exit.go:204] [ 12865(3035): 12865(3035)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.139154 789113 task_exit.go:204] [ 12865(3035): 12865(3035)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.139196 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:32.140368 789113 task_exit.go:204] [ 12865(3035): 12865(3035)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:32 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xfffffffffffffffe}) (async) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x8, 0x8000000000000001}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) D0714 04:47:32.146106 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:32.146175 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 37 D0714 04:47:32.146322 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:32.151946 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:32.151986 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 37 D0714 04:47:32.152305 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:32.153629 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:32.153660 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 38 D0714 04:47:32.153680 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:32.153817 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:32.153847 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 38 D0714 04:47:32.153859 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:32.158931 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:32.158959 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 39 D0714 04:47:32.158971 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:32.159895 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:32.159921 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 39 D0714 04:47:32.159933 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:32.163138 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:32.163165 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 40 D0714 04:47:32.163183 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:32.165931 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:32.165975 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 40 D0714 04:47:32.165988 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:32.166792 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:32.166810 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 41 D0714 04:47:32.166821 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:32.168114 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:32.168164 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 41 D0714 04:47:32.168181 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:32.168236 789113 usertrap_amd64.go:212] [ 12872(3037): 12872(3037)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:32.168255 789113 usertrap_amd64.go:122] [ 12872(3037): 12872(3037)] Allocate a new trap: 0xc002922390 42 D0714 04:47:32.168274 789113 usertrap_amd64.go:225] [ 12872(3037): 12872(3037)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:32.168610 789113 usertrap_amd64.go:212] [ 12872(3037): 12873(3038)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:32.168640 789113 usertrap_amd64.go:122] [ 12872(3037): 12873(3038)] Allocate a new trap: 0xc002922390 43 D0714 04:47:32.168654 789113 usertrap_amd64.go:225] [ 12872(3037): 12873(3038)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:32.169913 789113 task_signals.go:470] [ 12872(3037): 12873(3038)] Notified of signal 25 D0714 04:47:32.169971 789113 task_signals.go:204] [ 12872(3037): 12873(3038)] Signal 12872, PID: 12873, TID: 0, fault addr: 0x19: terminating thread group D0714 04:47:32.169989 789113 task_exit.go:204] [ 12872(3037): 12873(3038)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.170061 789113 task_signals.go:204] [ 12872(3037): 12874(3039)] Signal 12872, PID: 12874, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.170084 789113 task_exit.go:204] [ 12872(3037): 12874(3039)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.170100 789113 task_exit.go:204] [ 12872(3037): 12874(3039)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.170112 789113 task_exit.go:204] [ 12872(3037): 12874(3039)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.170106 789113 task_signals.go:204] [ 12872(3037): 12872(3037)] Signal 12872, PID: 12872, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.170128 789113 task_exit.go:204] [ 12872(3037): 12872(3037)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.170170 789113 task_exit.go:204] [ 12872(3037): 12873(3038)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.170184 789113 task_exit.go:204] [ 12872(3037): 12873(3038)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.170491 789113 task_exit.go:204] [ 12872(3037): 12872(3037)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.170518 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:32.170537 789113 task_exit.go:204] [ 12872(3037): 12872(3037)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.171740 789113 usertrap_amd64.go:212] [ 12871(3113): 12871(3113)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:32.171770 789113 usertrap_amd64.go:122] [ 12871(3113): 12871(3113)] Allocate a new trap: 0xc002922360 42 D0714 04:47:32.171784 789113 usertrap_amd64.go:225] [ 12871(3113): 12871(3113)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:32.171884 789113 usertrap_amd64.go:212] [ 12871(3113): 12875(3114)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:32.171943 789113 usertrap_amd64.go:122] [ 12871(3113): 12875(3114)] Allocate a new trap: 0xc002922360 43 D0714 04:47:32.171963 789113 usertrap_amd64.go:225] [ 12871(3113): 12875(3114)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) 04:47:32 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xfffffffffffffffe}) (async) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x8, 0x8000000000000001}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) D0714 04:47:32.175923 789113 task_signals.go:470] [ 12871(3113): 12875(3114)] Notified of signal 25 D0714 04:47:32.175965 789113 task_signals.go:204] [ 12871(3113): 12875(3114)] Signal 12871, PID: 12875, TID: 0, fault addr: 0x19: terminating thread group D0714 04:47:32.175983 789113 task_exit.go:204] [ 12871(3113): 12875(3114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.175998 789113 task_exit.go:204] [ 12871(3113): 12875(3114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.176005 789113 task_exit.go:204] [ 12871(3113): 12875(3114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.176047 789113 task_signals.go:204] [ 12871(3113): 12876(3115)] Signal 12871, PID: 12876, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.176063 789113 task_exit.go:204] [ 12871(3113): 12876(3115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.176073 789113 task_exit.go:204] [ 12871(3113): 12876(3115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.176079 789113 task_exit.go:204] [ 12871(3113): 12876(3115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.176106 789113 task_signals.go:204] [ 12871(3113): 12871(3113)] Signal 12871, PID: 12871, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.176129 789113 task_exit.go:204] [ 12871(3113): 12871(3113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.176551 789113 task_exit.go:204] [ 12871(3113): 12871(3113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.176577 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:32.176654 789113 task_exit.go:204] [ 12871(3113): 12871(3113)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:32 executing program 0: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=@fuse_with_parent={0x18, 0x82, {{0x1f, 0x0, 0x9}, {0x2, 0x6}}}, 0x420000) (async) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000280)={{r0}, 0x2, &(0x7f0000000240)=[0x4, 0x9], 0x5, 0x0, 0x1}) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0xffffffff) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) utime(&(0x7f00000001c0)='./bus/file0/file0\x00', &(0x7f0000000200)={0x2, 0x6}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:32.179894 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:32.179949 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 37 D0714 04:47:32.180098 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:32.181974 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:32.182001 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 38 D0714 04:47:32.182018 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:32.186457 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:32.186527 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 44 D0714 04:47:32.186550 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:32.186733 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:32.186771 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 39 D0714 04:47:32.186786 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:32.186872 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:32.186894 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 37 D0714 04:47:32.186970 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:32.189407 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:32.189441 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 38 D0714 04:47:32.189452 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:32.189453 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:32.189485 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 40 D0714 04:47:32.189502 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:32.189712 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:32.189774 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 41 D0714 04:47:32.189848 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:32.190731 789113 usertrap_amd64.go:212] [ 12877(3040): 12877(3040)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:32.190772 789113 usertrap_amd64.go:122] [ 12877(3040): 12877(3040)] Allocate a new trap: 0xc009ca6ab0 42 D0714 04:47:32.190789 789113 usertrap_amd64.go:225] [ 12877(3040): 12877(3040)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:32.190943 789113 usertrap_amd64.go:212] [ 12877(3040): 12881(3041)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:32.190976 789113 usertrap_amd64.go:122] [ 12877(3040): 12881(3041)] Allocate a new trap: 0xc009ca6ab0 43 D0714 04:47:32.190998 789113 usertrap_amd64.go:225] [ 12877(3040): 12881(3041)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:32.191837 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:32.191875 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 44 D0714 04:47:32.191890 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:32.192095 789113 task_signals.go:470] [ 12877(3040): 12881(3041)] Notified of signal 25 D0714 04:47:32.192133 789113 task_signals.go:204] [ 12877(3040): 12881(3041)] Signal 12877, PID: 12881, TID: 0, fault addr: 0x19: terminating thread group D0714 04:47:32.192163 789113 task_exit.go:204] [ 12877(3040): 12881(3041)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.192184 789113 task_exit.go:204] [ 12877(3040): 12881(3041)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.192199 789113 task_exit.go:204] [ 12877(3040): 12881(3041)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.192231 789113 task_signals.go:204] [ 12877(3040): 12882(3042)] Signal 12877, PID: 12882, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.192248 789113 task_exit.go:204] [ 12877(3040): 12882(3042)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.192244 789113 task_signals.go:204] [ 12877(3040): 12877(3040)] Signal 12877, PID: 12877, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.192258 789113 task_exit.go:204] [ 12877(3040): 12882(3042)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.192265 789113 task_exit.go:204] [ 12877(3040): 12882(3042)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.192278 789113 task_exit.go:204] [ 12877(3040): 12877(3040)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.192685 789113 task_exit.go:204] [ 12877(3040): 12877(3040)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.192705 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:32.193627 789113 task_exit.go:204] [ 12877(3040): 12877(3040)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.196310 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:32.196338 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 39 D0714 04:47:32.196351 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:32.199230 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:32.199252 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 40 D0714 04:47:32.199271 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:32.199364 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:32.199377 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 41 D0714 04:47:32.199386 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:32.200052 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:32.200076 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 42 D0714 04:47:32.200087 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:32.200157 789113 usertrap_amd64.go:212] [ 12878(3116): 12883(3117)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:32.200181 789113 usertrap_amd64.go:122] [ 12878(3116): 12883(3117)] Allocate a new trap: 0xc003b509c0 43 D0714 04:47:32.200199 789113 usertrap_amd64.go:225] [ 12878(3116): 12883(3117)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:32.201950 789113 usertrap_amd64.go:212] [ 12878(3116): 12878(3116)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:32.201994 789113 usertrap_amd64.go:122] [ 12878(3116): 12878(3116)] Allocate a new trap: 0xc003b509c0 44 D0714 04:47:32.202005 789113 usertrap_amd64.go:225] [ 12878(3116): 12878(3116)] Apply the binary patch addr 558472d39a13 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:32.202555 789113 task_exit.go:204] [ 12878(3116): 12878(3116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.202590 789113 task_exit.go:204] [ 12878(3116): 12878(3116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.202603 789113 task_signals.go:204] [ 12878(3116): 12883(3117)] Signal 12878, PID: 12883, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.202618 789113 task_signals.go:204] [ 12878(3116): 12884(3118)] Signal 12878, PID: 12884, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.202623 789113 task_exit.go:204] [ 12878(3116): 12883(3117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.202633 789113 task_exit.go:204] [ 12878(3116): 12884(3118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.202652 789113 task_exit.go:204] [ 12878(3116): 12884(3118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.202672 789113 task_exit.go:204] [ 12878(3116): 12884(3118)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.203052 789113 task_exit.go:204] [ 12878(3116): 12883(3117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.203091 789113 task_exit.go:204] [ 12878(3116): 12883(3117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.203102 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:32.204012 789113 task_exit.go:204] [ 12878(3116): 12878(3116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.954408 789113 usertrap_amd64.go:212] [ 12863(3544): 12863(3544)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:32.954479 789113 usertrap_amd64.go:122] [ 12863(3544): 12863(3544)] Allocate a new trap: 0xc0057ce5d0 45 D0714 04:47:32.954502 789113 usertrap_amd64.go:225] [ 12863(3544): 12863(3544)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:32.955486 789113 usertrap_amd64.go:212] [ 12862(3111): 12862(3111)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:32.955552 789113 usertrap_amd64.go:122] [ 12862(3111): 12862(3111)] Allocate a new trap: 0xc009ca6990 45 D0714 04:47:32.955570 789113 usertrap_amd64.go:225] [ 12862(3111): 12862(3111)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:32.955947 789113 task_exit.go:204] [ 12863(3544): 12863(3544)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.955995 789113 task_signals.go:204] [ 12863(3544): 12867(3546)] Signal 12863, PID: 12867, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.956021 789113 task_signals.go:204] [ 12863(3544): 12879(3547)] Signal 12863, PID: 12879, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.956031 789113 task_signals.go:204] [ 12863(3544): 12880(3548)] Signal 12863, PID: 12880, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.956038 789113 task_exit.go:204] [ 12863(3544): 12863(3544)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956049 789113 task_exit.go:204] [ 12863(3544): 12867(3546)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956064 789113 task_exit.go:204] [ 12863(3544): 12867(3546)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956068 789113 task_exit.go:204] [ 12863(3544): 12867(3546)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.956082 789113 task_exit.go:204] [ 12863(3544): 12879(3547)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956113 789113 task_exit.go:204] [ 12863(3544): 12879(3547)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956129 789113 task_exit.go:204] [ 12863(3544): 12879(3547)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.956142 789113 task_exit.go:204] [ 12863(3544): 12880(3548)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956153 789113 task_exit.go:204] [ 12863(3544): 12880(3548)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956167 789113 task_exit.go:204] [ 12863(3544): 12880(3548)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.956253 789113 task_signals.go:204] [ 12863(3544): 12866(3545)] Signal 12863, PID: 12866, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.956279 789113 task_exit.go:204] [ 12863(3544): 12866(3545)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956501 789113 task_exit.go:204] [ 12862(3111): 12862(3111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956531 789113 task_exit.go:204] [ 12862(3111): 12862(3111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956548 789113 task_signals.go:204] [ 12862(3111): 12869(3112)] Signal 12862, PID: 12869, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:32.956556 789113 task_exit.go:204] [ 12862(3111): 12869(3112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:32.956629 789113 task_exit.go:204] [ 12863(3544): 12866(3545)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956657 789113 task_exit.go:204] [ 12863(3544): 12866(3545)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.956669 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:32.956794 789113 task_exit.go:204] [ 12862(3111): 12869(3112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:32.956822 789113 task_exit.go:204] [ 12862(3111): 12869(3112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.956829 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:32.957860 789113 task_exit.go:204] [ 12862(3111): 12862(3111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:32.957917 789113 task_exit.go:204] [ 12863(3544): 12863(3544)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:32 executing program 1: r0 = msgget$private(0x0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000280)=""/4096) (async) r1 = msgget(0x2, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/171}, 0xb3, 0x0, 0x2000) 04:47:32 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0xf7, 0x1000000000010007) fallocate(r0, 0x0, 0x0, 0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x23d}, [{}]}, 0x78) prlimit64(0x0, 0x1, &(0x7f0000000200)={0x6c}, &(0x7f0000000240)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x8, 0x15, 0x200}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f00000001c0)) r2 = epoll_create(0x1) fcntl$dupfd(r2, 0x0, r2) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:crack_db_t:s0\x00', 0x20, 0x1) 04:47:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty, 0x1f}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "554ad5c58e21e01d", "743f939605f0826b4cb4fd3c8980da9a", "6c50abf4", "fc767233aa144f17"}, 0x28) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:47:32 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)=0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r3, 0x5421, &(0x7f0000000080)=0x0) setreuid(r4, 0x0) statx(r3, &(0x7f00000001c0)='./bus/file0\x00', 0x800, 0x7ff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus/file0/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x2}, [{0x2, 0x3, r4}, {0x2, 0x3ecc57621b0a95f4, r5}], {0x4, 0x7}, [{0x8, 0x2, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x2, r1}, {0x8, 0x1, r2}], {}, {0x20, 0x5}}, 0x54, 0x3) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:32.963243 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:32.963295 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 37 D0714 04:47:32.963454 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:32.964012 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:32.964034 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 37 D0714 04:47:32.964157 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:32.964431 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:32.964455 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 38 D0714 04:47:32.964468 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:32.965293 789113 usertrap_amd64.go:212] [ 12888(3113): 12888(3113)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:32.965364 789113 usertrap_amd64.go:122] [ 12888(3113): 12888(3113)] Allocate a new trap: 0xc0029223c0 37 D0714 04:47:32.965487 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:32.965514 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 38 D0714 04:47:32.965528 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:32.965517 789113 usertrap_amd64.go:225] [ 12888(3113): 12888(3113)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:32.965850 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:32.965882 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 37 D0714 04:47:32.966022 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:32.966942 789113 usertrap_amd64.go:212] [ 12888(3113): 12888(3113)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:32.966974 789113 usertrap_amd64.go:122] [ 12888(3113): 12888(3113)] Allocate a new trap: 0xc0029223c0 38 D0714 04:47:32.966987 789113 usertrap_amd64.go:225] [ 12888(3113): 12888(3113)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:32.967812 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:32.967840 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 38 D0714 04:47:32.967852 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:32.970491 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:32.970511 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 39 D0714 04:47:32.970522 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:32.978226 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:32.978252 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 39 D0714 04:47:32.978264 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:32.981537 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:32.981568 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 40 D0714 04:47:32.981583 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:32.981846 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:32.981868 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 41 D0714 04:47:32.981877 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:32.982501 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:32.982527 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 39 D0714 04:47:32.982572 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:32.983009 789113 usertrap_amd64.go:212] [ 12886(3119): 12886(3119)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:32.983032 789113 usertrap_amd64.go:122] [ 12886(3119): 12886(3119)] Allocate a new trap: 0xc009ca6b10 42 D0714 04:47:32.983041 789113 usertrap_amd64.go:225] [ 12886(3119): 12886(3119)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:32.983053 789113 usertrap_amd64.go:212] [ 12886(3119): 12889(3120)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:32.983059 789113 usertrap_amd64.go:122] [ 12886(3119): 12889(3120)] Allocate a new trap: 0xc009ca6b10 43 D0714 04:47:32.983072 789113 usertrap_amd64.go:225] [ 12886(3119): 12889(3120)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:32.983427 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:32.983449 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 40 D0714 04:47:32.983459 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:32.983564 789113 usertrap_amd64.go:212] [ 12888(3113): 12888(3113)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:32.983589 789113 usertrap_amd64.go:122] [ 12888(3113): 12888(3113)] Allocate a new trap: 0xc0029223c0 39 D0714 04:47:32.983624 789113 usertrap_amd64.go:225] [ 12888(3113): 12888(3113)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:32.983641 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:32.983668 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 41 D0714 04:47:32.983686 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:32.988805 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:32.988829 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 40 D0714 04:47:32.988864 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:32.989323 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:32.989346 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 41 D0714 04:47:32.989357 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:32.990363 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:32.990389 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 42 D0714 04:47:32.990406 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:32.990440 789113 usertrap_amd64.go:212] [ 12887(3549): 12890(3550)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:32.990447 789113 usertrap_amd64.go:122] [ 12887(3549): 12890(3550)] Allocate a new trap: 0xc007cf90e0 43 D0714 04:47:32.990455 789113 usertrap_amd64.go:225] [ 12887(3549): 12890(3550)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:32.991929 789113 usertrap_amd64.go:212] [ 12885(3043): 12885(3043)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:32.991957 789113 usertrap_amd64.go:122] [ 12885(3043): 12885(3043)] Allocate a new trap: 0xc007cf90b0 42 D0714 04:47:32.991973 789113 usertrap_amd64.go:225] [ 12885(3043): 12885(3043)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:32.992176 789113 usertrap_amd64.go:212] [ 12885(3043): 12891(3044)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:32.992202 789113 usertrap_amd64.go:122] [ 12885(3043): 12891(3044)] Allocate a new trap: 0xc007cf90b0 43 D0714 04:47:32.992216 789113 usertrap_amd64.go:225] [ 12885(3043): 12891(3044)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:32.992970 789113 usertrap_amd64.go:212] [ 12888(3113): 12888(3113)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:32.992995 789113 usertrap_amd64.go:122] [ 12888(3113): 12888(3113)] Allocate a new trap: 0xc0029223c0 40 D0714 04:47:32.993006 789113 usertrap_amd64.go:225] [ 12888(3113): 12888(3113)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:32.993089 789113 usertrap_amd64.go:212] [ 12888(3113): 12888(3113)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:33.967974 789113 usertrap_amd64.go:122] [ 12888(3113): 12888(3113)] Allocate a new trap: 0xc0029223c0 41 D0714 04:47:35.139710 789113 usertrap_amd64.go:225] [ 12888(3113): 12888(3113)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:35.151838 789113 usertrap_amd64.go:212] [ 12887(3549): 12887(3549)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:35.151897 789113 usertrap_amd64.go:122] [ 12887(3549): 12887(3549)] Allocate a new trap: 0xc007cf90e0 44 D0714 04:47:35.151924 789113 usertrap_amd64.go:225] [ 12887(3549): 12887(3549)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:36.082478 789113 task_signals.go:481] [ 12886(3119): 12886(3119)] No task notified of signal 9 D0714 04:47:36.082575 789113 task_signals.go:458] [ 12886(3119): 12886(3119)] Discarding duplicate signal 9 D0714 04:47:36.888730 789113 task_signals.go:204] [ 12886(3119): 12889(3120)] Signal 12886, PID: 12889, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:36.888805 789113 task_exit.go:204] [ 12886(3119): 12889(3120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:36.889517 789113 task_signals.go:481] [ 12888(3113): 12888(3113)] No task notified of signal 9 D0714 04:47:36.889602 789113 task_signals.go:458] [ 12888(3113): 12888(3113)] Discarding duplicate signal 9 D0714 04:47:36.889789 789113 task_signals.go:481] [ 12885(3043): 12885(3043)] No task notified of signal 9 D0714 04:47:36.889950 789113 task_signals.go:458] [ 12885(3043): 12885(3043)] Discarding duplicate signal 9 D0714 04:47:37.889940 789113 task_signals.go:481] [ 12887(3549): 12887(3549)] No task notified of signal 9 D0714 04:47:37.890075 789113 task_signals.go:204] [ 12887(3549): 12894(3553)] Signal 12887, PID: 12894, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:37.890085 789113 task_signals.go:458] [ 12887(3549): 12887(3549)] Discarding duplicate signal 9 D0714 04:47:37.890201 789113 task_exit.go:204] [ 12887(3549): 12894(3553)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:37.890261 789113 task_signals.go:204] [ 12887(3549): 12893(3552)] Signal 12887, PID: 12893, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:37.890290 789113 task_exit.go:204] [ 12887(3549): 12893(3552)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:37.890313 789113 task_signals.go:204] [ 12887(3549): 12892(3551)] Signal 12887, PID: 12892, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:37.890334 789113 task_exit.go:204] [ 12887(3549): 12892(3551)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:37.890352 789113 task_signals.go:204] [ 12887(3549): 12890(3550)] Signal 12887, PID: 12890, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:37.890393 789113 task_exit.go:204] [ 12887(3549): 12890(3550)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:38.149710 789113 task_signals.go:204] [ 12885(3043): 12885(3043)] Signal 12885, PID: 12885, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:38.149793 789113 task_exit.go:204] [ 12885(3043): 12885(3043)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:38.150755 789113 task_signals.go:204] [ 12886(3119): 12886(3119)] Signal 12886, PID: 12886, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:38.150762 789113 task_signals.go:204] [ 12888(3113): 12888(3113)] Signal 12888, PID: 12888, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:38.150808 789113 task_exit.go:204] [ 12885(3043): 12885(3043)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.150852 789113 task_exit.go:204] [ 12886(3119): 12889(3120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.150885 789113 task_exit.go:204] [ 12886(3119): 12889(3120)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.150929 789113 task_exit.go:204] [ 12886(3119): 12886(3119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:38.150978 789113 task_signals.go:204] [ 12887(3549): 12887(3549)] Signal 12887, PID: 12887, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:38.151084 789113 task_exit.go:204] [ 12887(3549): 12890(3550)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.151164 789113 task_exit.go:204] [ 12887(3549): 12890(3550)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.151193 789113 task_exit.go:204] [ 12888(3113): 12888(3113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:38.151280 789113 task_exit.go:204] [ 12887(3549): 12894(3553)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.151301 789113 task_exit.go:204] [ 12887(3549): 12894(3553)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.151318 789113 task_exit.go:204] [ 12887(3549): 12893(3552)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.151324 789113 task_exit.go:204] [ 12887(3549): 12893(3552)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.151430 789113 task_exit.go:204] [ 12886(3119): 12886(3119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.151453 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:38.151931 789113 task_exit.go:204] [ 12887(3549): 12892(3551)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.151952 789113 task_exit.go:204] [ 12887(3549): 12892(3551)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.151984 789113 task_exit.go:204] [ 12886(3119): 12886(3119)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:38 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)=0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r3, 0x5421, &(0x7f0000000080)=0x0) setreuid(r4, 0x0) statx(r3, &(0x7f00000001c0)='./bus/file0\x00', 0x800, 0x7ff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus/file0/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x2}, [{0x2, 0x3, r4}, {0x2, 0x3ecc57621b0a95f4, r5}], {0x4, 0x7}, [{0x8, 0x2, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x2, r1}, {0x8, 0x1, r2}], {}, {0x20, 0x5}}, 0x54, 0x3) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) D0714 04:47:38.153465 789113 task_exit.go:204] [ 12887(3549): 12887(3549)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:38.155970 789113 task_exit.go:204] [ 12887(3549): 12887(3549)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.156047 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:38.156103 789113 task_exit.go:204] [ 12887(3549): 12887(3549)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:38.156390 789113 task_exit.go:204] [ 12888(3113): 12888(3113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:38.156445 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:38.156480 789113 task_exit.go:204] [ 12888(3113): 12888(3113)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:38 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000001b9bfc24c679353a9071e2560000000000000000000000000000000000000000000000000000000000000000e4da0000000000000000000000000000000000000000000000000000c25beb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000dc00000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000040000000000000000000000000000fe649476aa2ac7b92727e770051711277d17ace3ed9703aff7279e85bd22fee8ecb7cc11c2f9ac254ca873b4a95e89c408472e52c13f44466424dd3f84881ff3fcb30b01c9ffd62463005bc32cb5650ef73180aa33bb6fd72596697e82a2d3d41b4ad6dac2a595615b79cf253ae9e546a6fed73f4db4781b6e"], 0xfd, 0x0, 0x1000) msgctl$IPC_RMID(r0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) 04:47:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x180800) r4 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) epoll_pwait2(r5, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={[0x8]}, 0x8) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:38.882031 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:38.882114 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 37 D0714 04:47:38.882320 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:40.558260 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:40.558422 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 38 D0714 04:47:40.559361 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:40.562982 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:40.563068 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 37 D0714 04:47:40.567407 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:40.608630 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:40.608700 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 38 D0714 04:47:40.612066 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:40.635647 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:40.635857 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 37 D0714 04:47:40.636078 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:40.638581 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:40.638708 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 39 D0714 04:47:40.638838 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:40.645580 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:40.645898 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 38 D0714 04:47:40.646158 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:40.662257 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:40.662308 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 39 D0714 04:47:40.661371 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:40.665400 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 40 D0714 04:47:40.665280 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:40.675005 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:40.675089 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 40 D0714 04:47:40.675185 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:40.675445 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:40.675523 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 39 D0714 04:47:40.675597 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:40.675489 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:40.675807 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 41 D0714 04:47:40.676320 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:40.665497 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:40.677014 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:40.677041 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 41 D0714 04:47:40.677054 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:40.686071 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:40.686157 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 42 D0714 04:47:40.686210 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:40.686779 789113 usertrap_amd64.go:212] [ 12896(3554): 12899(3555)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:40.686897 789113 usertrap_amd64.go:122] [ 12896(3554): 12899(3555)] Allocate a new trap: 0xc0042c00f0 43 D0714 04:47:40.686976 789113 usertrap_amd64.go:225] [ 12896(3554): 12899(3555)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:40.689837 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:40.689956 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 42 D0714 04:47:40.689989 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:40.690049 789113 usertrap_amd64.go:212] [ 12895(3114): 12898(3115)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:40.690140 789113 usertrap_amd64.go:122] [ 12895(3114): 12898(3115)] Allocate a new trap: 0xc0042c0090 43 D0714 04:47:40.690217 789113 usertrap_amd64.go:225] [ 12895(3114): 12898(3115)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:40.690488 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:40.690522 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 40 D0714 04:47:40.690540 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:40.690708 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:40.690724 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 41 D0714 04:47:40.690741 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:40.699265 789113 usertrap_amd64.go:212] [ 12897(3121): 12900(3122)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:40.699363 789113 usertrap_amd64.go:122] [ 12897(3121): 12900(3122)] Allocate a new trap: 0xc0070f8030 42 D0714 04:47:40.699474 789113 usertrap_amd64.go:225] [ 12897(3121): 12900(3122)] Apply the binary patch addr 558472d0f0b0 trap addr 62d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:40.719721 789113 usertrap_amd64.go:212] [ 12896(3554): 12896(3554)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:40.719858 789113 usertrap_amd64.go:122] [ 12896(3554): 12896(3554)] Allocate a new trap: 0xc0042c00f0 44 D0714 04:47:40.719922 789113 usertrap_amd64.go:225] [ 12896(3554): 12896(3554)] Apply the binary patch addr 56285da07a13 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0714 04:47:40.720755 789113 task_exit.go:204] [ 12896(3554): 12896(3554)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:40.720847 789113 task_exit.go:204] [ 12896(3554): 12896(3554)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:40.720922 789113 task_signals.go:204] [ 12896(3554): 12899(3555)] Signal 12896, PID: 12899, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:40.720990 789113 task_exit.go:204] [ 12896(3554): 12899(3555)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:40.721331 789113 task_exit.go:204] [ 12896(3554): 12899(3555)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:40.721415 789113 task_exit.go:204] [ 12896(3554): 12899(3555)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:40.721462 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:40.723718 789113 task_exit.go:204] [ 12896(3554): 12896(3554)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async, rerun: 32) listen(r0, 0x0) (async, rerun: 32) socket$unix(0x1, 0x1, 0x0) (async, rerun: 32) r1 = epoll_create(0x1) (rerun: 32) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) (async, rerun: 64) r3 = accept4(r2, 0x0, 0x0, 0x180800) (async, rerun: 64) r4 = socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) epoll_pwait2(r5, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={[0x8]}, 0x8) (async) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async, rerun: 32) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (rerun: 32) connect$packet(0xffffffffffffffff, 0x0, 0x0) D0714 04:47:40.728334 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:40.730632 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 43 D0714 04:47:40.730665 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d0f9a0 trap addr 62d70 ([184 14 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:40.748963 789113 usertrap_amd64.go:212] [ 12895(3114): 12895(3114)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:40.749039 789113 usertrap_amd64.go:122] [ 12895(3114): 12895(3114)] Allocate a new trap: 0xc0042c0090 44 D0714 04:47:40.749066 789113 usertrap_amd64.go:225] [ 12895(3114): 12895(3114)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:40.751799 789113 task_exit.go:204] [ 12895(3114): 12895(3114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:40.751897 789113 task_signals.go:204] [ 12895(3114): 12898(3115)] Signal 12895, PID: 12898, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:40.751933 789113 task_signals.go:204] [ 12895(3114): 12901(3116)] Signal 12895, PID: 12901, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:40.751966 789113 task_exit.go:204] [ 12895(3114): 12895(3114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:40.752015 789113 task_exit.go:204] [ 12895(3114): 12898(3115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:40.752049 789113 task_exit.go:204] [ 12895(3114): 12898(3115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:40.752058 789113 task_exit.go:204] [ 12895(3114): 12898(3115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:40.752078 789113 task_exit.go:204] [ 12895(3114): 12901(3116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:40.752680 789113 task_exit.go:204] [ 12895(3114): 12901(3116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:40.752890 789113 task_exit.go:204] [ 12895(3114): 12901(3116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:40.753015 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:40.754027 789113 task_exit.go:204] [ 12895(3114): 12895(3114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:42.196765 789113 task_signals.go:470] [ 7: 30] Notified of signal 23 D0714 04:47:42.279076 789113 task_signals.go:220] [ 7: 30] Signal 23: delivering to handler D0714 04:47:42.279299 789113 task_signals.go:470] [ 7: 30] Notified of signal 23 D0714 04:47:42.279395 789113 task_signals.go:220] [ 7: 30] Signal 23: delivering to handler 04:47:42 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfd, 0x0, 0x1000) msgctl$IPC_RMID(r0, 0x0) (async) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) D0714 04:47:43.882573 789113 task_signals.go:481] [ 12902(3556): 12902(3556)] No task notified of signal 9 D0714 04:47:43.986766 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:43.986851 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 44 D0714 04:47:43.986876 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:44.062428 789113 task_signals.go:204] [ 12902(3556): 12902(3556)] Signal 12902, PID: 12902, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.062496 789113 task_exit.go:204] [ 12902(3556): 12902(3556)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.062638 789113 usertrap_amd64.go:212] [ 12897(3121): 12897(3121)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:44.062708 789113 usertrap_amd64.go:122] [ 12897(3121): 12897(3121)] Allocate a new trap: 0xc0070f8030 45 D0714 04:47:44.062723 789113 usertrap_amd64.go:225] [ 12897(3121): 12897(3121)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:44.062841 789113 task_exit.go:204] [ 12902(3556): 12902(3556)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.062888 789113 task_signals.go:443] [ 57( 1): 57( 1)] Discarding ignored signal 17 D0714 04:47:44.063893 789113 task_exit.go:204] [ 12897(3121): 12897(3121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.063932 789113 task_exit.go:204] [ 12897(3121): 12897(3121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.063958 789113 task_signals.go:204] [ 12897(3121): 12900(3122)] Signal 12897, PID: 12900, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.063973 789113 task_exit.go:204] [ 12897(3121): 12900(3122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.063984 789113 task_exit.go:204] [ 12897(3121): 12900(3122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.063990 789113 task_exit.go:204] [ 12897(3121): 12900(3122)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.064006 789113 task_signals.go:204] [ 12897(3121): 12903(3123)] Signal 12897, PID: 12903, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.064015 789113 task_exit.go:204] [ 12897(3121): 12903(3123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.064023 789113 task_exit.go:204] [ 12897(3121): 12903(3123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.064028 789113 task_exit.go:204] [ 12897(3121): 12903(3123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.064039 789113 task_signals.go:204] [ 12897(3121): 12904(3124)] Signal 12897, PID: 12904, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.064048 789113 task_exit.go:204] [ 12897(3121): 12904(3124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.064057 789113 task_exit.go:204] [ 12897(3121): 12904(3124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.064063 789113 task_exit.go:204] [ 12897(3121): 12904(3124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.064087 789113 task_signals.go:204] [ 12897(3121): 12905(3125)] Signal 12897, PID: 12905, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.064096 789113 task_exit.go:204] [ 12897(3121): 12905(3125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.064176 789113 task_exit.go:204] [ 12902(3556): 12902(3556)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.064509 789113 task_exit.go:204] [ 12897(3121): 12905(3125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.064536 789113 task_exit.go:204] [ 12897(3121): 12905(3125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.064555 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:44.065445 789113 task_exit.go:204] [ 12897(3121): 12897(3121)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.104541 789113 task_signals.go:470] [ 7: 30] Notified of signal 23 D0714 04:47:44.104672 789113 task_signals.go:220] [ 7: 30] Signal 23: delivering to handler D0714 04:47:44.570226 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:44.570274 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 37 D0714 04:47:44.570376 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:44.571050 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:44.571082 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 38 D0714 04:47:44.571099 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:44.574813 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:44.574933 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 39 D0714 04:47:44.575053 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:44.576704 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:44.576776 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 40 D0714 04:47:44.576793 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:44.577056 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:44.577081 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 41 D0714 04:47:44.577092 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:44.577805 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:44.577887 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 42 D0714 04:47:44.577990 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:44.578402 789113 usertrap_amd64.go:212] [ 12906(3117): 12907(3118)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:44.578427 789113 usertrap_amd64.go:122] [ 12906(3117): 12907(3118)] Allocate a new trap: 0xc009734180 43 D0714 04:47:44.578440 789113 usertrap_amd64.go:225] [ 12906(3117): 12907(3118)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:44.630391 789113 usertrap_amd64.go:212] [ 12906(3117): 12906(3117)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:44.630422 789113 usertrap_amd64.go:122] [ 12906(3117): 12906(3117)] Allocate a new trap: 0xc009734180 44 D0714 04:47:44.630438 789113 usertrap_amd64.go:225] [ 12906(3117): 12906(3117)] Apply the binary patch addr 5560ad87fa13 trap addr 63dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:44.631161 789113 task_exit.go:204] [ 12906(3117): 12906(3117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.631204 789113 task_exit.go:204] [ 12906(3117): 12906(3117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.631221 789113 task_signals.go:204] [ 12906(3117): 12909(3120)] Signal 12906, PID: 12909, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.631221 789113 task_signals.go:204] [ 12906(3117): 12907(3118)] Signal 12906, PID: 12907, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.631235 789113 task_exit.go:204] [ 12906(3117): 12909(3120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.631243 789113 task_exit.go:204] [ 12906(3117): 12909(3120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.631249 789113 task_exit.go:204] [ 12906(3117): 12909(3120)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.631262 789113 task_signals.go:204] [ 12906(3117): 12908(3119)] Signal 12906, PID: 12908, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.631274 789113 task_exit.go:204] [ 12906(3117): 12907(3118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.631318 789113 task_exit.go:204] [ 12906(3117): 12907(3118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.631335 789113 task_exit.go:204] [ 12906(3117): 12907(3118)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.631348 789113 task_exit.go:204] [ 12906(3117): 12908(3119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.631699 789113 task_exit.go:204] [ 12906(3117): 12908(3119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.631721 789113 task_exit.go:204] [ 12906(3117): 12908(3119)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.631732 789113 task_signals.go:443] [ 55( 1): 55( 1)] Discarding ignored signal 17 D0714 04:47:44.632558 789113 task_exit.go:204] [ 12906(3117): 12906(3117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.678840 789113 task_signals.go:204] [ 12885(3043): 12891(3044)] Signal 12885, PID: 12891, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.678894 789113 task_exit.go:204] [ 12885(3043): 12891(3044)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.679340 789113 task_exit.go:204] [ 12885(3043): 12891(3044)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.679367 789113 task_exit.go:204] [ 12885(3043): 12891(3044)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.679380 789113 task_signals.go:443] [ 56( 1): 56( 1)] Discarding ignored signal 17 D0714 04:47:44.679408 789113 task_exit.go:204] [ 12885(3043): 12885(3043)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:44 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0xf7, 0x1000000000010007) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x23d}, [{}]}, 0x78) prlimit64(0x0, 0x1, &(0x7f0000000200)={0x6c}, &(0x7f0000000240)) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x8, 0x15, 0x200}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f00000001c0)) r2 = epoll_create(0x1) fcntl$dupfd(r2, 0x0, r2) (async) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:crack_db_t:s0\x00', 0x20, 0x1) 04:47:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r0, 0x0) (async) socket$unix(0x1, 0x1, 0x0) (async) r1 = epoll_create(0x1) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x180800) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) epoll_pwait2(r5, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={[0x8]}, 0x8) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async, rerun: 64) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) (async, rerun: 64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async, rerun: 64) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) (async, rerun: 32) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) (rerun: 32) connect$packet(0xffffffffffffffff, 0x0, 0x0) 04:47:44 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfd, 0x0, 0x1000) (async) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 64) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001280)=""/4096) (rerun: 64) 04:47:44 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)=0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$NS_GET_OWNER_UID(r3, 0x5421, &(0x7f0000000080)=0x0) setreuid(r4, 0x0) statx(r3, &(0x7f00000001c0)='./bus/file0\x00', 0x800, 0x7ff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus/file0/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x2}, [{0x2, 0x3, r4}, {0x2, 0x3ecc57621b0a95f4, r5}], {0x4, 0x7}, [{0x8, 0x2, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x2, r1}, {0x8, 0x1, r2}], {}, {0x20, 0x5}}, 0x54, 0x3) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x100000001) (async) utime(&(0x7f0000000040)='./bus\x00', 0x0) (async) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) (async) pipe2$watch_queue(&(0x7f00000000c0), 0xb82e336200000000) (async) ioctl$NS_GET_OWNER_UID(r3, 0x5421, &(0x7f0000000080)) (async) setreuid(r4, 0x0) (async) statx(r3, &(0x7f00000001c0)='./bus/file0\x00', 0x800, 0x7ff, &(0x7f0000000300)) (async) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus/file0/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x2}, [{0x2, 0x3, r4}, {0x2, 0x3ecc57621b0a95f4, r5}], {0x4, 0x7}, [{0x8, 0x2, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x2, r1}, {0x8, 0x1, r2}], {}, {0x20, 0x5}}, 0x54, 0x3) (async) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) (async) D0714 04:47:44.687276 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da345e0:sysno 109 D0714 04:47:44.687319 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 37 D0714 04:47:44.687490 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da345e0 trap addr 61b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 27 6 0]) D0714 04:47:44.688671 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da082a0:sysno 266 D0714 04:47:44.688723 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 38 D0714 04:47:44.688737 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da082a0 trap addr 61be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 27 6 0]) D0714 04:47:44.690139 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d665e0:sysno 109 D0714 04:47:44.690178 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 37 D0714 04:47:44.690340 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d665e0 trap addr 62b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 43 6 0]) D0714 04:47:44.691354 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d3a2a0:sysno 266 D0714 04:47:44.691394 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 38 D0714 04:47:44.691413 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d3a2a0 trap addr 62be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 43 6 0]) D0714 04:47:44.697349 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285d9dda32:sysno 14 D0714 04:47:44.697384 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 39 D0714 04:47:44.697397 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285d9dda32 trap addr 61c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0714 04:47:44.699309 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d0fa32:sysno 14 D0714 04:47:44.699354 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 39 D0714 04:47:44.699371 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d0fa32 trap addr 62c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0714 04:47:44.700071 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad8ac5e0:sysno 109 D0714 04:47:44.700190 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 37 D0714 04:47:44.700288 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad8ac5e0 trap addr 63b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 59 6 0]) D0714 04:47:44.700456 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da34912:sysno 435 D0714 04:47:44.700544 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 40 D0714 04:47:44.700642 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da34912 trap addr 61c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0714 04:47:44.701005 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da09e0b:sysno 56 D0714 04:47:44.701229 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 41 D0714 04:47:44.701260 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da09e0b trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0714 04:47:44.701941 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285d9dd9a0:sysno 14 D0714 04:47:44.701971 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 42 D0714 04:47:44.701989 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285d9dd9a0 trap addr 61d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0714 04:47:44.702334 789113 usertrap_amd64.go:212] [ 12911(3557): 12914(3558)] Found the pattern at ip 56285d9dd0b0:sysno 273 D0714 04:47:44.702367 789113 usertrap_amd64.go:122] [ 12911(3557): 12914(3558)] Allocate a new trap: 0xc0097342a0 43 D0714 04:47:44.702381 789113 usertrap_amd64.go:225] [ 12911(3557): 12914(3558)] Apply the binary patch addr 56285d9dd0b0 trap addr 61d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0714 04:47:44.702743 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad8802a0:sysno 266 D0714 04:47:44.702799 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 38 D0714 04:47:44.702815 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad8802a0 trap addr 63be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 59 6 0]) D0714 04:47:44.705270 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c42c5e0:sysno 109 D0714 04:47:44.705337 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 37 D0714 04:47:44.705422 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c42c5e0 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0714 04:47:44.706217 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c4002a0:sysno 266 D0714 04:47:44.706248 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 38 D0714 04:47:44.706261 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c4002a0 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0714 04:47:44.706685 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d66912:sysno 435 D0714 04:47:44.706719 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 40 D0714 04:47:44.706729 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d66912 trap addr 62c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0714 04:47:44.706991 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d3be0b:sysno 56 D0714 04:47:44.707024 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 41 D0714 04:47:44.707037 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d3be0b trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0714 04:47:44.708567 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d0f9a0:sysno 14 D0714 04:47:44.708596 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 42 D0714 04:47:44.708649 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d0f9a0 trap addr 62d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0714 04:47:44.708716 789113 usertrap_amd64.go:212] [ 12912(3126): 12917(3127)] Found the pattern at ip 558472d0f0b0:sysno 273 D0714 04:47:44.708729 789113 usertrap_amd64.go:122] [ 12912(3126): 12917(3127)] Allocate a new trap: 0xc003b50180 43 D0714 04:47:44.708738 789113 usertrap_amd64.go:225] [ 12912(3126): 12917(3127)] Apply the binary patch addr 558472d0f0b0 trap addr 62d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0714 04:47:44.708880 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad855a32:sysno 14 D0714 04:47:44.709108 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 39 D0714 04:47:44.709342 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad855a32 trap addr 63c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 60 6 0]) D0714 04:47:44.709670 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da33f2e:sysno 230 D0714 04:47:44.709694 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 44 D0714 04:47:44.709708 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da33f2e trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) I0714 04:47:44.710687 789113 pgalloc.go:747] Disabling pgalloc.MemoryFile.AllocateAndFill pre-population: mlock failed: cannot allocate memory D0714 04:47:44.712550 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad8ac912:sysno 435 D0714 04:47:44.712666 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 40 D0714 04:47:44.712721 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad8ac912 trap addr 63c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 60 6 0]) D0714 04:47:44.712971 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad881e0b:sysno 56 D0714 04:47:44.713043 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 41 D0714 04:47:44.713090 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad881e0b trap addr 63cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0714 04:47:44.713091 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d65f2e:sysno 230 D0714 04:47:44.713333 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c3d5a32:sysno 14 D0714 04:47:44.713370 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 39 D0714 04:47:44.713382 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c3d5a32 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0714 04:47:44.713356 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 44 D0714 04:47:44.713512 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d65f2e trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0714 04:47:44.713850 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad8559a0:sysno 14 D0714 04:47:44.713877 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 42 D0714 04:47:44.713888 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad8559a0 trap addr 63d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 61 6 0]) D0714 04:47:44.714577 789113 usertrap_amd64.go:212] [ 12911(3557): 12911(3557)] Found the pattern at ip 56285da07a13:sysno 3 D0714 04:47:44.714638 789113 usertrap_amd64.go:122] [ 12911(3557): 12911(3557)] Allocate a new trap: 0xc0097342a0 45 D0714 04:47:44.714759 789113 usertrap_amd64.go:225] [ 12911(3557): 12911(3557)] Apply the binary patch addr 56285da07a13 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0714 04:47:44.714668 789113 usertrap_amd64.go:212] [ 12910(3121): 12922(3122)] Found the pattern at ip 5560ad8550b0:sysno 273 D0714 04:47:44.714958 789113 usertrap_amd64.go:122] [ 12910(3121): 12922(3122)] Allocate a new trap: 0xc007cf8030 43 D0714 04:47:44.714979 789113 usertrap_amd64.go:225] [ 12910(3121): 12922(3122)] Apply the binary patch addr 5560ad8550b0 trap addr 63d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 61 6 0]) D0714 04:47:44.715576 789113 usertrap_amd64.go:212] [ 12912(3126): 12912(3126)] Found the pattern at ip 558472d39a13:sysno 3 D0714 04:47:44.715635 789113 usertrap_amd64.go:122] [ 12912(3126): 12912(3126)] Allocate a new trap: 0xc003b50180 45 D0714 04:47:44.715650 789113 usertrap_amd64.go:225] [ 12912(3126): 12912(3126)] Apply the binary patch addr 558472d39a13 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0714 04:47:44.716632 789113 task_exit.go:204] [ 12911(3557): 12911(3557)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.716718 789113 task_signals.go:204] [ 12911(3557): 12918(3561)] Signal 12911, PID: 12918, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.716786 789113 task_exit.go:204] [ 12911(3557): 12918(3561)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.716789 789113 task_signals.go:204] [ 12911(3557): 12916(3560)] Signal 12911, PID: 12916, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.716807 789113 task_signals.go:204] [ 12911(3557): 12919(3562)] Signal 12911, PID: 12919, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.716814 789113 task_exit.go:204] [ 12911(3557): 12916(3560)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.716825 789113 task_exit.go:204] [ 12911(3557): 12919(3562)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.716854 789113 task_signals.go:204] [ 12911(3557): 12914(3558)] Signal 12911, PID: 12914, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.716852 789113 task_signals.go:204] [ 12911(3557): 12915(3559)] Signal 12911, PID: 12915, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.716879 789113 task_exit.go:204] [ 12911(3557): 12918(3561)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.716947 789113 task_exit.go:204] [ 12911(3557): 12918(3561)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.716957 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c42c912:sysno 435 D0714 04:47:44.717013 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 40 D0714 04:47:44.717025 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c42c912 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0714 04:47:44.717060 789113 task_exit.go:204] [ 12911(3557): 12911(3557)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.717113 789113 task_exit.go:204] [ 12911(3557): 12919(3562)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.717161 789113 task_exit.go:204] [ 12911(3557): 12919(3562)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.717219 789113 task_exit.go:204] [ 12911(3557): 12914(3558)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.717275 789113 task_exit.go:204] [ 12911(3557): 12914(3558)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.717339 789113 task_exit.go:204] [ 12911(3557): 12914(3558)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.717378 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c401e0b:sysno 56 D0714 04:47:44.717706 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 41 D0714 04:47:44.717734 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c401e0b trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0714 04:47:44.717402 789113 task_exit.go:204] [ 12911(3557): 12915(3559)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.718015 789113 task_signals.go:204] [ 12912(3126): 12921(3129)] Signal 12912, PID: 12921, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.718038 789113 task_signals.go:204] [ 12912(3126): 12920(3128)] Signal 12912, PID: 12920, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.718080 789113 task_signals.go:204] [ 12912(3126): 12917(3127)] Signal 12912, PID: 12917, TID: 0, fault addr: 0x9: terminating thread group D0714 04:47:44.718121 789113 task_exit.go:204] [ 12911(3557): 12915(3559)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.718219 789113 task_exit.go:204] [ 12911(3557): 12915(3559)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.718325 789113 task_exit.go:204] [ 12912(3126): 12912(3126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.718350 789113 task_exit.go:204] [ 12912(3126): 12912(3126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.719031 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad8abf2e:sysno 230 D0714 04:47:44.719057 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 44 D0714 04:47:44.719069 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad8abf2e trap addr 63dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 61 6 0]) D0714 04:47:44.719338 789113 task_exit.go:204] [ 12912(3126): 12921(3129)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.719404 789113 task_exit.go:204] [ 12912(3126): 12921(3129)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.719464 789113 task_exit.go:204] [ 12912(3126): 12921(3129)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.719483 789113 task_exit.go:204] [ 12912(3126): 12920(3128)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.719496 789113 task_exit.go:204] [ 12912(3126): 12920(3128)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.719502 789113 task_exit.go:204] [ 12912(3126): 12920(3128)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.719511 789113 task_exit.go:204] [ 12912(3126): 12917(3127)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0714 04:47:44.719632 789113 usertrap_amd64.go:212] [ 12913(3045): 12913(3045)] Found the pattern at ip 55e82c3d59a0:sysno 14 D0714 04:47:44.719661 789113 usertrap_amd64.go:122] [ 12913(3045): 12913(3045)] Allocate a new trap: 0xc0032a80c0 42 D0714 04:47:44.719672 789113 usertrap_amd64.go:225] [ 12913(3045): 12913(3045)] Apply the binary patch addr 55e82c3d59a0 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0714 04:47:44.719696 789113 usertrap_amd64.go:212] [ 12913(3045): 12925(3046)] Found the pattern at ip 55e82c3d50b0:sysno 273 D0714 04:47:44.719704 789113 usertrap_amd64.go:122] [ 12913(3045): 12925(3046)] Allocate a new trap: 0xc0032a80c0 43 D0714 04:47:44.719732 789113 usertrap_amd64.go:225] [ 12913(3045): 12925(3046)] Apply the binary patch addr 55e82c3d50b0 trap addr 69d70 ([184 17 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0714 04:47:44.720054 789113 task_exit.go:204] [ 12912(3126): 12917(3127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0714 04:47:44.720132 789113 task_exit.go:204] [ 12912(3126): 12917(3127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0714 04:47:44.720156 789113 task_signals.go:443] [ 54( 1): 54( 1)] Discarding ignored signal 17 D0714 04:47:44.722829 789113 usertrap_amd64.go:212] [ 12910(3121): 12910(3121)] Found the pattern at ip 5560ad87fa13:sysno 3 D0714 04:47:44.722884 789113 usertrap_amd64.go:122] [ 12910(3121): 12910(3121)] Allocate a new trap: 0xc007cf8030 45 D0714 04:47:44.722907 789113 usertrap_amd64.go:225] [ 12910(3121): 12910(3121)] Apply the binary patch addr 5560ad87fa13 trap addr 63e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 62 6 0]) D0714 04:47:44.722977 789113 task_exit.go:204] [ 12912(3126): 12912(3126)] Transitioning from exit state TaskExitZombie to TaskExitDead 04:47:44 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x44042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x100000001) utime(&(0x7f0000000040)='./bus\x00', 0x0) socketpair(0x2b, 0x1, 0x80000001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x50, 0x81, 0x8000) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) runtime: out of memory: cannot allocate 17184063488-byte block (34759835648 in use) fatal error: out of memory goroutine 2362354 [running]: runtime.throw({0x1349dac?, 0x200001?}) GOROOT/src/runtime/panic.go:1047 +0x5d fp=0xc008c512c0 sp=0xc008c51290 pc=0x4371bd runtime.(*mcache).allocLarge(0xc008c51330?, 0x4000000a8, 0x1) GOROOT/src/runtime/mcache.go:236 +0x179 fp=0xc008c51308 sp=0xc008c512c0 pc=0x416df9 runtime.mallocgc(0x4000000a8, 0x0, 0x0) GOROOT/src/runtime/malloc.go:1053 +0x4fe fp=0xc008c51370 sp=0xc008c51308 pc=0x40da1e runtime.makeslicecopy(0xc000520438?, 0xc006c09470?, 0xc006c09480?, 0xc017e66000) GOROOT/src/runtime/slice.go:57 +0x89 fp=0xc008c513b8 sp=0xc008c51370 pc=0x44f2a9 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).allocate(0xc000539c00, 0xfffffff00010000, 0xc008c51590) pkg/sentry/pgalloc/pgalloc.go:564 +0x1f8 fp=0xc008c514a8 sp=0xc008c513b8 pc=0x781658 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).Allocate(0xc000b20f70?, 0xfffffff00010000, {0x3, 0x0, 0x0, 0x2, {0x0, 0x0}}) pkg/sentry/pgalloc/pgalloc.go:477 +0x72 fp=0xc008c51580 sp=0xc008c514a8 pc=0x781032 gvisor.dev/gvisor/pkg/sentry/fsutil.(*FileRangeSet).Fill(0x435e93?, {0x1584280, 0xc0095aca80}, {0xc00596e1a0?, 0xc006c09870?}, {0x9744ed?, 0x1f56438?}, 0x10000000000100fe, 0x7ea7de39dfb8?, 0x3, ...) pkg/sentry/fsutil/file_range_set.go:172 +0x33a fp=0xc008c51670 sp=0xc008c51580 pc=0x7a197a gvisor.dev/gvisor/pkg/sentry/fsimpl/tmpfs.(*regularFileFD).Allocate(0xffffffffffffffff?, {0x1584280, 0xc0095aca80}, 0x5f55a0?, 0xf7, 0x1000000000010007) pkg/sentry/fsimpl/tmpfs/regular_file.go:397 +0x2d2 fp=0xc008c51770 sp=0xc008c51670 pc=0x8511d2 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).Allocate(0xc009ff2380, {0x1584280, 0xc0095aca80}, 0x454468?, 0x18877e2?, 0xc00596e1a0?) pkg/sentry/vfs/file_description.go:589 +0x48 fp=0xc008c517b0 sp=0xc008c51770 pc=0x747c28 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Fallocate(0xc0095aca80, 0x89?, {{0x3}, {0x0}, {0xf7}, {0x1000000000010007}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_file.go:1642 +0x2a5 fp=0xc008c51868 sp=0xc008c517b0 pc=0xa88c65 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0095aca80, 0x11d, {{0x3}, {0x0}, {0xf7}, {0x1000000000010007}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x755 fp=0xc008c51c58 sp=0xc008c51868 pc=0x951f55 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0095aca80, 0xc0046593e0?, {{0x3}, {0x0}, {0xf7}, {0x1000000000010007}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x4a fp=0xc008c51cb8 sp=0xc008c51c58 pc=0x95318a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc006c09e00?, 0xc75759?, {{0x3}, {0x0}, {0xf7}, {0x1000000000010007}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x65 fp=0xc008c51d18 sp=0xc008c51cb8 pc=0x952e65 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc002bfedd0?) pkg/sentry/kernel/task_syscall.go:257 +0x2f0 fp=0xc008c51e10 sp=0xc008c51d18 pc=0x952bd0 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc006a5d800?, 0xc0095aca80) pkg/sentry/kernel/task_run.go:269 +0x101e fp=0xc008c51f48 sp=0xc008c51e10 pc=0x946cde gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0095aca80, 0x327e) pkg/sentry/kernel/task_run.go:98 +0x1f8 fp=0xc008c51fc0 sp=0xc008c51f48 pc=0x945618 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:383 +0x2a fp=0xc008c51fe0 sp=0xc008c51fc0 pc=0x95074a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc008c51fe8 sp=0xc008c51fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:383 +0xef goroutine 1 [semacquire, 36 minutes]: runtime.gopark(0xc000594240?, 0xc0000429b0?, 0x20?, 0x44?, 0x3?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000759240 sp=0xc000759220 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc00039a270, 0xe0?, 0x1, 0x0, 0x0?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc0007592a8 sp=0xc000759240 pc=0x44b5cf sync.runtime_Semacquire(0xc0001d3310?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc0007592e0 sp=0xc0007592a8 pc=0x468fe7 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x4b fp=0xc000759308 sp=0xc0007592e0 pc=0x479c8b gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1141 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc00024c400) runsc/boot/loader.go:1197 +0x2e fp=0xc000759320 sp=0xc000759308 pc=0xdf854e gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000233760, {0xc00003e330?, 0xc00017f9c0?}, 0xc000382660, {0xc00017f9c0, 0x2, 0x1b?}) runsc/cmd/boot.go:458 +0x15e5 fp=0xc000759860 sp=0xc000759320 pc=0x102fdc5 github.com/google/subcommands.(*Commander).Execute(0xc00016e000, {0x1577038, 0xc000040028}, {0xc00017f9c0, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x3a2 fp=0xc000759900 sp=0xc000759860 pc=0x5153c2 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:260 +0x6c45 fp=0xc000759f70 sp=0xc000759900 pc=0x10620e5 main.main() runsc/main.go:31 +0x17 fp=0xc000759f80 sp=0xc000759f70 pc=0x1062637 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc000759fe0 sp=0xc000759f80 pc=0x439b67 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000759fe8 sp=0xc000759fe0 pc=0x46d821 goroutine 2 [force gc (idle), 7 minutes]: runtime.gopark(0x1ba616b3a532?, 0x1b30fb6d38ac?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012cfb0 sp=0xc00012cf90 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc00012cfe0 sp=0xc00012cfb0 pc=0x439dd0 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012cfe8 sp=0xc00012cfe0 pc=0x46d821 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 17 [GC sweep wait]: runtime.gopark(0x1fb1701?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128780 sp=0xc000128760 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc0001287c8 sp=0xc000128780 pc=0x42459e runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc0001287e0 sp=0xc0001287c8 pc=0x419746 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001287e8 sp=0xc0001287e0 pc=0x46d821 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 18 [GC scavenge wait]: runtime.gopark(0x1fb1f20?, 0x192ca6?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128f70 sp=0xc000128f50 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x1fb1f20) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000128fa0 sp=0xc000128f70 pc=0x422473 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000128fc8 sp=0xc000128fa0 pc=0x422a65 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000128fe0 sp=0xc000128fc8 pc=0x4196e6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000128fe8 sp=0xc000128fe0 pc=0x46d821 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 3 [finalizer wait, 36 minutes]: runtime.gopark(0x43a312?, 0x7fa1878ecfe8?, 0x0?, 0x0?, 0xc00012c770?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012c628 sp=0xc00012c608 pc=0x439f96 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x107 fp=0xc00012c7e0 sp=0xc00012c628 pc=0x418707 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012c7e8 sp=0xc00012c7e0 pc=0x46d821 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 4 [GC worker (idle), 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012d750 sp=0xc00012d730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012d7e0 sp=0xc00012d750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012d7e8 sp=0xc00012d7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 5 [GC worker (idle), 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012df50 sp=0xc00012df30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012dfe0 sp=0xc00012df50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012dfe8 sp=0xc00012dfe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 6 [GC worker (idle)]: runtime.gopark(0x1bf3997d5b29?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012e750 sp=0xc00012e730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012e7e0 sp=0xc00012e750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012e7e8 sp=0xc00012e7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 33 [GC worker (idle)]: runtime.gopark(0x1bf39986e3a1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506750 sp=0xc000506730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005067e0 sp=0xc000506750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005067e8 sp=0xc0005067e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle)]: runtime.gopark(0x1bf3998ce57b?, 0x1?, 0x72?, 0xcd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129750 sp=0xc000129730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001297e0 sp=0xc000129750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001297e8 sp=0xc0001297e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle)]: runtime.gopark(0x1bf39985a56d?, 0x3?, 0x6?, 0xef?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ef50 sp=0xc00012ef30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012efe0 sp=0xc00012ef50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012efe8 sp=0xc00012efe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 34 [GC worker (idle)]: runtime.gopark(0x1bf3997d5a89?, 0x3?, 0x44?, 0x61?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506f50 sp=0xc000506f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000506fe0 sp=0xc000506f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle)]: runtime.gopark(0x1bf3998ca8db?, 0x3?, 0x69?, 0xe3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012f750 sp=0xc00012f730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012f7e0 sp=0xc00012f750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012f7e8 sp=0xc00012f7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x3?, 0x94?, 0x62?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ff50 sp=0xc00012ff30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012ffe0 sp=0xc00012ff50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012ffe8 sp=0xc00012ffe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle)]: runtime.gopark(0x1bf399b6e15f?, 0x1?, 0xcc?, 0xa9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507750 sp=0xc000507730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005077e0 sp=0xc000507750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005077e8 sp=0xc0005077e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle)]: runtime.gopark(0x1bf3999a6453?, 0x3?, 0x16?, 0xf1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507f50 sp=0xc000507f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000507fe0 sp=0xc000507f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle)]: runtime.gopark(0x1bf39970d647?, 0x3?, 0xc5?, 0xe8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508750 sp=0xc000508730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005087e0 sp=0xc000508750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005087e8 sp=0xc0005087e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle)]: runtime.gopark(0x1bf39985df0b?, 0x3?, 0x66?, 0x34?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508f50 sp=0xc000508f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000508fe0 sp=0xc000508f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000508fe8 sp=0xc000508fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x3?, 0x8f?, 0x44?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000509750 sp=0xc000509730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005097e0 sp=0xc000509750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005097e8 sp=0xc0005097e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle)]: runtime.gopark(0x1bf3998ce0a3?, 0x3?, 0x8e?, 0xd8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000509f50 sp=0xc000509f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000509fe0 sp=0xc000509f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000509fe8 sp=0xc000509fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle)]: runtime.gopark(0x1bf399855cd9?, 0x3?, 0xb1?, 0xc1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502750 sp=0xc000502730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005027e0 sp=0xc000502750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005027e8 sp=0xc0005027e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle)]: runtime.gopark(0x1bf39985f171?, 0x3?, 0xfd?, 0x20?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502f50 sp=0xc000502f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000502fe0 sp=0xc000502f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle)]: runtime.gopark(0x1bf39989f96f?, 0x3?, 0x7a?, 0xbb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503750 sp=0xc000503730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005037e0 sp=0xc000503750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005037e8 sp=0xc0005037e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle)]: runtime.gopark(0x1bf399a2372d?, 0x3?, 0x84?, 0xbe?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503f50 sp=0xc000503f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000503fe0 sp=0xc000503f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle)]: runtime.gopark(0x1bf3999b8257?, 0x1?, 0xd3?, 0xec?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504750 sp=0xc000504730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005047e0 sp=0xc000504750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005047e8 sp=0xc0005047e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle)]: runtime.gopark(0x1bf39951e800?, 0x3?, 0xd5?, 0x38?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504f50 sp=0xc000504f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000504fe0 sp=0xc000504f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle)]: runtime.gopark(0x1bf399870ad9?, 0x3?, 0xc8?, 0x9b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505750 sp=0xc000505730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005057e0 sp=0xc000505750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005057e8 sp=0xc0005057e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle)]: runtime.gopark(0x1bf399a266a2?, 0x1?, 0x3b?, 0x2d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505f50 sp=0xc000505f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000505fe0 sp=0xc000505f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x4a?, 0x96?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000492750 sp=0xc000492730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004927e0 sp=0xc000492750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004927e8 sp=0xc0004927e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xd4?, 0xc0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129f50 sp=0xc000129f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000129fe0 sp=0xc000129f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000129fe8 sp=0xc000129fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle)]: runtime.gopark(0x1bf3998c8cf7?, 0x3?, 0x5b?, 0x44?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012a750 sp=0xc00012a730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012a7e0 sp=0xc00012a750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012a7e8 sp=0xc00012a7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle)]: runtime.gopark(0x1bf39982a543?, 0x3?, 0x1a?, 0x81?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012af50 sp=0xc00012af30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012afe0 sp=0xc00012af50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012afe8 sp=0xc00012afe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle)]: runtime.gopark(0x1bf399868659?, 0x3?, 0xd1?, 0x67?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00048e750 sp=0xc00048e730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00048e7e0 sp=0xc00048e750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00048e7e8 sp=0xc00048e7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle)]: runtime.gopark(0x1bf3999d450b?, 0x1?, 0x32?, 0xd1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00048ef50 sp=0xc00048ef30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00048efe0 sp=0xc00048ef50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00048efe8 sp=0xc00048efe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x3?, 0x10?, 0x1c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00048f750 sp=0xc00048f730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00048f7e0 sp=0xc00048f750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00048f7e8 sp=0xc00048f7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xc?, 0xb3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000492f50 sp=0xc000492f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000492fe0 sp=0xc000492f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000492fe8 sp=0xc000492fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle)]: runtime.gopark(0x1bf399b61f31?, 0x1?, 0x7f?, 0xa1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000493750 sp=0xc000493730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004937e0 sp=0xc000493750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004937e8 sp=0xc0004937e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle)]: runtime.gopark(0x1bf399977009?, 0x3?, 0xa?, 0xee?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012b750 sp=0xc00012b730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012b7e0 sp=0xc00012b750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012b7e8 sp=0xc00012b7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle)]: runtime.gopark(0x1bf3999bc005?, 0x3?, 0x56?, 0x81?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012bf50 sp=0xc00012bf30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012bfe0 sp=0xc00012bf50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012bfe8 sp=0xc00012bfe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle)]: runtime.gopark(0x1bf3998766e1?, 0x3?, 0x7a?, 0x46?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00048ff50 sp=0xc00048ff30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00048ffe0 sp=0xc00048ff50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00048ffe8 sp=0xc00048ffe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle)]: runtime.gopark(0x1bf3997bfa4f?, 0x3?, 0x28?, 0x76?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000493f50 sp=0xc000493f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000493fe0 sp=0xc000493f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000493fe8 sp=0xc000493fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x3?, 0xb0?, 0xe7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000494750 sp=0xc000494730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004947e0 sp=0xc000494750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004947e8 sp=0xc0004947e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle)]: runtime.gopark(0x1bf3997bfe41?, 0x3?, 0x79?, 0xaf?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000494f50 sp=0xc000494f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000494fe0 sp=0xc000494f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000494fe8 sp=0xc000494fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle)]: runtime.gopark(0x1bf399a236aa?, 0x3?, 0xca?, 0xd4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000490750 sp=0xc000490730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004907e0 sp=0xc000490750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004907e8 sp=0xc0004907e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle)]: runtime.gopark(0x1bf39985f3e7?, 0x3?, 0xd4?, 0x65?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2750 sp=0xc0001a2730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a27e0 sp=0xc0001a2750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a27e8 sp=0xc0001a27e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x3?, 0xde?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000490f50 sp=0xc000490f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000490fe0 sp=0xc000490f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000490fe8 sp=0xc000490fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle)]: runtime.gopark(0x1bf3999c2c7f?, 0x1?, 0x69?, 0x71?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle)]: runtime.gopark(0x1bf399af4175?, 0x3?, 0x52?, 0xd9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000491750 sp=0xc000491730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004917e0 sp=0xc000491750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004917e8 sp=0xc0004917e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle)]: runtime.gopark(0x1bf3997bb98b?, 0x3?, 0x15?, 0x70?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3750 sp=0xc0001a3730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a37e0 sp=0xc0001a3750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a37e8 sp=0xc0001a37e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x7f?, 0xef?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000491f50 sp=0xc000491f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000491fe0 sp=0xc000491f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000491fe8 sp=0xc000491fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xd0?, 0x98?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle)]: runtime.gopark(0x1bf399711067?, 0x3?, 0x9d?, 0x5e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019e750 sp=0xc00019e730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019e7e0 sp=0xc00019e750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019e7e8 sp=0xc00019e7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xfc?, 0xf1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4750 sp=0xc0001a4730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a47e0 sp=0xc0001a4750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a47e8 sp=0xc0001a47e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle)]: runtime.gopark(0x1bf39987678b?, 0x3?, 0xe1?, 0x82?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ef50 sp=0xc00019ef30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019efe0 sp=0xc00019ef50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019efe8 sp=0xc00019efe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle)]: runtime.gopark(0x1bf3998cc591?, 0x3?, 0xf0?, 0xab?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019f750 sp=0xc00019f730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019f7e0 sp=0xc00019f750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019f7e8 sp=0xc00019f7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle)]: runtime.gopark(0x1bf3999a6a57?, 0x3?, 0x5?, 0x2f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ff50 sp=0xc00019ff30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019ffe0 sp=0xc00019ff50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019ffe8 sp=0xc00019ffe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle)]: runtime.gopark(0x1bf399a246ea?, 0x3?, 0x1c?, 0xb7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x64?, 0xb3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5750 sp=0xc0001a5730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a57e0 sp=0xc0001a5750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a57e8 sp=0xc0001a57e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xc3?, 0x19?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle)]: runtime.gopark(0x1bf39985a4b9?, 0x3?, 0x58?, 0xa1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aa750 sp=0xc0001aa730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aa7e0 sp=0xc0001aa750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aa7e8 sp=0xc0001aa7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle)]: runtime.gopark(0x1bf399800d15?, 0x3?, 0x6d?, 0x9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aaf50 sp=0xc0001aaf30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aafe0 sp=0xc0001aaf50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aafe8 sp=0xc0001aafe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle)]: runtime.gopark(0x1bf399979f39?, 0x3?, 0x58?, 0xe?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ab750 sp=0xc0001ab730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001ab7e0 sp=0xc0001ab750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ab7e8 sp=0xc0001ab7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle)]: runtime.gopark(0x1bf39985ed89?, 0x3?, 0xe?, 0xa4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001abf50 sp=0xc0001abf30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001abfe0 sp=0xc0001abf50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001abfe8 sp=0xc0001abfe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle)]: runtime.gopark(0x1bf3999d1fa9?, 0x1?, 0xc?, 0xcb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ac750 sp=0xc0001ac730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001ac7e0 sp=0xc0001ac750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ac7e8 sp=0xc0001ac7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle)]: runtime.gopark(0x1bf399b693df?, 0x1?, 0x7c?, 0xf2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001acf50 sp=0xc0001acf30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001acfe0 sp=0xc0001acf50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001acfe8 sp=0xc0001acfe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle)]: runtime.gopark(0x1bf399b2324e?, 0x3?, 0x1b?, 0x47?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ad750 sp=0xc0001ad730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001ad7e0 sp=0xc0001ad750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ad7e8 sp=0xc0001ad7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x13c11d0?, 0xc00019c2a0?, 0x1a?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001adf50 sp=0xc0001adf30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001adfe0 sp=0xc0001adf50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001adfe8 sp=0xc0001adfe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x1bf3998cc825?, 0x3?, 0x7c?, 0x47?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6750 sp=0xc0001a6730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a67e0 sp=0xc0001a6750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a67e8 sp=0xc0001a67e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x1bf3998a722d?, 0x3?, 0x90?, 0xdc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x1bf399879729?, 0x3?, 0x80?, 0x1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7750 sp=0xc0001a7730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a77e0 sp=0xc0001a7750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a77e8 sp=0xc0001a77e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x1bf39985fcd9?, 0x3?, 0xa4?, 0xc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x54?, 0x64?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8750 sp=0xc0001a8730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a87e0 sp=0xc0001a8750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a87e8 sp=0xc0001a87e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x1bf399a206d1?, 0x3?, 0x47?, 0x93?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8f50 sp=0xc0001a8f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a8fe0 sp=0xc0001a8f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a8fe8 sp=0xc0001a8fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0x1bf39985fbc1?, 0x3?, 0x24?, 0xc2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9750 sp=0xc0001a9730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a97e0 sp=0xc0001a9750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a97e8 sp=0xc0001a97e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x1bf399afe4ee?, 0x1?, 0xae?, 0xbd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9f50 sp=0xc0001a9f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a9fe0 sp=0xc0001a9f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a9fe8 sp=0xc0001a9fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle)]: runtime.gopark(0x1bf3998ce1f7?, 0x3?, 0x1e?, 0x41?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b4750 sp=0xc0001b4730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b47e0 sp=0xc0001b4750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b47e8 sp=0xc0001b47e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x78?, 0x9e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b4f50 sp=0xc0001b4f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b4fe0 sp=0xc0001b4f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b4fe8 sp=0xc0001b4fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle)]: runtime.gopark(0x1bf3998ccbc7?, 0x3?, 0xe0?, 0x7d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b5750 sp=0xc0001b5730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b57e0 sp=0xc0001b5750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b57e8 sp=0xc0001b57e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle)]: runtime.gopark(0x1bf399b0005a?, 0x3?, 0xc6?, 0xff?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b5f50 sp=0xc0001b5f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b5fe0 sp=0xc0001b5f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b5fe8 sp=0xc0001b5fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x20?, 0x65?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b6750 sp=0xc0001b6730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b67e0 sp=0xc0001b6750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b67e8 sp=0xc0001b67e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle)]: runtime.gopark(0x1bf3998a0c43?, 0x3?, 0xac?, 0x67?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b6f50 sp=0xc0001b6f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b6fe0 sp=0xc0001b6f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle)]: runtime.gopark(0x1bf3999d2e45?, 0x1?, 0x79?, 0x51?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b7750 sp=0xc0001b7730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b77e0 sp=0xc0001b7750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b77e8 sp=0xc0001b77e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle)]: runtime.gopark(0x1bf3999ced31?, 0x1?, 0xc8?, 0xf9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b7f50 sp=0xc0001b7f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b7fe0 sp=0xc0001b7f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b7fe8 sp=0xc0001b7fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xa9?, 0x5c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b0750 sp=0xc0001b0730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b07e0 sp=0xc0001b0750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b07e8 sp=0xc0001b07e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle)]: runtime.gopark(0x1bf39989ec8b?, 0x3?, 0xa5?, 0x9c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b0f50 sp=0xc0001b0f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b0fe0 sp=0xc0001b0f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b0fe8 sp=0xc0001b0fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xcb?, 0x18?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b1750 sp=0xc0001b1730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b17e0 sp=0xc0001b1750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b17e8 sp=0xc0001b17e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [GC worker (idle)]: runtime.gopark(0x1bf3999a6ad8?, 0x1?, 0xa2?, 0xa2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b1f50 sp=0xc0001b1f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b1fe0 sp=0xc0001b1f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b1fe8 sp=0xc0001b1fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 93 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0xe4?, 0xed?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b2750 sp=0xc0001b2730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b27e0 sp=0xc0001b2750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b27e8 sp=0xc0001b27e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 94 [GC worker (idle)]: runtime.gopark(0x1bf39986e63f?, 0x3?, 0xbe?, 0x4a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b2f50 sp=0xc0001b2f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b2fe0 sp=0xc0001b2f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b2fe8 sp=0xc0001b2fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 95 [GC worker (idle)]: runtime.gopark(0x1bf3998cc82f?, 0x1?, 0xca?, 0x3d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b3750 sp=0xc0001b3730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b37e0 sp=0xc0001b3750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b37e8 sp=0xc0001b37e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 96 [GC worker (idle)]: runtime.gopark(0x1bf39997c72f?, 0x1?, 0xc3?, 0x85?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b3f50 sp=0xc0001b3f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b3fe0 sp=0xc0001b3f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b3fe8 sp=0xc0001b3fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 97 [GC worker (idle)]: runtime.gopark(0x1bf3998538e9?, 0x1?, 0x13?, 0xac?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001be750 sp=0xc0001be730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001be7e0 sp=0xc0001be750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001be7e8 sp=0xc0001be7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle)]: runtime.gopark(0x1bf3999c42cd?, 0x1?, 0x4?, 0xe7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bef50 sp=0xc0001bef30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001befe0 sp=0xc0001bef50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001befe8 sp=0xc0001befe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle)]: runtime.gopark(0x1bf3999c8ac1?, 0x3?, 0x34?, 0xf3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bf750 sp=0xc0001bf730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bf7e0 sp=0xc0001bf750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bf7e8 sp=0xc0001bf7e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle)]: runtime.gopark(0x1bf399a48019?, 0x1?, 0x48?, 0xef?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bff50 sp=0xc0001bff30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bffe0 sp=0xc0001bff50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bffe8 sp=0xc0001bffe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle)]: runtime.gopark(0x1bf3999cf28b?, 0x3?, 0x95?, 0x34?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c0750 sp=0xc0001c0730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001c07e0 sp=0xc0001c0750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c07e8 sp=0xc0001c07e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle)]: runtime.gopark(0x1bf3998cf6e7?, 0x1?, 0x6?, 0xae?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c0f50 sp=0xc0001c0f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001c0fe0 sp=0xc0001c0f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c0fe8 sp=0xc0001c0fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 103 [GC worker (idle)]: runtime.gopark(0x1fe5d60?, 0x1?, 0x23?, 0x8c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c1750 sp=0xc0001c1730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001c17e0 sp=0xc0001c1750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c17e8 sp=0xc0001c17e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 104 [GC worker (idle)]: runtime.gopark(0x1bf3999d1595?, 0x1?, 0xe3?, 0x3b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c1f50 sp=0xc0001c1f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001c1fe0 sp=0xc0001c1f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c1fe8 sp=0xc0001c1fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle)]: runtime.gopark(0x1bf399aff236?, 0x1?, 0x16?, 0x84?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000495750 sp=0xc000495730 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004957e0 sp=0xc000495750 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004957e8 sp=0xc0004957e0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 113 [GC worker (idle)]: runtime.gopark(0x1bf399860319?, 0x1?, 0x6d?, 0x1f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000495f50 sp=0xc000495f30 pc=0x439f96 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000495fe0 sp=0xc000495f50 pc=0x41b4b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000495fe8 sp=0xc000495fe0 pc=0x46d821 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [sync.Cond.Wait, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c8d88 sp=0xc0001c8d68 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc000538d30, 0x0) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc0001c8dd0 sp=0xc0001c8d88 pc=0x4693ac sync.(*Cond).Wait(0xc000538700?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc0001c8e08 sp=0xc0001c8dd0 pc=0x47632c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000538700) pkg/sentry/pgalloc/pgalloc.go:1405 +0xbe fp=0xc0001c8e78 sp=0xc0001c8e08 pc=0x78623e gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000538700) pkg/sentry/pgalloc/pgalloc.go:1314 +0x89 fp=0xc0001c8fc8 sp=0xc0001c8e78 pc=0x785969 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:365 +0x26 fp=0xc0001c8fe0 sp=0xc0001c8fc8 pc=0x780c26 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c8fe8 sp=0xc0001c8fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:365 +0x28a goroutine 115 [chan receive, 36 minutes]: runtime.gopark(0xc000382720?, 0xc00041d6e0?, 0x13?, 0x0?, 0xc0001c4f50?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001c4ee0 sp=0xc0001c4ec0 pc=0x439f96 runtime.chanrecv(0xc000156420, 0xc0001c4fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x49d fp=0xc0001c4f70 sp=0xc0001c4ee0 pc=0x40701d runtime.chanrecv2(0xc0004a0c40?, 0x11b09e0?) GOROOT/src/runtime/chan.go:447 +0x18 fp=0xc0001c4f98 sp=0xc0001c4f70 pc=0x406b58 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 fp=0xc0001c4fe0 sp=0xc0001c4f98 pc=0xc6d0f7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001c4fe8 sp=0xc0001c4fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x29d goroutine 116 [sync.Mutex.Lock]: runtime.gopark(0x467ddb?, 0xc0001c2d00?, 0x3?, 0x0?, 0xc0001c2d00?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000542cb8 sp=0xc000542c98 pc=0x439f96 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc000539c1c, 0x0?, 0x3, 0x1, 0xd?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc000542d20 sp=0xc000542cb8 pc=0x44b5cf sync.runtime_SemacquireMutex(0x40000000?, 0x0?, 0x40000000?) GOROOT/src/runtime/sema.go:77 +0x26 fp=0xc000542d58 sp=0xc000542d20 pc=0x469106 sync.(*Mutex).lockSlow(0xc000539c18) GOROOT/src/sync/mutex.go:171 +0x165 fp=0xc000542da8 sp=0xc000542d58 pc=0x478185 sync.(*Mutex).Lock(...) GOROOT/src/sync/mutex.go:90 gvisor.dev/gvisor/pkg/sync.(*CrossGoroutineMutex).Lock(...) pkg/sync/mutex_unsafe.go:22 gvisor.dev/gvisor/pkg/sync.(*Mutex).Lock(...) pkg/sync/mutex_unsafe.go:53 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*memoryFileMutex).Lock(0xc000542e20?) bazel-out/k8-fastbuild/bin/pkg/sentry/pgalloc/memory_file_mutex.go:34 +0x32 fp=0xc000542dc0 sp=0xc000542da8 pc=0x780612 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).markDecommitted(0xc000539c00, {0x40000000, 0x140001000}) pkg/sentry/pgalloc/pgalloc.go:844 +0x65 fp=0xc000542e78 sp=0xc000542dc0 pc=0x7827e5 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000539c00) pkg/sentry/pgalloc/pgalloc.go:1342 +0x5f fp=0xc000542fc8 sp=0xc000542e78 pc=0x78593f gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:365 +0x26 fp=0xc000542fe0 sp=0xc000542fc8 pc=0x780c26 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000542fe8 sp=0xc000542fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:365 +0x28a goroutine 117 [select]: runtime.gopark(0xc00078bfa8?, 0x2?, 0xb6?, 0x4a?, 0xc00078bf6c?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00078bde8 sp=0xc00078bdc8 pc=0x439f96 runtime.selectgo(0xc00078bfa8, 0xc00078bf68, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x7be fp=0xc00078bf28 sp=0xc00078bde8 pc=0x44a4de gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x16d fp=0xc00078bfe0 sp=0xc00078bf28 pc=0x95a3cd runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00078bfe8 sp=0xc00078bfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater pkg/sentry/kernel/timekeeper.go:224 +0xd9 goroutine 118 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bc698 sp=0xc0001bc678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e018, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bc6e0 sp=0xc0001bc698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bc718 sp=0xc0001bc6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e000, 0xc000538700?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bc7c0 sp=0xc0001bc718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bc7e0 sp=0xc0001bc7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bc7e8 sp=0xc0001bc7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 119 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bd698 sp=0xc0001bd678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e0a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bd6e0 sp=0xc0001bd698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0001bd7d0?, 0x7?, 0xa3?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bd718 sp=0xc0001bd6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e090, 0xc0001bd788?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bd7c0 sp=0xc0001bd718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bd7e0 sp=0xc0001bd7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bd7e8 sp=0xc0001bd7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 120 [select, 36 minutes]: runtime.gopark(0xc0001bce90?, 0x2700?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bce98 sp=0xc0001bce78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e138, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bcee0 sp=0xc0001bce98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x20?, 0x27?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bcf18 sp=0xc0001bcee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e120, 0xc000539c00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bcfc0 sp=0xc0001bcf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bcfe0 sp=0xc0001bcfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bcfe8 sp=0xc0001bcfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 121 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bde98 sp=0xc0001bde78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e1c8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bdee0 sp=0xc0001bde98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bdf18 sp=0xc0001bdee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e1b0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bdfc0 sp=0xc0001bdf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bdfe0 sp=0xc0001bdfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bdfe8 sp=0xc0001bdfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 122 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a0698 sp=0xc0001a0678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e258, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001a06e0 sp=0xc0001a0698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001a0718 sp=0xc0001a06e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e240, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001a07c0 sp=0xc0001a0718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001a07e0 sp=0xc0001a07c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a07e8 sp=0xc0001a07e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 123 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a0e98 sp=0xc0001a0e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e2e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001a0ee0 sp=0xc0001a0e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001a0f18 sp=0xc0001a0ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e2d0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001a0fc0 sp=0xc0001a0f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001a0fe0 sp=0xc0001a0fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a0fe8 sp=0xc0001a0fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 124 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a1698 sp=0xc0001a1678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e378, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001a16e0 sp=0xc0001a1698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001a1718 sp=0xc0001a16e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e360, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001a17c0 sp=0xc0001a1718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001a17e0 sp=0xc0001a17c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a17e8 sp=0xc0001a17e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 125 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a1e98 sp=0xc0001a1e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e408, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001a1ee0 sp=0xc0001a1e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001a1f18 sp=0xc0001a1ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e3f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001a1fc0 sp=0xc0001a1f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001a1fe0 sp=0xc0001a1fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a1fe8 sp=0xc0001a1fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 126 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000662698 sp=0xc000662678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e498, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006626e0 sp=0xc000662698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000662718 sp=0xc0006626e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e480, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006627c0 sp=0xc000662718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006627e0 sp=0xc0006627c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006627e8 sp=0xc0006627e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 127 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000662e98 sp=0xc000662e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e528, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000662ee0 sp=0xc000662e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000662f18 sp=0xc000662ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e510, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000662fc0 sp=0xc000662f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000662fe0 sp=0xc000662fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000662fe8 sp=0xc000662fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 128 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000663698 sp=0xc000663678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e5b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006636e0 sp=0xc000663698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000663718 sp=0xc0006636e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e5a0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006637c0 sp=0xc000663718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006637e0 sp=0xc0006637c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006637e8 sp=0xc0006637e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 129 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000663e98 sp=0xc000663e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e648, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000663ee0 sp=0xc000663e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000663f18 sp=0xc000663ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e630, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000663fc0 sp=0xc000663f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000663fe0 sp=0xc000663fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000663fe8 sp=0xc000663fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 130 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ba698 sp=0xc0001ba678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e6d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001ba6e0 sp=0xc0001ba698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001ba718 sp=0xc0001ba6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e6c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001ba7c0 sp=0xc0001ba718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001ba7e0 sp=0xc0001ba7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ba7e8 sp=0xc0001ba7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 131 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bae98 sp=0xc0001bae78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e768, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001baee0 sp=0xc0001bae98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001baf18 sp=0xc0001baee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e750, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bafc0 sp=0xc0001baf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bafe0 sp=0xc0001bafc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bafe8 sp=0xc0001bafe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 132 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bb698 sp=0xc0001bb678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e7f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bb6e0 sp=0xc0001bb698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bb718 sp=0xc0001bb6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e7e0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bb7c0 sp=0xc0001bb718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bb7e0 sp=0xc0001bb7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bb7e8 sp=0xc0001bb7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 133 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bbe98 sp=0xc0001bbe78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e888, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0001bbee0 sp=0xc0001bbe98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc0001bbf18 sp=0xc0001bbee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e870, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0001bbfc0 sp=0xc0001bbf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0001bbfe0 sp=0xc0001bbfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bbfe8 sp=0xc0001bbfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 134 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065e698 sp=0xc00065e678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e918, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065e6e0 sp=0xc00065e698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065e718 sp=0xc00065e6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e900, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065e7c0 sp=0xc00065e718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065e7e0 sp=0xc00065e7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065e7e8 sp=0xc00065e7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 135 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065ee98 sp=0xc00065ee78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064e9a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065eee0 sp=0xc00065ee98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065ef18 sp=0xc00065eee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064e990, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065efc0 sp=0xc00065ef18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065efe0 sp=0xc00065efc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065efe8 sp=0xc00065efe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 136 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065f698 sp=0xc00065f678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ea38, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065f6e0 sp=0xc00065f698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065f718 sp=0xc00065f6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ea20, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065f7c0 sp=0xc00065f718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065f7e0 sp=0xc00065f7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065f7e8 sp=0xc00065f7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 137 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065fe98 sp=0xc00065fe78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064eac8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065fee0 sp=0xc00065fe98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065ff18 sp=0xc00065fee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064eab0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065ffc0 sp=0xc00065ff18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065ffe0 sp=0xc00065ffc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065ffe8 sp=0xc00065ffe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 138 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000660698 sp=0xc000660678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064eb58, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006606e0 sp=0xc000660698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000660718 sp=0xc0006606e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064eb40, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006607c0 sp=0xc000660718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006607e0 sp=0xc0006607c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006607e8 sp=0xc0006607e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 139 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000660e98 sp=0xc000660e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ebe8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000660ee0 sp=0xc000660e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000660f18 sp=0xc000660ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ebd0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000660fc0 sp=0xc000660f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000660fe0 sp=0xc000660fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000660fe8 sp=0xc000660fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 140 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000661698 sp=0xc000661678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ec78, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006616e0 sp=0xc000661698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000661718 sp=0xc0006616e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ec60, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006617c0 sp=0xc000661718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006617e0 sp=0xc0006617c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006617e8 sp=0xc0006617e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 141 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000661e98 sp=0xc000661e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ed08, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000661ee0 sp=0xc000661e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000661f18 sp=0xc000661ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ecf0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000661fc0 sp=0xc000661f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000661fe0 sp=0xc000661fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000661fe8 sp=0xc000661fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 142 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066a698 sp=0xc00066a678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ed98, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066a6e0 sp=0xc00066a698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066a718 sp=0xc00066a6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ed80, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066a7c0 sp=0xc00066a718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066a7e0 sp=0xc00066a7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066a7e8 sp=0xc00066a7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 143 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066ae98 sp=0xc00066ae78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ee28, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066aee0 sp=0xc00066ae98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066af18 sp=0xc00066aee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ee10, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066afc0 sp=0xc00066af18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066afe0 sp=0xc00066afc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066afe8 sp=0xc00066afe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 144 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066b698 sp=0xc00066b678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064eeb8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066b6e0 sp=0xc00066b698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066b718 sp=0xc00066b6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064eea0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066b7c0 sp=0xc00066b718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066b7e0 sp=0xc00066b7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066b7e8 sp=0xc00066b7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 145 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066be98 sp=0xc00066be78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ef48, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066bee0 sp=0xc00066be98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066bf18 sp=0xc00066bee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ef30, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066bfc0 sp=0xc00066bf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066bfe0 sp=0xc00066bfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066bfe8 sp=0xc00066bfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 146 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065c698 sp=0xc00065c678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064efd8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065c6e0 sp=0xc00065c698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065c718 sp=0xc00065c6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064efc0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065c7c0 sp=0xc00065c718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065c7e0 sp=0xc00065c7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065c7e8 sp=0xc00065c7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 147 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065ce98 sp=0xc00065ce78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f068, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065cee0 sp=0xc00065ce98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065cf18 sp=0xc00065cee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f050, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065cfc0 sp=0xc00065cf18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065cfe0 sp=0xc00065cfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065cfe8 sp=0xc00065cfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 148 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065d698 sp=0xc00065d678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f0f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065d6e0 sp=0xc00065d698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065d718 sp=0xc00065d6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f0e0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065d7c0 sp=0xc00065d718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065d7e0 sp=0xc00065d7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065d7e8 sp=0xc00065d7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 149 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065de98 sp=0xc00065de78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f188, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00065dee0 sp=0xc00065de98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00065df18 sp=0xc00065dee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f170, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00065dfc0 sp=0xc00065df18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00065dfe0 sp=0xc00065dfc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065dfe8 sp=0xc00065dfe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 150 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000666698 sp=0xc000666678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f218, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006666e0 sp=0xc000666698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000666718 sp=0xc0006666e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f200, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006667c0 sp=0xc000666718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006667e0 sp=0xc0006667c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006667e8 sp=0xc0006667e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 151 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000666e98 sp=0xc000666e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f2a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000666ee0 sp=0xc000666e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000666f18 sp=0xc000666ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f290, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000666fc0 sp=0xc000666f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000666fe0 sp=0xc000666fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000666fe8 sp=0xc000666fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 152 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000667698 sp=0xc000667678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f338, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006676e0 sp=0xc000667698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000667718 sp=0xc0006676e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f320, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006677c0 sp=0xc000667718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006677e0 sp=0xc0006677c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006677e8 sp=0xc0006677e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 153 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000667e98 sp=0xc000667e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f3c8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000667ee0 sp=0xc000667e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000667f18 sp=0xc000667ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f3b0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000667fc0 sp=0xc000667f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000667fe0 sp=0xc000667fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000667fe8 sp=0xc000667fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 154 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000668698 sp=0xc000668678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f458, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006686e0 sp=0xc000668698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000668718 sp=0xc0006686e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f440, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006687c0 sp=0xc000668718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006687e0 sp=0xc0006687c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006687e8 sp=0xc0006687e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 155 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000668e98 sp=0xc000668e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f4e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000668ee0 sp=0xc000668e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000668f18 sp=0xc000668ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f4d0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000668fc0 sp=0xc000668f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000668fe0 sp=0xc000668fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000668fe8 sp=0xc000668fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 156 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000669698 sp=0xc000669678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f578, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006696e0 sp=0xc000669698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000669718 sp=0xc0006696e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f560, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006697c0 sp=0xc000669718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006697e0 sp=0xc0006697c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006697e8 sp=0xc0006697e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 157 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000669e98 sp=0xc000669e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f608, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000669ee0 sp=0xc000669e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000669f18 sp=0xc000669ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f5f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000669fc0 sp=0xc000669f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000669fe0 sp=0xc000669fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000669fe8 sp=0xc000669fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 158 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000674698 sp=0xc000674678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f698, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006746e0 sp=0xc000674698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000674718 sp=0xc0006746e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f680, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006747c0 sp=0xc000674718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006747e0 sp=0xc0006747c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006747e8 sp=0xc0006747e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 159 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000674e98 sp=0xc000674e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f728, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000674ee0 sp=0xc000674e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000674f18 sp=0xc000674ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f710, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000674fc0 sp=0xc000674f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000674fe0 sp=0xc000674fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000674fe8 sp=0xc000674fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 160 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000675698 sp=0xc000675678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f7b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006756e0 sp=0xc000675698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000675718 sp=0xc0006756e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f7a0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006757c0 sp=0xc000675718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006757e0 sp=0xc0006757c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006757e8 sp=0xc0006757e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 161 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000675e98 sp=0xc000675e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f848, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000675ee0 sp=0xc000675e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000675f18 sp=0xc000675ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f830, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000675fc0 sp=0xc000675f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000675fe0 sp=0xc000675fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000675fe8 sp=0xc000675fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 162 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000664698 sp=0xc000664678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f8d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006646e0 sp=0xc000664698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000664718 sp=0xc0006646e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f8c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006647c0 sp=0xc000664718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006647e0 sp=0xc0006647c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006647e8 sp=0xc0006647e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 163 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000664e98 sp=0xc000664e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f968, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000664ee0 sp=0xc000664e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000664f18 sp=0xc000664ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f950, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000664fc0 sp=0xc000664f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000664fe0 sp=0xc000664fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000664fe8 sp=0xc000664fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 164 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000665698 sp=0xc000665678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064f9f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006656e0 sp=0xc000665698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000665718 sp=0xc0006656e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064f9e0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006657c0 sp=0xc000665718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006657e0 sp=0xc0006657c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006657e8 sp=0xc0006657e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 165 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000665e98 sp=0xc000665e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fa88, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000665ee0 sp=0xc000665e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000665f18 sp=0xc000665ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fa70, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000665fc0 sp=0xc000665f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000665fe0 sp=0xc000665fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000665fe8 sp=0xc000665fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 166 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000670698 sp=0xc000670678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fb18, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006706e0 sp=0xc000670698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000670718 sp=0xc0006706e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fb00, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006707c0 sp=0xc000670718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006707e0 sp=0xc0006707c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006707e8 sp=0xc0006707e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 167 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000670e98 sp=0xc000670e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fba8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000670ee0 sp=0xc000670e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000670f18 sp=0xc000670ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fb90, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000670fc0 sp=0xc000670f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000670fe0 sp=0xc000670fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000670fe8 sp=0xc000670fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 168 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000671698 sp=0xc000671678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fc38, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006716e0 sp=0xc000671698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000671718 sp=0xc0006716e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fc20, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006717c0 sp=0xc000671718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006717e0 sp=0xc0006717c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006717e8 sp=0xc0006717e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 169 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000671e98 sp=0xc000671e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fcc8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000671ee0 sp=0xc000671e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000671f18 sp=0xc000671ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fcb0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000671fc0 sp=0xc000671f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000671fe0 sp=0xc000671fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000671fe8 sp=0xc000671fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 170 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000672698 sp=0xc000672678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fd58, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006726e0 sp=0xc000672698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000672718 sp=0xc0006726e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fd40, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006727c0 sp=0xc000672718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006727e0 sp=0xc0006727c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006727e8 sp=0xc0006727e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 171 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000672e98 sp=0xc000672e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fde8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000672ee0 sp=0xc000672e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000672f18 sp=0xc000672ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fdd0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000672fc0 sp=0xc000672f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000672fe0 sp=0xc000672fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000672fe8 sp=0xc000672fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 172 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000673698 sp=0xc000673678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064fe78, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc0006736e0 sp=0xc000673698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000673718 sp=0xc0006736e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fe60, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc0006737c0 sp=0xc000673718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006737e0 sp=0xc0006737c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006737e8 sp=0xc0006737e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 173 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000673e98 sp=0xc000673e78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ff08, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc000673ee0 sp=0xc000673e98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc000673f18 sp=0xc000673ee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064fef0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc000673fc0 sp=0xc000673f18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000673fe0 sp=0xc000673fc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000673fe8 sp=0xc000673fe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 174 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00067e698 sp=0xc00067e678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00064ff98, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00067e6e0 sp=0xc00067e698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00067e718 sp=0xc00067e6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00064ff80, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00067e7c0 sp=0xc00067e718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00067e7e0 sp=0xc00067e7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00067e7e8 sp=0xc00067e7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 175 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00067ee98 sp=0xc00067ee78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000650028, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00067eee0 sp=0xc00067ee98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00067ef18 sp=0xc00067eee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000650010, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00067efc0 sp=0xc00067ef18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00067efe0 sp=0xc00067efc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00067efe8 sp=0xc00067efe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 176 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00067f698 sp=0xc00067f678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006500b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00067f6e0 sp=0xc00067f698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00067f718 sp=0xc00067f6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006500a0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00067f7c0 sp=0xc00067f718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00067f7e0 sp=0xc00067f7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00067f7e8 sp=0xc00067f7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 177 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00067fe98 sp=0xc00067fe78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000650148, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00067fee0 sp=0xc00067fe98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00067ff18 sp=0xc00067fee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000650130, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00067ffc0 sp=0xc00067ff18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00067ffe0 sp=0xc00067ffc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00067ffe8 sp=0xc00067ffe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 178 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066e698 sp=0xc00066e678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006501d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066e6e0 sp=0xc00066e698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066e718 sp=0xc00066e6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006501c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066e7c0 sp=0xc00066e718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066e7e0 sp=0xc00066e7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066e7e8 sp=0xc00066e7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 179 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066ee98 sp=0xc00066ee78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000650268, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066eee0 sp=0xc00066ee98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066ef18 sp=0xc00066eee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000650250, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066efc0 sp=0xc00066ef18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066efe0 sp=0xc00066efc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066efe8 sp=0xc00066efe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 180 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066f698 sp=0xc00066f678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006502f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066f6e0 sp=0xc00066f698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066f718 sp=0xc00066f6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006502e0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066f7c0 sp=0xc00066f718 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066f7e0 sp=0xc00066f7c0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066f7e8 sp=0xc00066f7e0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 181 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00066fe98 sp=0xc00066fe78 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000650388, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00066fee0 sp=0xc00066fe98 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00066ff18 sp=0xc00066fee0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000650370, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb0 fp=0xc00066ffc0 sp=0xc00066ff18 pc=0x9d0750 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc00066ffe0 sp=0xc00066ffc0 pc=0x9d0eca runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00066ffe8 sp=0xc00066ffe0 pc=0x46d821 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13d goroutine 182 [select, 36 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00067a698 sp=0xc00067a678 pc=0x439f96 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000650418, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0x85 fp=0xc00067a6e0 sp=0xc00067a698 pc=0x9b2b85 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x31 fp=0xc00067a718 sp=0xc00067a6e0 pc=0x9b2c91 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/tr VM DIAGNOSIS: I0714 04:47:45.550858 898962 main.go:230] *************************** I0714 04:47:45.550915 898962 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/current/image -root /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-1] I0714 04:47:45.550942 898962 main.go:232] Version 0.0.0 I0714 04:47:45.550962 898962 main.go:233] GOOS: linux I0714 04:47:45.550996 898962 main.go:234] GOARCH: amd64 I0714 04:47:45.551011 898962 main.go:235] PID: 898962 I0714 04:47:45.551030 898962 main.go:236] UID: 0, GID: 0 I0714 04:47:45.551043 898962 main.go:237] Configuration: I0714 04:47:45.551077 898962 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root I0714 04:47:45.551098 898962 main.go:239] Platform: systrap I0714 04:47:45.551118 898962 main.go:240] FileAccess: shared I0714 04:47:45.551140 898962 main.go:241] Directfs: true I0714 04:47:45.551161 898962 main.go:242] Overlay: none I0714 04:47:45.551181 898962 main.go:243] Network: sandbox, logging: false I0714 04:47:45.551201 898962 main.go:244] Strace: false, max size: 1024, syscalls: I0714 04:47:45.551221 898962 main.go:245] IOURING: false I0714 04:47:45.551255 898962 main.go:246] Debug: true I0714 04:47:45.551274 898962 main.go:247] Systemd: false I0714 04:47:45.551291 898962 main.go:248] *************************** D0714 04:47:45.551343 898962 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0714 04:47:45.552511 898962 util.go:51] Found sandbox "ci-gvisor-systrap-1-1", PID: 789113 Found sandbox "ci-gvisor-systrap-1-1", PID: 789113 I0714 04:47:45.552556 898962 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0714 04:47:45.552561 898962 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-1" D0714 04:47:45.552566 898962 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-1" W0714 04:47:45.552620 898962 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 789113: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 789113: connection refused W0714 04:47:45.552674 898962 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-1"]: exit status 128 I0714 04:47:45.550858 898962 main.go:230] *************************** I0714 04:47:45.550915 898962 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/current/image -root /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-1] I0714 04:47:45.550942 898962 main.go:232] Version 0.0.0 I0714 04:47:45.550962 898962 main.go:233] GOOS: linux I0714 04:47:45.550996 898962 main.go:234] GOARCH: amd64 I0714 04:47:45.551011 898962 main.go:235] PID: 898962 I0714 04:47:45.551030 898962 main.go:236] UID: 0, GID: 0 I0714 04:47:45.551043 898962 main.go:237] Configuration: I0714 04:47:45.551077 898962 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root I0714 04:47:45.551098 898962 main.go:239] Platform: systrap I0714 04:47:45.551118 898962 main.go:240] FileAccess: shared I0714 04:47:45.551140 898962 main.go:241] Directfs: true I0714 04:47:45.551161 898962 main.go:242] Overlay: none I0714 04:47:45.551181 898962 main.go:243] Network: sandbox, logging: false I0714 04:47:45.551201 898962 main.go:244] Strace: false, max size: 1024, syscalls: I0714 04:47:45.551221 898962 main.go:245] IOURING: false I0714 04:47:45.551255 898962 main.go:246] Debug: true I0714 04:47:45.551274 898962 main.go:247] Systemd: false I0714 04:47:45.551291 898962 main.go:248] *************************** D0714 04:47:45.551343 898962 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0714 04:47:45.552511 898962 util.go:51] Found sandbox "ci-gvisor-systrap-1-1", PID: 789113 Found sandbox "ci-gvisor-systrap-1-1", PID: 789113 I0714 04:47:45.552556 898962 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0714 04:47:45.552561 898962 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-1" D0714 04:47:45.552566 898962 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-1" W0714 04:47:45.552620 898962 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 789113: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 789113: connection refused W0714 04:47:45.552674 898962 main.go:274] Failure to execute command, err: 1 [19348.347910] audit: type=1326 audit(1689298676.483:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=300557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [19368.296313] audit: type=1326 audit(1689298696.435:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=305053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19390.044165] audit: type=1326 audit(1689298718.183:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=327284 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19399.525848] audit: type=1326 audit(1689298727.663:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=329294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19412.182807] audit: type=1326 audit(1689298740.323:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=346029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19475.693209] exe[323126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56264cf33839 cs:33 sp:7f27b87caee8 ax:0 si:0 di:ffffffffff600000 [19502.499854] exe[353426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31175e839 cs:33 sp:7f16b2720ee8 ax:0 si:0 di:ffffffffff600000 [19515.837334] exe[336835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559024eb5839 cs:33 sp:7ec0855b8ee8 ax:0 si:0 di:ffffffffff600000 [19541.742946] audit: type=1326 audit(1689298869.883:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=346973 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19546.775381] audit: type=1326 audit(1689298874.915:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=347697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19549.381055] exe[344097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b682c9b839 cs:33 sp:7fdd29be6ee8 ax:0 si:0 di:ffffffffff600000 [19564.540280] audit: type=1326 audit(1689298892.679:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=357110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19660.558545] exe[362461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eacffe839 cs:33 sp:7fcd944b3858 ax:0 si:556ead057070 di:ffffffffff600000 [19660.628820] exe[361088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eacffe839 cs:33 sp:7fcd944b3858 ax:0 si:556ead057070 di:ffffffffff600000 [19660.694179] exe[360883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eacffe839 cs:33 sp:7fcd944b3858 ax:0 si:556ead057070 di:ffffffffff600000 [19660.726097] exe[364472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbdc4a6839 cs:33 sp:7f415dd75858 ax:0 si:55bbdc4ff070 di:ffffffffff600000 [19660.749860] exe[361015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556759e24839 cs:33 sp:7f572c36f858 ax:0 si:556759e7d070 di:ffffffffff600000 [19660.770393] exe[364469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eacffe839 cs:33 sp:7fcd944b3858 ax:0 si:556ead057070 di:ffffffffff600000 [19660.794553] exe[364480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbdc4a6839 cs:33 sp:7f415dd75858 ax:0 si:55bbdc4ff070 di:ffffffffff600000 [19660.823733] exe[362121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556759e24839 cs:33 sp:7f572c36f858 ax:0 si:556759e7d070 di:ffffffffff600000 [19660.865676] exe[360883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbdc4a6839 cs:33 sp:7f415dd75858 ax:0 si:55bbdc4ff070 di:ffffffffff600000 [19660.898772] exe[360812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556759e24839 cs:33 sp:7f572c36f858 ax:0 si:556759e7d070 di:ffffffffff600000 [19688.645060] audit: type=1326 audit(1689299016.783:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=357472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19698.234382] audit: type=1326 audit(1689299026.375:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=359694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19748.219903] audit: type=1326 audit(1689299076.359:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=305578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19755.188689] audit: type=1326 audit(1689299083.327:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=301734 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [19831.685229] audit: type=1326 audit(1689299159.822:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=367881 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19840.976664] audit: type=1326 audit(1689299169.114:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=368589 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19918.078266] audit: type=1326 audit(1689299246.214:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=343743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19973.935376] audit: type=1326 audit(1689299302.074:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=374829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [19982.629535] audit: type=1326 audit(1689299310.766:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=375452 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20115.974614] audit: type=1326 audit(1689299444.110:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=382774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20119.777821] audit: type=1326 audit(1689299447.914:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=307423 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [20125.763184] audit: type=1326 audit(1689299453.902:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=383449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20138.472049] audit: type=1326 audit(1689299466.610:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=388046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20268.143085] audit: type=1326 audit(1689299596.278:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=388294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20387.759890] audit: type=1326 audit(1689299715.898:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=392463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20410.532558] audit: type=1326 audit(1689299738.670:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=393915 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20415.590137] audit: type=1326 audit(1689299743.726:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=371588 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20529.667137] audit: type=1326 audit(1689299857.805:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=400078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20552.007951] audit: type=1326 audit(1689299880.145:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=407241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20552.705758] audit: type=1326 audit(1689299880.841:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=401232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20574.802350] audit: type=1326 audit(1689299902.937:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=408662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20602.946680] audit: type=1326 audit(1689299931.081:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=343447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [20685.787402] audit: type=1326 audit(1689300013.925:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=407849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20708.645005] audit: type=1326 audit(1689300036.781:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=412131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20762.398226] audit: type=1326 audit(1689300090.533:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=373251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [20824.389629] audit: type=1326 audit(1689300152.525:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=411989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20906.671673] audit: type=1326 audit(1689300234.809:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=333796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [20925.390346] audit: type=1326 audit(1689300253.525:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=414767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [20959.044641] audit: type=1326 audit(1689300287.181:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=415558 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20965.936825] audit: type=1326 audit(1689300294.073:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=416137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [20966.952047] audit: type=1326 audit(1689300295.089:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=420210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21101.277793] audit: type=1326 audit(1689300429.413:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=420562 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21108.347632] audit: type=1326 audit(1689300436.485:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=421865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21124.141938] audit: type=1326 audit(1689300452.277:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=427443 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21126.981513] audit: type=1326 audit(1689300455.117:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=410954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21170.225981] audit: type=1326 audit(1689300498.361:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=429505 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21209.994780] audit: type=1326 audit(1689300538.129:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=307049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21251.637248] audit: type=1326 audit(1689300579.772:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=427602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21253.399385] audit: type=1326 audit(1689300581.532:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=432502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21342.493410] audit: type=1326 audit(1689300670.628:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=420581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21366.019152] audit: type=1326 audit(1689300694.152:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=389202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21388.592070] audit: type=1326 audit(1689300716.728:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=432721 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21394.633897] audit: type=1326 audit(1689300722.768:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=433059 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21530.853716] audit: type=1326 audit(1689300858.988:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=436634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21540.149677] audit: type=1326 audit(1689300868.284:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=437266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21651.127492] audit: type=1326 audit(1689300979.260:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=431686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21673.173783] audit: type=1326 audit(1689301001.308:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=441716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21682.006716] audit: type=1326 audit(1689301010.140:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=442282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21703.831734] audit: type=1326 audit(1689301031.964:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=448743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21815.095632] audit: type=1326 audit(1689301143.228:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=447821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21832.989111] audit: type=1326 audit(1689301161.124:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=453115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [21952.697909] audit: type=1326 audit(1689301280.832:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=419415 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [21956.900650] audit: type=1326 audit(1689301285.036:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=453256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22026.153870] audit: type=1326 audit(1689301354.287:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=430017 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22030.370249] audit: type=1326 audit(1689301358.503:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=435837 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22082.813053] audit: type=1326 audit(1689301410.947:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=455572 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22099.548597] audit: type=1326 audit(1689301427.683:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=456206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22105.662522] audit: type=1326 audit(1689301433.795:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=460860 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22171.845079] audit: type=1326 audit(1689301499.979:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=436502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22172.825374] audit: type=1326 audit(1689301500.959:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=401741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22241.718701] audit: type=1326 audit(1689301569.851:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=461882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22260.306417] audit: type=1326 audit(1689301588.443:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=456893 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22264.887935] audit: type=1326 audit(1689301593.023:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=466843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22354.714647] audit: type=1326 audit(1689301682.851:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=465799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22395.226548] audit: type=1326 audit(1689301723.363:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=446808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22434.159764] audit: type=1326 audit(1689301762.295:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=459110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22496.876092] audit: type=1326 audit(1689301825.011:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=471950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22513.764927] audit: type=1326 audit(1689301841.903:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=472851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22557.236466] audit: type=1326 audit(1689301885.371:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=463917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22639.448369] audit: type=1326 audit(1689301967.583:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=477123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22656.430989] audit: type=1326 audit(1689301984.567:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=477890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22710.488203] potentially unexpected fatal signal 5. [22710.493152] CPU: 58 PID: 485922 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22710.503567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22710.512943] RIP: 0033:0x7fffffffe062 [22710.516665] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22710.535630] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22710.542363] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22710.549635] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22710.558301] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [22710.565642] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [22710.574329] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22710.582988] FS: 0000000002283cd0 GS: 0000000000000000 [22710.734669] potentially unexpected fatal signal 5. [22710.740730] CPU: 88 PID: 320700 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22710.751056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22710.760419] RIP: 0033:0x7fffffffe062 [22710.765506] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22710.784422] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22710.791186] RAX: 0000000000076a6c RBX: 0000000000000000 RCX: 00007fffffffe05a [22710.799852] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [22710.808497] RBP: 000000c00018fe38 R08: 000000c003eee1f0 R09: 0000000000000000 [22710.817145] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [22710.819286] potentially unexpected fatal signal 5. [22710.824421] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22710.824423] FS: 0000000002283cd0 GS: 0000000000000000 [22710.844748] CPU: 81 PID: 406004 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22710.855103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22710.864461] RIP: 0033:0x7fffffffe062 [22710.869547] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22710.888448] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22710.895181] RAX: 0000000000076a6e RBX: 0000000000000000 RCX: 00007fffffffe05a [22710.902440] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [22710.909690] RBP: 000000c00018fe38 R08: 000000c02d14e4c0 R09: 0000000000000000 [22710.918332] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [22710.925609] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22710.932882] FS: 0000000002283cd0 GS: 0000000000000000 [22711.020219] potentially unexpected fatal signal 5. [22711.026244] CPU: 34 PID: 485991 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22711.036647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22711.047375] RIP: 0033:0x7fffffffe062 [22711.052444] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22711.071332] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22711.078114] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22711.086842] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22711.094137] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [22711.101437] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [22711.108708] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22711.115985] FS: 0000000002283cd0 GS: 0000000000000000 [22711.159699] potentially unexpected fatal signal 5. [22711.165504] CPU: 88 PID: 485912 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22711.175832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22711.186701] RIP: 0033:0x7fffffffe062 [22711.191782] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22711.212090] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22711.218813] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22711.221277] potentially unexpected fatal signal 5. [22711.227481] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22711.232405] CPU: 86 PID: 485951 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22711.232406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22711.232409] RIP: 0033:0x7fffffffe062 [22711.232411] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22711.241088] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [22711.241090] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [22711.241090] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22711.241091] FS: 0000000002283cd0 GS: 0000000000000000 [22711.314998] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22711.321756] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22711.330412] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22711.339075] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [22711.347896] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [22711.356558] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22711.365198] FS: 0000000002283cd0 GS: 0000000000000000 [22711.418403] potentially unexpected fatal signal 5. [22711.424182] CPU: 75 PID: 485980 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22711.434626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22711.445323] RIP: 0033:0x7fffffffe062 [22711.450424] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22711.470720] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [22711.477473] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22711.486157] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22711.494815] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [22711.502114] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [22711.510770] R13: 000000000000003e R14: 000000c0001ab6c0 R15: 0000000000049b09 [22711.518060] FS: 0000000002283cd0 GS: 0000000000000000 [22719.578423] potentially unexpected fatal signal 5. [22719.583392] CPU: 62 PID: 486528 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22719.593833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22719.603243] RIP: 0033:0x7fffffffe062 [22719.607046] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22719.611510] potentially unexpected fatal signal 5. [22719.626092] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22719.627781] potentially unexpected fatal signal 5. [22719.627786] CPU: 5 PID: 486513 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22719.627788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22719.627793] RIP: 0033:0x7fffffffe062 [22719.627796] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22719.627798] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22719.627799] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22719.627800] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22719.627801] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [22719.627802] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [22719.627803] R13: 000000000000003e R14: 000000c000582d00 R15: 0000000000049fee [22719.627804] FS: 000000c0004a4490 GS: 0000000000000000 [22719.632377] CPU: 7 PID: 486515 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22719.632378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22719.632380] RIP: 0033:0x7fffffffe062 [22719.632382] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22719.632383] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22719.632384] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22719.632385] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22719.632385] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [22719.632386] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [22719.632386] R13: 000000000000003e R14: 000000c000582d00 R15: 0000000000049fee [22719.632387] FS: 000000c0004a4490 GS: 0000000000000000 [22719.648649] potentially unexpected fatal signal 5. [22719.655748] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22719.655749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22719.655750] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [22719.655750] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [22719.655751] R13: 000000000000003e R14: 000000c000582d00 R15: 0000000000049fee [22719.655752] FS: 000000c0004a4490 GS: 0000000000000000 [22719.880643] CPU: 7 PID: 486507 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22719.890995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22719.901714] RIP: 0033:0x7fffffffe062 [22719.905418] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22719.925919] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22719.932635] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22719.941308] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22719.949974] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [22719.958599] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [22719.965886] R13: 000000000000003e R14: 000000c000582d00 R15: 0000000000049fee [22719.973172] FS: 000000c0004a4490 GS: 0000000000000000 [22720.908557] potentially unexpected fatal signal 5. [22720.913522] CPU: 35 PID: 372789 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22720.924054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22720.933419] RIP: 0033:0x7fffffffe062 [22720.936024] potentially unexpected fatal signal 5. [22720.937126] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22720.942073] CPU: 74 PID: 486724 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22720.942076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22720.961005] RSP: 002b:000000c00052dd98 EFLAGS: 00000297 [22720.961008] RAX: 0000000000076d66 RBX: 0000000000000000 RCX: 00007fffffffe05a [22720.961009] RDX: 0000000000000000 RSI: 000000c00052e000 RDI: 0000000000012f00 [22720.961010] RBP: 000000c00052de38 R08: 000000c0124cb4b0 R09: 0000000000000000 [22720.961011] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00052de20 [22720.961011] R13: 000000000000003e R14: 000000c000601520 R15: 000000000004a117 [22720.961013] FS: 000000c000680090 GS: 0000000000000000 [22720.979722] potentially unexpected fatal signal 5. [22720.981249] RIP: 0033:0x7fffffffe062 [22720.986627] CPU: 36 PID: 486722 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22720.986634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22720.991089] potentially unexpected fatal signal 5. [22720.991091] CPU: 38 PID: 486743 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22720.991092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22720.991096] RIP: 0033:0x7fffffffe062 [22720.991098] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22720.991099] RSP: 002b:000000c00052dd98 EFLAGS: 00000297 [22720.991101] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22720.991101] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22720.991102] RBP: 000000c00052de38 R08: 0000000000000000 R09: 0000000000000000 [22720.991102] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00052de20 [22720.991103] R13: 000000000000003e R14: 000000c000601520 R15: 000000000004a117 [22720.991104] FS: 000000c000680090 GS: 0000000000000000 [22720.993945] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22720.993946] RSP: 002b:000000c00052dd98 EFLAGS: 00000297 [22720.993948] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22720.993949] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22720.993950] RBP: 000000c00052de38 R08: 0000000000000000 R09: 0000000000000000 [22720.993953] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00052de20 [22720.993955] R13: 000000000000003e R14: 000000c000601520 R15: 000000000004a117 [22720.993957] FS: 000000c000680090 GS: 0000000000000000 [22721.226807] RIP: 0033:0x7fffffffe062 [22721.230518] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22721.250857] RSP: 002b:000000c00052dd98 EFLAGS: 00000297 [22721.257681] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22721.266344] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22721.275008] RBP: 000000c00052de38 R08: 0000000000000000 R09: 0000000000000000 [22721.282276] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00052de20 [22721.290925] R13: 000000000000003e R14: 000000c000601520 R15: 000000000004a117 [22721.298195] FS: 000000c000680090 GS: 0000000000000000 [22721.674706] potentially unexpected fatal signal 5. [22721.680493] CPU: 74 PID: 319771 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22721.690836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22721.701576] RIP: 0033:0x7fffffffe062 [22721.706663] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22721.727070] RSP: 002b:000000c00052dd98 EFLAGS: 00000297 [22721.733796] RAX: 0000000000076d73 RBX: 0000000000000000 RCX: 00007fffffffe05a [22721.741121] RDX: 0000000000000000 RSI: 000000c00052e000 RDI: 0000000000012f00 [22721.749810] RBP: 000000c00052de38 R08: 000000c005487c30 R09: 0000000000000000 [22721.758471] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00052de20 [22721.767149] R13: 000000000000003e R14: 000000c000601520 R15: 000000000004a117 [22721.775804] FS: 000000c000680090 GS: 0000000000000000 [22722.935311] potentially unexpected fatal signal 5. [22722.940271] CPU: 18 PID: 413468 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22722.950592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22722.959960] RIP: 0033:0x7fffffffe062 [22722.963661] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22722.982563] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22722.987954] RAX: 0000000000076dfb RBX: 0000000000000000 RCX: 00007fffffffe05a [22722.995236] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [22723.002640] RBP: 000000c00013de38 R08: 000000c0e7571780 R09: 0000000000000000 [22723.009909] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [22723.017195] R13: 000000000000003a R14: 000000c000501860 R15: 000000000004a3ec [22723.021673] potentially unexpected fatal signal 5. [22723.025876] FS: 000000c000586090 GS: 0000000000000000 [22723.030783] CPU: 67 PID: 413472 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22723.030785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22723.030788] RIP: 0033:0x7fffffffe062 [22723.030790] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22723.030792] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [22723.030793] RAX: 0000000000076dfa RBX: 0000000000000000 RCX: 00007fffffffe05a [22723.030794] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [22723.030795] RBP: 000000c00013de38 R08: 000000c006eede10 R09: 0000000000000000 [22723.030795] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [22723.030796] R13: 000000000000003a R14: 000000c000501860 R15: 000000000004a3ec [22723.030796] FS: 000000c000586090 GS: 0000000000000000 [22724.383856] potentially unexpected fatal signal 5. [22724.388837] CPU: 27 PID: 367358 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22724.399200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22724.408762] RIP: 0033:0x7fffffffe062 [22724.412480] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22724.420876] potentially unexpected fatal signal 5. [22724.431409] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [22724.436406] CPU: 66 PID: 311776 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22724.436408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22724.436415] RIP: 0033:0x7fffffffe062 [22724.436419] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22724.443141] RAX: 0000000000077075 RBX: 0000000000000000 RCX: 00007fffffffe05a [22724.443141] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [22724.443142] RBP: 000000c000193e38 R08: 000000c00427fc30 R09: 0000000000000000 [22724.443143] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [22724.443143] R13: 0000000000000010 R14: 000000c0004b0680 R15: 000000000004a615 [22724.443144] FS: 000000c000131c90 GS: 0000000000000000 [22724.534337] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [22724.541070] RAX: 0000000000077071 RBX: 0000000000000000 RCX: 00007fffffffe05a [22724.548362] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [22724.557037] RBP: 000000c000193e38 R08: 000000c003d9e2e0 R09: 0000000000000000 [22724.565699] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [22724.574333] R13: 0000000000000010 R14: 000000c0004b0680 R15: 000000000004a615 [22724.582984] FS: 000000c000131c90 GS: 0000000000000000 [22734.385374] potentially unexpected fatal signal 5. [22734.390416] CPU: 88 PID: 489348 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22734.400743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22734.410228] RIP: 0033:0x7fffffffe062 [22734.413999] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22734.421361] potentially unexpected fatal signal 5. [22734.434395] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [22734.439452] CPU: 91 PID: 489351 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [22734.439455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [22734.455206] RIP: 0033:0x7fffffffe062 [22734.455210] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [22734.455211] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [22734.455212] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22734.455213] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22734.455214] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [22734.455214] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [22734.455215] R13: 000000000000001e R14: 000000c000583d40 R15: 000000000004adb6 [22734.455216] FS: 000000c00058c090 GS: 0000000000000000 [22734.541495] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [22734.548798] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [22734.557467] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [22734.566140] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [22734.574790] R13: 000000000000001e R14: 000000c000583d40 R15: 000000000004adb6 [22734.583443] FS: 000000c00058c090 GS: 0000000000000000 [22781.239593] audit: type=1326 audit(1689302109.374:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=482651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22784.183085] audit: type=1326 audit(1689302112.318:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=468303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [22798.704423] audit: type=1326 audit(1689302126.838:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=483562 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22820.745412] audit: type=1326 audit(1689302148.882:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=501565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22874.368434] audit: type=1326 audit(1689302202.502:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=508358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22922.816600] audit: type=1326 audit(1689302250.950:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=499270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22941.625118] audit: type=1326 audit(1689302269.758:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=479637 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22954.734066] audit: type=1326 audit(1689302282.870:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=505104 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22963.895619] audit: type=1326 audit(1689302292.030:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=513416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [22971.454519] audit: type=1326 audit(1689302299.590:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=465228 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [23029.585085] audit: type=1326 audit(1689302357.718:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=458906 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [23065.440725] audit: type=1326 audit(1689302393.574:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=512208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23096.791822] audit: type=1326 audit(1689302424.926:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=514609 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23208.006097] audit: type=1326 audit(1689302536.142:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=522395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23238.788223] audit: type=1326 audit(1689302566.922:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=523929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23305.042571] exe[488167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23305.084639] exe[531639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23305.121780] exe[487993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.343022] exe[488481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.385999] exe[488481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.426956] exe[488481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.467508] exe[487987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.507046] exe[487987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.542508] exe[488235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23308.579975] exe[488235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fbe7b40a cs:33 sp:7f150afbbee8 ax:12 si:ffffffffff600000 di:5634fbee7ff2 [23318.872152] audit: type=1326 audit(1689302647.006:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=476208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [23350.561789] audit: type=1326 audit(1689302678.698:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=530393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23358.518312] audit: type=1326 audit(1689302686.654:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=514695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23374.012745] audit: type=1326 audit(1689302702.146:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=508902 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23381.350241] audit: type=1326 audit(1689302709.486:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=537224 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23381.906442] audit: type=1326 audit(1689302710.042:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=531685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23492.336547] audit: type=1326 audit(1689302820.469:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=536478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23508.501487] warn_bad_vsyscall: 7 callbacks suppressed [23508.501490] exe[490790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646f45b9839 cs:33 sp:7f0dcc66c858 ax:0 si:5646f4612062 di:ffffffffff600000 [23526.889110] audit: type=1326 audit(1689302855.021:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=539193 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23568.094923] potentially unexpected fatal signal 11. [23568.099983] CPU: 12 PID: 545335 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [23568.110319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [23568.119718] RIP: 0033:0x55876030f7f6 [23568.123480] Code: ff 48 8d 35 dd 48 09 00 48 8b 94 24 f8 03 00 00 48 8d 3d d7 48 09 00 31 c0 e8 b6 37 ff ff 66 0f 1f 44 00 00 48 89 fa 48 89 f8 <40> 88 3d c1 1e c9 00 48 d1 ea 80 25 b7 1e c9 00 01 83 e2 01 88 15 [23568.143795] RSP: 002b:00007facb2646538 EFLAGS: 00010287 [23568.150542] RAX: 00000000000047c0 RBX: 00000000ffffffff RCX: 000055876035778d [23568.159205] RDX: 00000000000047c0 RSI: 00007facb26465a0 RDI: 00000000000047c0 [23568.167884] RBP: 00007facb264659c R08: 000000000000000a R09: 00007facb2646287 [23568.176534] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001f4 [23568.185207] R13: 000000000002e464 R14: 000000000002e444 R15: 0000000000000001 [23568.193856] FS: 0000558760fa8480 GS: 0000000000000000 [23616.891464] exe[532822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d6d858 ax:0 si:563c829b7097 di:ffffffffff600000 [23617.690871] exe[532576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d4c858 ax:0 si:563c829b7097 di:ffffffffff600000 [23617.806021] exe[532822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d4c858 ax:0 si:563c829b7097 di:ffffffffff600000 [23635.984883] audit: type=1326 audit(1689302964.117:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=544310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23640.369231] audit: type=1326 audit(1689302968.501:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=537958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23669.022436] audit: type=1326 audit(1689302997.157:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=546616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23722.992590] audit: type=1326 audit(1689303051.125:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=535908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [23764.396118] audit: type=1326 audit(1689303092.529:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=517727 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [23777.937620] audit: type=1326 audit(1689303106.069:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=552198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23809.007893] audit: type=1326 audit(1689303137.141:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=552505 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23811.375768] audit: type=1326 audit(1689303139.509:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=554481 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23833.758763] audit: type=1326 audit(1689303161.893:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=560872 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23919.037092] audit: type=1326 audit(1689303247.169:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=557496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [23969.976148] audit: type=1326 audit(1689303298.109:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=562521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24014.816252] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24014.855424] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24014.876139] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24014.912835] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24014.953734] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24014.994817] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24015.032284] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24015.071068] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24015.109176] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24015.144256] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24019.819682] warn_bad_vsyscall: 370 callbacks suppressed [24019.819685] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24019.870292] exe[517973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24019.912449] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24019.952223] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24019.996332] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24020.034767] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24020.074064] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24020.112194] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24020.147289] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24020.184271] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24024.826341] warn_bad_vsyscall: 254 callbacks suppressed [24024.826344] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24024.868764] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24024.889109] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24024.923693] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.037981] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.073951] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.094889] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.130727] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.151331] exe[517973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.357544] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.399878] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.438442] exe[517973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.458390] exe[517973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24031.477865] exe[517973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24043.176512] warn_bad_vsyscall: 35 callbacks suppressed [24043.176515] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24043.224121] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24043.266507] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24044.236868] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24044.277312] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24044.278011] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24044.339367] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24045.244968] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24045.286675] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24045.287207] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24049.948369] warn_bad_vsyscall: 1 callbacks suppressed [24049.948372] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24049.996455] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24050.018397] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24050.054902] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24052.936466] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24052.971842] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24052.992074] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24053.024517] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24053.045622] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24054.859372] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24059.095818] warn_bad_vsyscall: 2 callbacks suppressed [24059.095822] exe[549206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24059.139724] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24059.181027] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24059.181095] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24061.486567] audit: type=1326 audit(1689303389.621:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=565733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24068.306610] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24068.344809] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24068.386033] exe[549206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24076.721325] exe[549206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24076.756992] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24076.794104] exe[549206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24096.519718] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24096.570242] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24096.611420] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24099.660383] exe[548864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24099.699025] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24099.736265] exe[548864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24107.703392] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24107.756368] exe[488654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24107.790369] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24107.791286] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24109.322397] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24109.365045] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24109.411354] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24109.433022] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24109.622525] exe[488654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24109.662022] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24111.283846] audit: type=1326 audit(1689303439.417:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=567774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24115.627882] warn_bad_vsyscall: 76 callbacks suppressed [24115.627886] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24115.684487] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24115.713395] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24115.750720] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24116.366806] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24116.414869] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24116.450099] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24117.822379] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24117.856227] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24117.891784] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24126.561517] audit: type=1326 audit(1689303454.693:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=473817 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24140.827967] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24140.880410] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24140.939659] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24140.989831] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24141.038525] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24141.043448] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24141.108913] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24141.138647] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24149.407545] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24149.456765] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24149.500621] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24149.523690] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24167.809999] audit: type=1326 audit(1689303495.940:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=558169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [24175.910682] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24175.957050] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24175.982510] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24176.019130] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24178.107444] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24178.166028] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24179.244056] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24179.281282] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24179.317837] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24202.369697] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24202.409631] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24202.430510] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24202.466434] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24202.488906] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24203.342832] audit: type=1326 audit(1689303531.476:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=571711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24207.685171] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24207.725334] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24207.746201] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24207.779248] exe[556343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24208.159032] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24208.195184] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24208.196330] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [24208.248895] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24211.860784] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24211.897521] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24212.813004] warn_bad_vsyscall: 3 callbacks suppressed [24212.813008] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24212.852204] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24212.889799] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.203709] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.245981] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.268129] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24216.304687] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.422138] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.456550] exe[556343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24216.490451] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24238.642160] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24238.676710] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24238.677575] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24238.729881] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24240.707898] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24240.743337] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24240.776027] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24240.776889] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [24241.137984] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24241.193001] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24246.043824] audit: type=1326 audit(1689303574.176:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=556698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [24252.254732] warn_bad_vsyscall: 1 callbacks suppressed [24252.254751] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24252.296487] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24252.332778] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24253.250364] audit: type=1326 audit(1689303581.380:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=574301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24254.794914] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24254.838203] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24254.878050] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24255.808459] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24255.844231] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24255.864533] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24255.899187] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24259.446861] warn_bad_vsyscall: 5 callbacks suppressed [24259.446864] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24259.490646] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24259.524996] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24270.886528] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24270.921109] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24270.957533] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24278.919996] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24278.974530] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24279.027833] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24280.218413] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24280.257246] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24280.295888] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24284.031305] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24284.068984] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24284.110066] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24284.111279] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [24284.696277] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24284.739532] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24284.739702] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24284.836140] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24294.887749] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24294.928789] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24294.968884] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24298.730746] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24298.783224] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24298.826062] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24298.826081] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24304.892697] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24304.942522] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24304.982433] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24305.007365] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24317.438944] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24317.484560] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24317.522341] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24322.987435] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24323.026712] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24323.061651] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24323.062524] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24345.860712] audit: type=1326 audit(1689303673.992:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=578434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24361.623047] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24361.675414] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24361.709272] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24361.773060] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24362.355920] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24362.398798] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24362.421458] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24362.467191] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24379.582905] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24379.632733] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24379.656272] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24379.694140] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24381.353251] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24381.393626] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24381.436791] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24385.632135] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24385.669302] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24385.705197] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24389.377491] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24389.428002] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24389.428989] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24389.502225] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24396.319757] audit: type=1326 audit(1689303724.452:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=580513 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24396.373460] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24396.410063] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24396.444838] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.424316] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.461416] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.482719] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24399.516993] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.678881] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.721077] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24399.763708] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24405.773712] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24405.819440] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24405.866956] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24405.919109] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24405.962497] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24405.992182] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24406.033665] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24406.519441] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24406.558420] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24406.608221] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24411.697799] warn_bad_vsyscall: 4 callbacks suppressed [24411.697803] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24411.745864] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24411.767476] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24411.800057] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.374747] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.412763] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.432006] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.451103] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.471281] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24413.491761] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24420.267937] warn_bad_vsyscall: 64 callbacks suppressed [24420.267955] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24420.312983] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24420.353005] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24423.722302] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24423.761855] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24423.797468] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24423.819681] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24432.247632] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24432.281880] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24432.326966] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24432.327776] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24432.736449] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24432.795124] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24432.835416] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24446.278588] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24446.320169] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24446.360796] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24454.212732] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24454.249563] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24454.287684] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24454.308603] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24459.053907] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24459.090518] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24459.125576] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24461.540463] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24461.577812] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24461.617688] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24461.639593] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24471.069714] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24471.129326] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24471.153310] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808097 di:ffffffffff600000 [24471.187796] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24481.371409] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24481.412868] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24481.452009] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24481.452140] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24482.149049] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24482.193987] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24482.237658] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24482.257197] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24482.275896] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24482.295492] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24487.853485] audit: type=1326 audit(1689303815.984:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=586216 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24488.715573] warn_bad_vsyscall: 37 callbacks suppressed [24488.715577] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24488.763945] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24488.794887] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24491.807945] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24491.856855] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24491.889518] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24493.229756] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24493.266668] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24493.306094] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24493.327321] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24493.937431] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24494.004125] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.023475] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.043566] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.063822] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.083221] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.103678] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.124215] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.144542] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24494.164995] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24500.066509] warn_bad_vsyscall: 56 callbacks suppressed [24500.066513] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24500.119490] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24500.154482] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24505.535854] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24505.580548] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24505.635818] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24507.760832] audit: type=1326 audit(1689303835.892:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=502841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [24508.160011] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24508.203586] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24508.243824] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24509.032266] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24509.071863] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24509.113478] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24509.504876] audit: type=1326 audit(1689303837.636:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=590832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24509.694591] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24516.771628] warn_bad_vsyscall: 6 callbacks suppressed [24516.771632] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24516.816203] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24516.837083] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24516.875064] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24516.980265] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24517.024824] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24517.060573] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24520.164773] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24520.200725] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24520.238454] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24522.755560] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24522.795554] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24522.830830] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24524.046189] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24524.091967] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24524.117862] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24524.149644] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24530.397636] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24530.438573] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24530.476512] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24531.822078] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24531.860445] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24531.893749] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.060845] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.095423] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.133331] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.863289] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.905881] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24537.943395] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24539.299138] audit: type=1326 audit(1689303867.432:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=587816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24544.475947] audit: type=1326 audit(1689303872.608:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=575664 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24554.295246] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24554.330412] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24554.352930] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24554.392489] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24557.559191] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24557.598041] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24557.635307] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24557.658529] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24570.684616] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24570.729139] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24570.768363] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24570.788951] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24574.676880] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24574.712867] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24574.750013] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24574.772661] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24574.883016] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24574.917679] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24580.057623] warn_bad_vsyscall: 1 callbacks suppressed [24580.057627] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24580.104420] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24580.138101] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24580.138179] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.391627] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.435955] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.457084] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.493084] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.514876] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24581.729286] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24599.071012] warn_bad_vsyscall: 12 callbacks suppressed [24599.071016] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24599.115241] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24599.152049] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24600.116176] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24600.152130] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24600.152872] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24600.208736] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24601.864901] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24601.899140] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24601.932993] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24609.835824] warn_bad_vsyscall: 6 callbacks suppressed [24609.835828] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24609.877078] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24609.877092] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24609.933462] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24609.956439] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24610.279649] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24610.323985] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24610.343502] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24610.384409] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24613.801572] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24615.005733] warn_bad_vsyscall: 2 callbacks suppressed [24615.005735] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24615.052449] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24615.073106] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24615.113636] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24615.135322] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24618.267122] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24618.311792] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24618.356712] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24618.459095] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24618.500836] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24623.528176] warn_bad_vsyscall: 5 callbacks suppressed [24623.528178] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24623.576627] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24623.618289] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24627.809469] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24627.849300] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24627.889199] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24629.437738] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24629.473947] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24629.515776] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24629.537036] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24632.958343] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24633.011209] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24633.035769] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24633.070976] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24639.364438] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24639.399667] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24639.441615] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24640.149106] audit: type=1326 audit(1689303968.280:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=595132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24643.388258] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24643.426544] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24643.460684] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24643.481061] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24645.034443] audit: type=1326 audit(1689303973.164:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=521553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [24645.406469] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24645.441716] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24645.481530] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.501371] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.520246] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.540509] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.569111] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.599443] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.645894] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24645.694519] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24650.793564] warn_bad_vsyscall: 25 callbacks suppressed [24650.793567] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24650.836073] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24650.871436] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24650.892647] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24654.364347] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24654.404683] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24654.425268] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24654.466319] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24657.564043] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24657.605311] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24657.626620] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24657.660166] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24657.681596] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24659.581957] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24659.620949] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24664.785841] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24664.838382] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24664.864219] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24664.896698] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24678.589141] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24678.627351] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24678.669045] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24681.510657] audit: type=1326 audit(1689304009.640:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=592377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24682.951087] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24683.011773] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24683.058243] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24683.080233] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24684.681174] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24684.730062] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24684.765195] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24688.084296] audit: type=1326 audit(1689304016.216:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=592570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24728.508757] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24728.554171] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24728.577296] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24728.622759] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24745.611187] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24745.655072] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24745.691606] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24745.712281] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24750.211047] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24750.254379] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24750.307269] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24750.332101] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24754.700032] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24754.734595] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24754.735286] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24754.788761] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24765.798232] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24765.835278] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24765.856981] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24765.897204] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24768.700215] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24768.738398] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24768.739107] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24768.794313] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24769.122507] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24769.162018] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24772.243135] warn_bad_vsyscall: 1 callbacks suppressed [24772.243140] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24772.289567] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24772.311756] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24772.357475] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.667230] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.707868] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.727250] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.750313] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.769517] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24773.790794] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24776.367992] audit: type=1326 audit(1689304104.500:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=595405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24778.618295] warn_bad_vsyscall: 64 callbacks suppressed [24778.618297] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24778.663606] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24778.699331] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24781.834277] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24781.872540] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24781.893359] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24781.932708] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24787.872969] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24787.913764] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24787.950131] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24789.750875] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24789.807001] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24791.815688] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24791.858692] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [24791.897494] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [24792.558599] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24792.592712] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24798.396530] warn_bad_vsyscall: 34 callbacks suppressed [24798.396533] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24798.449899] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24798.482255] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24802.621482] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24802.655492] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24802.694960] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24802.714725] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24802.733543] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24802.753074] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24802.773599] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24804.597029] warn_bad_vsyscall: 60 callbacks suppressed [24804.597033] exe[507402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb4fb08839 cs:33 sp:7ead48765858 ax:0 si:55fb4fb61062 di:ffffffffff600000 [24813.876627] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24813.920977] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24813.966864] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24815.942065] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24815.975813] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24815.996721] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24816.040573] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24817.086998] potentially unexpected fatal signal 11. [24817.092060] CPU: 22 PID: 598864 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [24817.102416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [24817.111814] RIP: 0033:0x55bae71abb27 [24817.115596] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [24817.135896] RSP: 002b:00007ff8409fbc90 EFLAGS: 00010206 [24817.141290] RAX: 00007ff8409fc500 RBX: 00007ff8409fc1f0 RCX: 0000000000000000 [24817.148594] RDX: 00007ff8409fc370 RSI: 000055bae722d3d8 RDI: 00007ff8409fc1f0 [24817.157281] RBP: 00007ff8409fc2e0 R08: 0000000000000000 R09: 0000000000000000 [24817.165953] R10: 0000000000001000 R11: 0000000000000293 R12: 000055bae722d3d8 [24817.173249] R13: 00007ff8409fc370 R14: 0000000000000000 R15: 00007ff8409fc1f0 [24817.181925] FS: 000055bae7e32480 GS: 0000000000000000 [24817.998977] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24818.034986] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24818.074642] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24823.715929] audit: type=1326 audit(1689304151.848:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=597529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24826.605179] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24826.663681] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24826.700373] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24826.725321] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24835.312265] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24835.366032] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24835.366453] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24835.426244] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24835.449989] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24836.529915] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24836.589654] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24836.621846] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24836.711625] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24836.748950] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24845.481971] warn_bad_vsyscall: 4 callbacks suppressed [24845.481974] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24845.522393] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24845.562548] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24845.900724] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24845.941181] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24845.960038] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24845.979250] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24845.998673] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24846.017907] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24846.037981] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24852.039047] warn_bad_vsyscall: 71 callbacks suppressed [24852.039051] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24852.093032] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24852.130779] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24856.860938] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24856.900934] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24856.936522] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24865.903074] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24865.942348] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24865.982822] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24866.004889] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [24870.295646] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24870.336555] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24870.374600] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24871.698369] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24871.734748] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24871.770413] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24871.790899] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24881.473993] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24881.523197] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24881.566369] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24884.019870] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24884.058106] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24884.080994] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [24884.123165] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24887.432790] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24887.465549] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24887.504493] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24901.679471] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24901.720459] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24901.742880] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24901.774154] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24902.981155] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24903.020333] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24903.069913] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24903.109454] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24903.151303] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24903.185452] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24909.082536] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24909.123342] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24909.164620] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24910.954193] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24911.011889] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24911.055325] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24911.988321] audit: type=1326 audit(1689304240.119:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=592023 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [24918.971742] audit: type=1326 audit(1689304247.103:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=601758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24920.132261] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24920.164840] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24920.199445] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24920.219343] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.633273] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.671949] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.709480] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.820786] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.871998] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.905695] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24928.931909] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24929.420805] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24929.455758] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24929.497587] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24940.870144] warn_bad_vsyscall: 67 callbacks suppressed [24940.870148] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24940.912203] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24940.946021] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.222045] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.268808] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.323338] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.342909] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.362316] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.383102] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24941.404966] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24946.100786] warn_bad_vsyscall: 64 callbacks suppressed [24946.100788] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24946.163700] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24946.213703] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [24950.355813] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24950.396190] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24950.437819] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24951.053423] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24951.087760] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24951.108166] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24951.144174] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24951.165646] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24965.503401] audit: type=1326 audit(1689304293.635:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=604205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24979.989556] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24980.026551] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24980.060340] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24981.347428] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24981.388396] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24981.426420] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24981.450605] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24982.940904] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24982.975013] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24983.011566] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.111507] warn_bad_vsyscall: 4 callbacks suppressed [24987.111510] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24987.152025] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24987.191983] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.211355] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.230299] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.249599] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.268979] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.289339] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.308327] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.327521] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [24987.502122] audit: type=1326 audit(1689304315.631:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=608266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [24993.517930] warn_bad_vsyscall: 25 callbacks suppressed [24993.517934] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24993.558583] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24993.593092] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24993.613728] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24996.997381] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24997.039384] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [24997.074694] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25002.490946] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25002.525919] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25002.548199] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.589581] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.608897] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.627890] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.646999] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.666621] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.686564] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25002.706055] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25010.517197] warn_bad_vsyscall: 61 callbacks suppressed [25010.517200] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25010.564190] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25010.564603] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25010.620936] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25014.052930] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25014.100047] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25014.144264] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25018.846750] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25018.886185] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25018.923350] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.306225] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.366740] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.417974] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.437495] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.457005] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.477161] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25019.496442] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25031.546931] warn_bad_vsyscall: 31 callbacks suppressed [25031.546935] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25031.592553] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25031.630773] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25035.944591] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25035.982663] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25036.015368] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25036.036626] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25041.536867] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25041.579117] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25041.616068] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25045.604178] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25045.645336] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25045.668329] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25045.709918] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25048.469882] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25048.512976] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25048.547765] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25056.059315] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25056.100659] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25056.140740] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25060.272067] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25060.308270] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25060.328556] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25060.347477] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25060.366616] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25060.385735] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25060.405485] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25061.459592] audit: type=1326 audit(1689304389.591:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=606521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25061.891356] warn_bad_vsyscall: 60 callbacks suppressed [25061.891359] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25061.932043] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25061.955536] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25061.991813] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25072.388400] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25072.426173] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25072.461937] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25073.231299] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25073.276436] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25073.313241] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25073.335280] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25075.551243] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25075.599634] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25075.644792] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25077.502207] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25078.348826] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25078.423617] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25078.456326] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25084.007600] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25084.048951] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25084.084011] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25084.085730] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [25092.007112] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25092.057625] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25092.118929] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25112.992787] exe[608962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562014e1c839 cs:33 sp:7f43cd73e858 ax:0 si:562014e75062 di:ffffffffff600000 [25113.078802] exe[609122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562014e1c839 cs:33 sp:7f43cd73e858 ax:0 si:562014e75062 di:ffffffffff600000 [25113.153107] exe[611138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562014e1c839 cs:33 sp:7f43cd73e858 ax:0 si:562014e75062 di:ffffffffff600000 [25113.222929] exe[608958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562014e1c839 cs:33 sp:7f43cd73e858 ax:0 si:562014e75062 di:ffffffffff600000 [25117.693846] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25117.733068] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25117.775976] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25117.798041] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25119.701340] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25119.740571] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25119.782412] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25121.576657] audit: type=1326 audit(1689304449.707:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=608536 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25123.696895] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25123.738934] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25123.778206] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25127.178103] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25127.212584] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25127.232577] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25127.267093] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25135.282640] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25135.322936] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25135.323699] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25135.383519] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25143.266847] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25143.304234] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25143.346268] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25143.632005] audit: type=1326 audit(1689304471.763:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=612169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25144.415864] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25144.462962] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25144.504487] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25144.504931] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25145.305921] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25145.340490] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25145.362430] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25151.867101] warn_bad_vsyscall: 8 callbacks suppressed [25151.867105] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25151.905993] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25151.906567] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25151.971429] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25153.970969] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25154.004644] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25154.042428] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25156.561027] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25156.597249] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25156.617836] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25157.939612] warn_bad_vsyscall: 2 callbacks suppressed [25157.939615] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25157.985915] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [25158.034252] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25177.637626] audit: type=1326 audit(1689304505.771:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=596862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [25191.028630] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25191.065771] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25191.066011] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25191.125411] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25191.716659] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25191.753250] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25191.788989] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25195.278886] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25195.315136] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25195.344335] audit: type=1326 audit(1689304523.479:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=607409 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [25195.356977] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25196.643158] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25196.681054] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25196.702065] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25196.737769] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25197.042829] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25197.080206] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25197.121782] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25197.144538] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25201.729411] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25201.769551] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25201.810290] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25203.532992] audit: type=1326 audit(1689304531.667:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=610425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25208.385407] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25208.420607] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25208.456904] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25211.971707] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25212.004447] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25212.041816] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25213.911678] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25213.949326] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25213.986839] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25225.405290] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25225.440709] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25225.479272] exe[510132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25225.500321] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25226.961865] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25226.997568] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25227.038380] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25235.042501] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25235.080109] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25235.121282] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25235.122175] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25235.653591] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25235.695619] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25235.715748] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25235.761254] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25235.761811] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25241.304687] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25241.366141] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25241.396235] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25241.449464] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25244.077729] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25244.119067] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25244.160989] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25247.752615] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25247.795308] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25247.815173] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25247.854772] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25249.055857] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25249.095652] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25249.096461] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25249.150957] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25265.406269] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25265.441896] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25265.463065] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25265.499023] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25266.412955] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25266.468249] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25266.511822] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25278.066105] audit: type=1326 audit(1689304606.199:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=612375 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25283.411351] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25283.450645] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25283.451372] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25283.506459] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25299.698228] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25299.734539] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25299.773178] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.513628] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.565139] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.602698] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.840768] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.876261] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25305.909730] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25315.218427] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25315.253746] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25315.289772] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25317.200562] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25317.240024] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25317.261925] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25317.294379] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.406198] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.441650] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.476340] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.496301] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.516861] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.536144] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.554922] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.573845] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.593115] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25320.612727] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.658413] warn_bad_vsyscall: 57 callbacks suppressed [25325.658416] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.703670] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.726235] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25325.761254] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.780430] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.799552] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.818591] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.837946] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.856954] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25325.876146] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25333.911981] warn_bad_vsyscall: 58 callbacks suppressed [25333.911985] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25333.954498] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25333.992823] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25345.515829] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25345.556698] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25345.578493] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25345.613425] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25345.636449] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25346.048304] audit: type=1326 audit(1689304674.183:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=615090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25347.271601] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25347.324455] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25347.363963] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25351.712858] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25351.748613] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25351.782345] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25366.637044] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25366.675456] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25366.709627] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25366.729912] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25367.072002] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25367.114600] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25367.159751] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25371.560512] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25371.593899] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25371.596462] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25371.645705] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25376.078556] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.115906] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.151564] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.632323] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.677585] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.697801] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25376.739109] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25378.262804] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25378.307829] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25378.347134] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25380.005556] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25380.062771] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25380.099072] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25383.886108] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25383.932673] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25383.965904] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25397.232238] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25397.286016] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25397.326003] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25405.747743] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25405.800501] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25405.850904] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25406.613386] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25406.671271] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25406.692609] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25406.730057] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25418.812920] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25418.854364] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25418.885059] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.378278] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.415564] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.435397] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.454955] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.475066] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.494091] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25419.512962] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25421.658289] audit: type=1326 audit(1689304749.791:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=617973 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25424.111585] warn_bad_vsyscall: 31 callbacks suppressed [25424.111588] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25424.152574] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25424.190652] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25424.213242] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25425.224400] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25425.266925] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25425.298906] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25428.711074] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25428.751737] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25428.793297] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25436.959602] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25437.002589] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25437.037523] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25438.520994] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25438.563023] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25438.604651] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25438.630365] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25442.655611] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25442.720262] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25442.753175] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25447.801064] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25447.836618] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25447.872260] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25447.872963] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25447.984633] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25448.021957] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25448.058783] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25448.078754] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25449.770165] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25449.803177] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25457.577340] warn_bad_vsyscall: 10 callbacks suppressed [25457.577343] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25457.623252] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25457.670877] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25459.428074] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25459.474891] exe[577064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25459.517357] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25460.009426] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25460.062416] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25460.110828] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25460.132961] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25464.614446] warn_bad_vsyscall: 2 callbacks suppressed [25464.614450] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25464.658278] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25464.694811] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25464.715845] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25469.948668] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25469.986634] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25470.022749] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25470.023583] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25471.021066] exe[576888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25471.057083] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25471.094145] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25471.886883] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25471.924140] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25471.945221] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25478.874375] warn_bad_vsyscall: 2 callbacks suppressed [25478.874378] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25478.918584] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25478.938835] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25478.959394] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25478.979813] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25479.000601] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25479.020533] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25479.039706] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25479.059094] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25479.079387] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25485.523222] warn_bad_vsyscall: 60 callbacks suppressed [25485.523225] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25485.576052] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25485.621418] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25485.844609] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25485.886927] exe[580420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25485.928329] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25487.179819] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25487.216119] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25487.236011] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25487.270485] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25488.672935] audit: type=1326 audit(1689304816.807:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=620862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25488.995510] audit: type=1326 audit(1689304817.127:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=614902 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [25492.267501] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25492.312051] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25492.332630] exe[582441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25492.377805] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25493.849628] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25493.885794] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25493.920109] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25493.952765] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25493.990433] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25494.010360] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25519.400671] warn_bad_vsyscall: 1 callbacks suppressed [25519.400674] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25519.456643] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25519.480880] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25519.521175] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25523.092183] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25523.169798] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25533.763217] exe[578783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25533.828418] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25533.828427] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25533.892806] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25534.367149] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25534.400676] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25534.422598] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25534.467442] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25534.487782] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25536.345223] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25540.831529] warn_bad_vsyscall: 2 callbacks suppressed [25540.831532] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25540.874807] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25540.909610] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25540.930852] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25542.394780] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25542.430584] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25542.451542] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25542.486995] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25552.420041] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25552.459958] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25552.482385] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25552.515306] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25555.727009] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25555.781326] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25555.804766] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25555.846649] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25555.865909] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25555.887711] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25563.447519] audit: type=1326 audit(1689304891.579:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=623388 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25581.326533] warn_bad_vsyscall: 37 callbacks suppressed [25581.326537] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25581.366905] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25581.402171] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25587.606917] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25587.646172] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25587.675913] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25587.716430] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25592.796616] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25592.851831] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25592.901936] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25596.141662] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25596.180299] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25596.202079] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25599.834769] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25599.875411] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25599.916761] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25605.383877] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25605.420949] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25605.443172] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25605.474673] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25605.497370] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25606.522502] audit: type=1326 audit(1689304934.654:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=537957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25612.977830] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25613.011322] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25613.046860] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25615.045653] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25615.077127] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25615.111286] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25616.055664] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25616.096729] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25616.117864] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25616.155203] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25621.698361] warn_bad_vsyscall: 4 callbacks suppressed [25621.698365] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25621.742292] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25621.765535] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.807795] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.827545] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.847893] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.867010] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.885842] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.905080] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25621.924195] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25632.840454] audit: type=1326 audit(1689304960.974:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=626940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25635.698603] warn_bad_vsyscall: 77 callbacks suppressed [25635.698606] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.746225] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.765993] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.786040] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.806411] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.827190] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.847058] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.866094] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.885788] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25635.905904] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25643.191595] warn_bad_vsyscall: 57 callbacks suppressed [25643.191599] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25643.238895] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25643.282782] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25643.305826] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25646.289992] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25646.327391] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25646.349418] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808097 di:ffffffffff600000 [25646.386242] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25653.160661] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25653.202362] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25653.241980] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25655.459013] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25655.496917] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25655.533542] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25659.306847] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25659.355506] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25659.393468] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25659.417984] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25672.927471] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25672.964135] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25673.001138] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25673.171321] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25673.222742] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808097 di:ffffffffff600000 [25674.571376] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25674.622535] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25674.663963] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25674.685894] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25675.831308] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25680.349906] warn_bad_vsyscall: 3 callbacks suppressed [25680.349910] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25680.392342] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25680.429902] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25681.120406] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25681.157299] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25681.158160] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25681.220047] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25685.330658] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25685.363974] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25685.394647] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25686.116104] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25686.160908] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25686.199102] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25695.243099] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25695.280338] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25695.300961] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25695.336809] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25695.358216] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25697.078083] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25697.117685] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25697.151858] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25697.173071] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25704.282709] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25704.333511] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25704.371877] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25704.768322] audit: type=1326 audit(1689305032.902:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=630009 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25717.947781] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25717.984402] exe[579635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25718.023533] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25724.350658] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25724.386971] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25724.424652] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25728.225643] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25728.265452] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25728.266204] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25728.325747] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25730.789153] audit: type=1326 audit(1689305058.922:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=581778 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [25731.086352] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25731.130494] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25731.168269] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25731.169159] exe[490015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25732.097030] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25732.132738] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25732.155137] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25732.191701] exe[583392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25732.212416] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25740.024971] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25740.065245] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [25740.105042] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25740.130295] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808070 di:ffffffffff600000 [25748.839853] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25748.878171] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25748.898340] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25748.941488] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25757.329931] exe[580420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25757.368237] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25757.390408] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25757.426962] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25762.018498] exe[632821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db14b08839 cs:33 sp:7f1eb9b69858 ax:0 si:55db14b61062 di:ffffffffff600000 [25762.045965] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25762.122397] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25770.139572] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25770.182806] exe[499582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25770.230698] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25771.231689] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25771.273292] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25771.315778] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25774.613288] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25774.667326] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25774.712210] exe[498025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25774.733200] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25775.824372] audit: type=1326 audit(1689305103.958:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=632858 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25783.681087] warn_bad_vsyscall: 3 callbacks suppressed [25783.681091] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.725231] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.765305] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.785291] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.804986] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.826816] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.847706] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.867497] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.888176] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25783.909103] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25795.704670] warn_bad_vsyscall: 64 callbacks suppressed [25795.704673] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25795.744702] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25795.781645] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25795.802122] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25795.925967] audit: type=1326 audit(1689305124.058:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=560883 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25796.052160] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25796.089183] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25796.130024] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25796.151586] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25800.042935] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25800.078712] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25803.629628] warn_bad_vsyscall: 5 callbacks suppressed [25803.629632] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25803.676223] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25803.713752] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25803.714284] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25811.831620] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25811.865919] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25811.902629] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25811.922574] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25816.454983] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25816.488041] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25816.534633] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25817.095585] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25817.132756] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25817.169417] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25818.319391] audit: type=1326 audit(1689305146.450:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=637961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25820.820453] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25820.856957] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25820.894361] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25842.434174] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25842.474828] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25842.474882] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25842.536952] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25846.822519] audit: type=1326 audit(1689305174.954:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=634625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25852.223211] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25852.258987] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25852.296135] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25853.084845] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25853.123459] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25853.144464] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25853.189878] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25854.088668] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25854.125035] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25854.158338] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25862.741634] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25862.776730] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25862.812635] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25872.683341] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25872.738490] exe[578783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25872.762175] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25872.802441] exe[578783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25875.994148] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25876.034051] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25876.081165] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25878.933744] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25878.972634] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25878.994940] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25879.029487] exe[520509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25879.068475] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25879.112880] exe[487955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25879.154139] exe[488044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.079711] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.121126] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.160309] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.187149] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [25885.361595] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.396616] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.416173] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25885.451865] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25894.750531] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25894.791626] exe[509311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25894.838495] exe[556257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25900.861281] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25900.896577] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25900.937942] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25900.940185] exe[487966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25917.261426] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25917.301691] exe[499311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25917.339143] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25917.359378] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25917.599194] audit: type=1326 audit(1689305245.730:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=637067 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25926.468540] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25926.514017] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25926.551338] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25926.747406] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25926.785102] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25926.819218] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25936.376862] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25936.411227] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25936.444406] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25936.445078] exe[512746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25937.821014] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25937.867055] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [25937.906532] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [25943.919608] exe[580420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25943.955569] exe[587444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25943.989380] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25944.008954] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [25946.773233] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25946.816987] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25946.836742] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25946.880329] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25946.899515] exe[580420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25947.118496] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25947.506212] audit: type=1326 audit(1689305275.638:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=628229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [25949.032595] warn_bad_vsyscall: 10 callbacks suppressed [25949.032598] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25949.085897] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25949.143065] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25952.332644] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25952.370752] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25952.406988] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25953.668049] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25953.716216] exe[582047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25953.757905] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25953.781883] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25956.439897] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25956.476523] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25956.500419] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25956.531747] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.307235] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.345212] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.378275] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.398249] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.417099] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25959.436642] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25970.327679] warn_bad_vsyscall: 29 callbacks suppressed [25970.327683] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25970.377143] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25970.378276] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25970.436425] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25982.097612] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25982.134781] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808097 di:ffffffffff600000 [25982.172383] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [25984.629125] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25984.666044] exe[499306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25984.707228] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25984.729929] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [25984.869612] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25984.909031] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25984.941260] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [25989.580599] audit: type=1326 audit(1689305317.714:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=639782 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25991.961233] audit: type=1326 audit(1689305320.094:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=638638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25993.511681] audit: type=1326 audit(1689305321.642:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=546774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [25998.647217] audit: type=1326 audit(1689305326.778:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=631406 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26001.552337] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26001.591997] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26001.640591] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26002.002693] exe[578783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26002.041182] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26002.062396] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26002.095752] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26007.752866] exe[578795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26007.785807] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26007.786199] exe[578795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.841300] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.862515] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.882099] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.901475] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.921211] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.940628] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26007.959506] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26024.721444] warn_bad_vsyscall: 58 callbacks suppressed [26024.721447] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26024.763204] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26024.816235] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26028.172789] exe[487973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26028.216584] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26028.237629] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26028.291897] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26032.464297] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26032.504058] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26032.549697] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26034.593602] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26034.650366] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26034.688485] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26035.330115] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26035.373696] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26035.409055] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26048.220778] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26048.256262] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26048.276678] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26048.311485] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26049.542575] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26049.587641] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26049.632821] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26050.928707] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26050.981941] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26051.003993] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26058.722974] audit: type=1326 audit(1689305386.854:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=642662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26061.939124] warn_bad_vsyscall: 1 callbacks suppressed [26061.939129] exe[582441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26061.985335] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26062.028532] exe[582441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26073.678281] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26073.716606] exe[498077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26073.752308] exe[582441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26075.422745] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26075.461385] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26075.503393] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26080.841288] exe[498077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [26081.636253] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [26082.528906] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [26082.552205] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808097 di:ffffffffff600000 [26091.848291] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.886137] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.919687] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.939644] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.959292] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.979423] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26091.998617] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26092.017829] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26092.037034] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26092.057305] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26097.310689] warn_bad_vsyscall: 32 callbacks suppressed [26097.310693] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26097.359211] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26097.404392] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26097.425674] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26099.132186] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26099.172840] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26099.213283] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26102.355841] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26102.393584] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26102.417039] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [26102.448873] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808070 di:ffffffffff600000 [26102.472805] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808070 di:ffffffffff600000 [26104.973603] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26105.009477] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26105.045632] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26106.032648] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26106.068839] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26111.530994] warn_bad_vsyscall: 4 callbacks suppressed [26111.530997] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26111.576818] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26111.597140] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26111.631661] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26111.651766] exe[498010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26116.257251] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26116.301016] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26116.333738] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26118.122871] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26118.171798] exe[576378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26118.207513] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26119.906268] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26119.947388] exe[499302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26119.986143] exe[576380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26129.208735] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26129.248569] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26129.270997] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26129.303260] exe[498006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26131.418034] exe[498017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26131.454809] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26131.499307] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26131.500032] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26131.671967] audit: type=1326 audit(1689305459.802:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=646032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26132.975713] exe[498007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26133.012925] exe[499660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26137.505414] warn_bad_vsyscall: 1 callbacks suppressed [26137.505417] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26137.547377] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26137.586946] exe[498077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26137.611686] exe[580423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26149.280148] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26149.335671] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26149.381011] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26149.920465] exe[578799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26149.971982] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [26150.044400] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26156.685798] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26156.726728] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26156.748261] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26156.788382] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26156.811028] exe[487963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26166.405641] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26166.483722] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26166.572273] exe[579680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26170.402289] exe[487962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26170.442245] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26170.467333] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26170.505778] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26173.373327] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26173.410616] exe[488038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26173.432686] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26173.472883] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26173.495068] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26175.199574] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26175.238074] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26175.283777] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26176.044413] exe[548861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26176.096086] exe[496272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26200.435863] audit: type=1326 audit(1689305528.566:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=651300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26201.049519] warn_bad_vsyscall: 5 callbacks suppressed [26201.049524] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26201.098188] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26201.099015] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26201.161944] exe[492185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26201.188850] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26201.505200] exe[558829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d8e858 ax:0 si:563c829b7097 di:ffffffffff600000 [26201.555323] exe[562858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d8e858 ax:0 si:563c829b7097 di:ffffffffff600000 [26201.595598] exe[565017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d8e858 ax:0 si:563c829b7097 di:ffffffffff600000 [26201.614279] exe[558829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c8295e839 cs:33 sp:7eb877d6d858 ax:0 si:563c829b7097 di:ffffffffff600000 [26211.306614] exe[583510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26211.344556] exe[579924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26211.384050] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26211.406098] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26213.361006] exe[488135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26213.416475] exe[488229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26213.459760] exe[488041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26221.765879] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26221.801837] exe[496276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26221.838653] exe[510751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26221.860008] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26232.439103] exe[487959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26232.484802] exe[578783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26232.508884] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43144b858 ax:0 si:557549808062 di:ffffffffff600000 [26232.551608] exe[487969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26234.537528] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26234.584962] exe[518527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26234.605292] exe[488217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26234.644606] exe[510175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26235.635344] exe[497998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26235.687535] exe[488045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26242.560561] warn_bad_vsyscall: 1 callbacks suppressed [26242.560565] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26242.601932] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26242.638492] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26242.660342] exe[550578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26249.847663] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26249.880897] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26249.925985] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26249.947580] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26251.992142] exe[549206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26252.039201] exe[656946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26255.190918] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26255.234803] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26255.274362] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26256.321183] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26256.358864] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26256.394164] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26256.848425] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26256.889577] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26256.928229] exe[580274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26258.439992] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26260.667731] warn_bad_vsyscall: 2 callbacks suppressed [26260.667734] exe[498628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26260.713526] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26260.752498] exe[499262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26260.773499] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26265.802263] exe[498009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26265.845882] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26265.887019] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26265.906308] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26265.925955] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26265.946273] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26265.966654] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26265.986942] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26266.006518] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26266.026472] exe[498555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26271.608685] warn_bad_vsyscall: 57 callbacks suppressed [26271.608688] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26271.689851] exe[498080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26273.893404] audit: type=1326 audit(1689305602.026:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=653601 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26275.652833] exe[580420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26275.688298] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26275.709861] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26275.749210] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26275.770128] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26279.778836] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26279.819043] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26279.869293] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26283.818311] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26283.869431] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26283.911741] exe[656946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26289.286434] exe[656946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26289.324620] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26289.362886] exe[514635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26303.295845] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26303.347831] exe[498020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26303.406889] exe[656946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26303.429113] exe[554710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.091247] exe[656946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.128232] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.168393] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.614263] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.667239] exe[499662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26307.689388] exe[498076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26309.626308] warn_bad_vsyscall: 1 callbacks suppressed [26309.626311] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26309.667072] exe[498027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26309.701612] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.123575] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.167550] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.209818] exe[513068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.210854] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26322.376192] exe[554462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.412199] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.451641] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.546481] exe[648891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.607607] exe[626402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43148d858 ax:0 si:557549808062 di:ffffffffff600000 [26322.608148] exe[499290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575497af839 cs:33 sp:7fa43146c858 ax:0 si:557549808062 di:ffffffffff600000 [26334.027526] potentially unexpected fatal signal 5. [26334.032502] CPU: 36 PID: 505365 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [26334.042837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [26334.052223] RIP: 0033:0x7fffffffe062 [26334.055984] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [26334.074924] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [26334.080409] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [26334.087671] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [26334.094963] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [26334.103628] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [26334.110914] R13: 0000000000000040 R14: 000000c000503520 R15: 00000000000775f4 [26334.118181] FS: 000000c000130490 GS: 0000000000000000 [26334.223077] potentially unexpected fatal signal 5. [26334.229316] CPU: 74 PID: 490666 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [26334.239779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [26334.249152] RIP: 0033:0x7fffffffe062 [26334.252863] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [26334.271781] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [26334.277149] RAX: 00000000000a1585 RBX: 0000000000000000 RCX: 00007fffffffe05a [26334.284438] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [26334.291804] RBP: 000000c00018fe38 R08: 000000c00022cf10 R09: 0000000000000000 [26334.299085] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [26334.306369] R13: 0000000000000040 R14: 000000c000503520 R15: 00000000000775f4 [26334.313730] FS: 000000c000130490 GS: 0000000000000000 [26343.014527] audit: type=1326 audit(1689305671.145:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=655866 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26345.452856] potentially unexpected fatal signal 5. [26345.457908] CPU: 50 PID: 582701 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [26345.468240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [26345.477617] RIP: 0033:0x7fffffffe062 [26345.481355] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [26345.500511] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [26345.505996] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [26345.514645] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [26345.523319] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [26345.531946] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [26345.540584] R13: 000000000000001a R14: 000000c000525860 R15: 0000000000078259 [26345.549303] FS: 000000c000180090 GS: 0000000000000000 [26357.456232] audit: type=1326 audit(1689305685.585:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=644546 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [26374.721347] audit: type=1326 audit(1689305702.853:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=635975 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [26415.197867] audit: type=1326 audit(1689305743.329:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=657992 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26428.910476] audit: type=1326 audit(1689305757.041:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=646185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26450.601817] audit: type=1326 audit(1689305778.733:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=615935 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [26484.701335] audit: type=1326 audit(1689305812.833:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=670359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26518.774737] audit: type=1326 audit(1689305846.905:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=646313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26545.832629] audit: type=1326 audit(1689305873.961:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=675808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [26556.634205] audit: type=1326 audit(1689305884.765:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=679129 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26625.821043] audit: type=1326 audit(1689305953.953:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=685515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26699.501958] audit: type=1326 audit(1689306027.633:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=692843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26734.721233] warn_bad_vsyscall: 4 callbacks suppressed [26734.721237] exe[699831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56501e845839 cs:33 sp:7ff39a3fe858 ax:0 si:56501e89e070 di:ffffffffff600000 [26734.770138] exe[699831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56501e845839 cs:33 sp:7ff39a3fe858 ax:0 si:56501e89e070 di:ffffffffff600000 [26734.815511] exe[690260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56501e845839 cs:33 sp:7ff39a3fe858 ax:0 si:56501e89e070 di:ffffffffff600000 [26767.781753] audit: type=1326 audit(1689306095.913:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=696117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26812.317179] audit: type=1326 audit(1689306140.449:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=680483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26842.018126] audit: type=1326 audit(1689306170.149:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=700197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26910.341608] audit: type=1326 audit(1689306238.473:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=705072 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [26984.241058] audit: type=1326 audit(1689306312.369:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=709082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27052.557158] audit: type=1326 audit(1689306380.688:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=712654 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27073.561789] audit: type=1326 audit(1689306401.692:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=677394 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [27126.918442] audit: type=1326 audit(1689306455.048:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=715569 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27194.764497] audit: type=1326 audit(1689306522.892:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=718147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27268.983329] audit: type=1326 audit(1689306597.112:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=720593 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27296.808752] exe[717368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558084c78839 cs:33 sp:7f23dadfe858 ax:0 si:558084cd1062 di:ffffffffff600000 [27337.053370] audit: type=1326 audit(1689306665.180:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=722879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27368.965545] audit: type=1326 audit(1689306697.096:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=684498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [27375.265243] audit: type=1326 audit(1689306703.392:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=646720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27388.895677] audit: type=1326 audit(1689306717.024:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=689331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27409.398628] audit: type=1326 audit(1689306737.528:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=598039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27411.736743] audit: type=1326 audit(1689306739.864:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=728390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27433.737050] audit: type=1326 audit(1689306761.864:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=734128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27463.769709] audit: type=1326 audit(1689306791.900:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=707333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27479.586899] audit: type=1326 audit(1689306807.716:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=730037 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27487.204276] audit: type=1326 audit(1689306815.332:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=736594 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27572.599186] exe[741622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56057611f839 cs:33 sp:7ead2dfda858 ax:0 si:560576178097 di:ffffffffff600000 [27572.692849] exe[741627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56057611f839 cs:33 sp:7ead2dfda858 ax:0 si:560576178097 di:ffffffffff600000 [27572.745074] exe[741622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56057611f839 cs:33 sp:7ead2dfda858 ax:0 si:560576178097 di:ffffffffff600000 [27620.820684] audit: type=1326 audit(1689306948.948:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=737080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27643.066763] audit: type=1326 audit(1689306971.196:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=743818 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27683.471170] audit: type=1326 audit(1689307011.600:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=740496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27760.104358] audit: type=1326 audit(1689307088.232:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=719527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [27776.789004] audit: type=1326 audit(1689307104.915:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=744426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27793.390199] audit: type=1326 audit(1689307121.519:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=693591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [27799.311165] audit: type=1326 audit(1689307127.435:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=748841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27825.610826] audit: type=1326 audit(1689307153.739:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=745928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27966.685377] audit: type=1326 audit(1689307294.811:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=751167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [27973.545546] potentially unexpected fatal signal 5. [27973.550532] CPU: 6 PID: 676728 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [27973.560905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [27973.570253] RIP: 0033:0x7fffffffe062 [27973.574005] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [27973.592936] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [27973.598320] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [27973.606965] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [27973.614247] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [27973.623145] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [27973.630422] R13: 000000000000003e R14: 000000c00047b380 R15: 00000000000a1c63 [27973.639065] FS: 000000c0002d4890 GS: 0000000000000000 [27973.720007] potentially unexpected fatal signal 5. [27973.724949] CPU: 7 PID: 755455 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [27973.735184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [27973.737549] potentially unexpected fatal signal 5. [27973.744564] RIP: 0033:0x7fffffffe062 [27973.749474] CPU: 52 PID: 755457 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [27973.753172] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [27973.753174] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [27973.753176] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [27973.753176] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [27973.753180] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [27973.753182] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [27973.763485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [27973.763487] RIP: 0033:0x7fffffffe062 [27973.763489] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [27973.782471] R13: 000000000000003e R14: 000000c00047b380 R15: 00000000000a1c63 [27973.782472] FS: 000000c0002d4890 GS: 0000000000000000 [27973.867249] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [27973.872613] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [27973.881265] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [27973.889943] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [27973.898599] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [27973.907252] R13: 000000000000003e R14: 000000c00047b380 R15: 00000000000a1c63 [27973.915912] FS: 000000c0002d4890 GS: 0000000000000000 [28006.342228] audit: type=1326 audit(1689307334.471:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=757907 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28047.992172] audit: type=1326 audit(1689307376.123:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=754321 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28059.316746] audit: type=1326 audit(1689307387.447:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=732537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [28109.239283] audit: type=1326 audit(1689307437.371:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=756407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28140.013018] audit: type=1326 audit(1689307468.143:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=765321 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28162.495889] audit: type=1326 audit(1689307490.627:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=749021 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [28165.839615] audit: type=1326 audit(1689307493.971:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=732538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28189.797088] audit: type=1326 audit(1689307517.927:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=760952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28250.778326] audit: type=1326 audit(1689307578.911:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=764859 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28332.232457] audit: type=1326 audit(1689307660.363:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=769542 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28392.325712] audit: type=1326 audit(1689307720.455:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=771760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28392.350005] audit: type=1326 audit(1689307720.479:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=759784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28405.239372] audit: type=1326 audit(1689307733.371:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=767058 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28444.709986] audit: type=1326 audit(1689307772.839:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=769135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [28473.829073] audit: type=1326 audit(1689307801.959:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=773996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28518.540780] potentially unexpected fatal signal 11. [28518.545860] CPU: 65 PID: 780098 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28518.549483] potentially unexpected fatal signal 11. [28518.556202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28518.561236] CPU: 74 PID: 782409 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28518.561239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28518.561246] RIP: 0033:0x55704a0139a5 [28518.570609] RIP: 0033:0x555c314f6b8f [28518.570615] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [28518.580982] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 97 19 c5 00 48 89 15 88 19 c5 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [28518.580984] RSP: 002b:00007fd2f9025440 EFLAGS: 00010246 [28518.580986] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 000055704a013b8d [28518.580986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [28518.580987] RBP: 0000000000000000 R08: 0000000000000000 R09: 000055704ac65320 [28518.580988] R10: 000055704ac66480 R11: 000055704ac65320 R12: 0000000000000000 [28518.580989] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [28518.580992] FS: 000055704ac66480 GS: 0000000000000000 [28518.591714] RSP: 002b:00007f725ef3d438 EFLAGS: 00010202 [28518.591716] RAX: 00000000000021bc RBX: 0000000000000000 RCX: 0000555c314f6b53 [28518.591717] RDX: 00000000000021bc RSI: 0000000000000000 RDI: 0000000001200011 [28518.591718] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [28518.591719] R10: 0000555c32149750 R11: 0000000000000246 R12: 0000000000000001 [28518.591719] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [28518.591720] FS: 0000555c32149480 GS: 0000000000000000 [28533.783350] audit: type=1326 audit(1689307861.914:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=776832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28603.619269] audit: type=1326 audit(1689307931.750:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=767839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28615.460854] audit: type=1326 audit(1689307943.590:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=783635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28676.314789] audit: type=1326 audit(1689308004.446:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=793111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28676.420160] audit: type=1326 audit(1689308004.550:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=734074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28701.537240] audit: type=1326 audit(1689308029.666:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=795042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [28757.271746] audit: type=1326 audit(1689308085.402:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=799738 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28818.578136] audit: type=1326 audit(1689308146.706:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=804643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28899.506306] audit: type=1326 audit(1689308227.634:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=807704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28922.829707] audit: type=1326 audit(1689308250.958:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=814149 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28961.253395] audit: type=1326 audit(1689308289.382:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=810798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28987.506469] audit: type=1326 audit(1689308315.634:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=797437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [28991.547363] potentially unexpected fatal signal 11. [28991.552485] CPU: 64 PID: 798469 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28991.562806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28991.566867] potentially unexpected fatal signal 11. [28991.572176] RIP: 0033:0x55f712f6ecaf [28991.577218] CPU: 37 PID: 802925 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28991.580908] Code: 25 09 00 31 c0 e8 f1 18 ff ff 90 41 57 41 56 41 55 41 54 55 53 48 81 ec f8 01 00 00 e8 4a dd ff ff 48 8b 05 23 fa c8 00 31 ff <48> 89 05 12 fa c8 00 e8 35 15 ff ff e8 10 16 ff ff 4c 8b 25 b9 7c [28991.580910] RSP: 002b:00007f1a6fdcc310 EFLAGS: 00010246 [28991.580912] RAX: 0000001b2d220000 RBX: 0000000000000003 RCX: 000055f712fb49f0 [28991.580912] RDX: 000055f71300151b RSI: 00000000ffffff9c RDI: 0000000000000000 [28991.580914] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [28991.580914] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [28991.580915] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [28991.580915] FS: 000055f713c05480 GS: 0000000000000000 [28991.664449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28991.673875] RIP: 0033:0x7f6a11b9520b [28991.679010] Code: 48 89 16 48 69 d2 00 ca 9a 3b 49 29 d0 4c 89 46 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 48 89 fe 48 8d 0d f5 dd ff ff <48> 8b 39 83 e7 fe 48 8b 59 08 4c 8b 41 18 4c 8b 51 10 4c 8b 59 20 [28991.699323] RSP: 002b:00007fffd89c72d0 EFLAGS: 00010202 [28991.706093] RAX: 0000000000000002 RBX: 0000000000000003 RCX: 00007f6a11b93000 [28991.714729] RDX: 0000001b2d020004 RSI: 00007fffd89c72f0 RDI: 00007fffd89c72f0 [28991.723402] RBP: 0000000000000001 R08: 0000001b2d060000 R09: 0000000000000000 [28991.732124] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [28991.739416] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [28991.748096] FS: 000055a0945e8480 GS: 0000000000000000 [28995.277014] potentially unexpected fatal signal 11. [28995.282071] CPU: 56 PID: 800330 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28995.292421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28995.301800] RIP: 0033:0x55f402ec2e37 [28995.305545] Code: 4c 8b 28 4d 85 ed 0f 84 4f 02 00 00 31 c0 ba 01 00 00 00 f0 41 0f b1 55 00 0f 85 b4 02 00 00 49 8b 6d 60 48 8d 05 29 18 12 00 <4c> 8b 65 08 49 83 e4 f8 49 39 c5 74 31 48 8b 05 a5 17 12 00 48 8d [28995.324463] RSP: 002b:00007f5e1bdc8170 EFLAGS: 00010246 [28995.331186] RAX: 000055f402fe4660 RBX: 0000000000000110 RCX: 000055f402ee5be7 [28995.339860] RDX: 0000000000000001 RSI: 0000000000000010 RDI: 0000000000000011 [28995.348585] RBP: 000055f403b367d0 R08: 00000000ffffffff R09: 0000000000000000 [28995.357230] R10: 0000000000021000 R11: 0000000000000206 R12: 00007f5e1bdc8470 [28995.365874] R13: 000055f402fe4660 R14: 0000000000001000 R15: 0000000000000000 [28995.374530] FS: 000055f403b35480 GS: 0000000000000000 [29031.960069] audit: type=1326 audit(1689308360.090:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=778319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29036.403864] audit: type=1326 audit(1689308364.534:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=792995 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29044.291787] audit: type=1326 audit(1689308372.422:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=814225 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29087.084422] audit: type=1326 audit(1689308415.214:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=816520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29103.438084] audit: type=1326 audit(1689308431.566:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=817429 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29103.482197] audit: type=1326 audit(1689308431.610:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=812303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29172.138496] audit: type=1326 audit(1689308500.266:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=827744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29242.947208] audit: type=1326 audit(1689308571.077:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=832636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29246.192161] audit: type=1326 audit(1689308574.321:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=832962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29315.792299] audit: type=1326 audit(1689308643.921:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=836210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29320.200886] audit: type=1326 audit(1689308648.329:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=830664 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29349.855237] audit: type=1326 audit(1689308677.981:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=832111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29389.256608] audit: type=1326 audit(1689308717.385:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=842922 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29458.556731] audit: type=1326 audit(1689308786.685:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=845696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29491.600679] audit: type=1326 audit(1689308819.729:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=820675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29532.200553] audit: type=1326 audit(1689308860.329:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=847633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29536.129855] audit: type=1326 audit(1689308864.257:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=828110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29555.709700] exe[850266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf3ef0c839 cs:33 sp:7fc1c626e858 ax:0 si:55bf3ef65062 di:ffffffffff600000 [29580.936083] exe[813008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580eddf7839 cs:33 sp:7f940585f858 ax:0 si:5580ede50062 di:ffffffffff600000 [29601.228202] audit: type=1326 audit(1689308929.357:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=849342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29632.269022] audit: type=1326 audit(1689308960.397:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=778322 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29672.575644] audit: type=1326 audit(1689309000.705:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=830265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29674.428321] audit: type=1326 audit(1689309002.557:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=852129 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29744.710630] audit: type=1326 audit(1689309072.837:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=855330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29753.598151] audit: type=1326 audit(1689309081.725:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=847038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29817.430465] audit: type=1326 audit(1689309145.557:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=858368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29837.016546] audit: type=1326 audit(1689309165.145:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=846375 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [29887.370843] audit: type=1326 audit(1689309215.497:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=861250 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [29962.166260] audit: type=1326 audit(1689309290.292:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=863842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30020.606978] audit: type=1326 audit(1689309348.732:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=804677 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30030.062814] audit: type=1326 audit(1689309358.188:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=866867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30049.343445] exe[853808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b777752839 cs:33 sp:7fb5c0d8d858 ax:0 si:55b7777ab097 di:ffffffffff600000 [30049.481883] exe[853744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b777752839 cs:33 sp:7fb5c0d8d858 ax:0 si:55b7777ab097 di:ffffffffff600000 [30049.618830] exe[867211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b777752839 cs:33 sp:7fb5c0d8d858 ax:0 si:55b7777ab097 di:ffffffffff600000 [30050.934035] exe[853743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b777752839 cs:33 sp:7fb5c0d6c858 ax:0 si:55b7777ab097 di:ffffffffff600000 [30069.054146] audit: type=1326 audit(1689309397.180:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=858807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30104.816788] audit: type=1326 audit(1689309432.944:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=873743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30106.025173] audit: type=1326 audit(1689309434.152:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=869964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30107.145593] audit: type=1326 audit(1689309435.272:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=860457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30173.768568] audit: type=1326 audit(1689309501.896:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=871401 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30180.235296] audit: type=1326 audit(1689309508.360:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=868078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30249.458111] audit: type=1326 audit(1689309577.584:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=874121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30259.360083] exe[878123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565137330839 cs:33 sp:7f8e38792858 ax:0 si:565137389070 di:ffffffffff600000 [30262.959366] audit: type=1326 audit(1689309591.084:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=875056 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30280.416751] audit: type=1326 audit(1689309608.544:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=852341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30316.375976] audit: type=1326 audit(1689309644.500:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=877008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30392.488778] audit: type=1326 audit(1689309720.616:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=879661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30458.969420] audit: type=1326 audit(1689309787.096:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=882878 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30491.271184] audit: type=1326 audit(1689309819.396:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=874166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30496.609405] audit: type=1326 audit(1689309824.736:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=856373 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30535.181490] audit: type=1326 audit(1689309863.308:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=885359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30544.838778] audit: type=1326 audit(1689309872.964:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=880855 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30550.819181] audit: type=1326 audit(1689309878.944:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=881075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30584.181042] audit: type=1326 audit(1689309912.308:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=878431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30602.043672] audit: type=1326 audit(1689309930.168:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=886705 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000 [30619.509352] exe[869794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1bf5a6839 cs:33 sp:7ec742e5c858 ax:0 si:55d1bf5ff062 di:ffffffffff600000 [30627.382284] audit: type=1326 audit(1689309955.508:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=892957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x282838b code=0x80000000 [30680.592067] audit: type=1326 audit(1689310008.715:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=890067 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790f0b code=0x80000000