d64.go:225] [ 25530( 51): 25530( 51)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) 18:30:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) D0317 18:30:28.259534 431499 usertrap_amd64.go:212] [ 25529(1344): 25529(1344)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:28.259641 431499 usertrap_amd64.go:122] [ 25529(1344): 25529(1344)] Allocate a new trap: 0xc0067dc2d0 39 D0317 18:30:28.259761 431499 usertrap_amd64.go:225] [ 25529(1344): 25529(1344)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:28.272684 431499 usertrap_amd64.go:212] [ 25529(1344): 25529(1344)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:28.272819 431499 usertrap_amd64.go:122] [ 25529(1344): 25529(1344)] Allocate a new trap: 0xc0067dc2d0 40 D0317 18:30:28.272902 431499 usertrap_amd64.go:225] [ 25529(1344): 25529(1344)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:28.274730 431499 usertrap_amd64.go:212] [ 25529(1344): 25529(1344)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:28.274818 431499 usertrap_amd64.go:122] [ 25529(1344): 25529(1344)] Allocate a new trap: 0xc0067dc2d0 41 D0317 18:30:28.274953 431499 usertrap_amd64.go:225] [ 25529(1344): 25529(1344)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:28.275229 431499 usertrap_amd64.go:212] [ 25529(1344): 25533(1345)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:28.275376 431499 usertrap_amd64.go:122] [ 25529(1344): 25533(1345)] Allocate a new trap: 0xc0067dc2d0 42 D0317 18:30:28.275498 431499 usertrap_amd64.go:225] [ 25529(1344): 25533(1345)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:28.277156 431499 usertrap_amd64.go:212] [ 25529(1344): 25529(1344)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:28.277230 431499 usertrap_amd64.go:122] [ 25529(1344): 25529(1344)] Allocate a new trap: 0xc0067dc2d0 43 D0317 18:30:28.277312 431499 usertrap_amd64.go:225] [ 25529(1344): 25529(1344)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:28.279715 431499 usertrap_amd64.go:212] [ 25530( 51): 25530( 51)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:28.279942 431499 usertrap_amd64.go:122] [ 25530( 51): 25530( 51)] Allocate a new trap: 0xc000046480 38 D0317 18:30:28.280123 431499 usertrap_amd64.go:225] [ 25530( 51): 25530( 51)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:28.285895 431499 task_exit.go:204] [ 25529(1344): 25529(1344)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.286229 431499 task_signals.go:204] [ 25529(1344): 25533(1345)] Signal 9, PID: 25529, TID: 25533, fault addr: 0x0: terminating thread group D0317 18:30:28.286569 431499 task_exit.go:204] [ 25529(1344): 25529(1344)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.286749 431499 task_exit.go:204] [ 25529(1344): 25533(1345)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.296414 431499 task_exit.go:204] [ 25529(1344): 25533(1345)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.296717 431499 task_exit.go:204] [ 25529(1344): 25533(1345)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.296915 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:28.297132 431499 task_exit.go:204] [ 25529(1344): 25529(1344)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) D0317 18:30:28.306647 431499 usertrap_amd64.go:212] [ 25530( 51): 25530( 51)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:28.306762 431499 usertrap_amd64.go:122] [ 25530( 51): 25530( 51)] Allocate a new trap: 0xc000046480 39 D0317 18:30:28.306826 431499 usertrap_amd64.go:225] [ 25530( 51): 25530( 51)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:28.308236 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:28.308337 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 36 D0317 18:30:28.309133 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:28.309420 431499 usertrap_amd64.go:212] [ 25530( 51): 25530( 51)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:28.309492 431499 usertrap_amd64.go:122] [ 25530( 51): 25530( 51)] Allocate a new trap: 0xc000046480 40 D0317 18:30:28.309584 431499 usertrap_amd64.go:225] [ 25530( 51): 25530( 51)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:28.310688 431499 usertrap_amd64.go:212] [ 25530( 51): 25536( 52)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:28.310763 431499 usertrap_amd64.go:122] [ 25530( 51): 25536( 52)] Allocate a new trap: 0xc000046480 41 D0317 18:30:28.310852 431499 usertrap_amd64.go:225] [ 25530( 51): 25536( 52)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:28.314367 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:28.314437 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 37 D0317 18:30:28.314528 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:28.316951 431499 usertrap_amd64.go:212] [ 25530( 51): 25530( 51)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:28.317029 431499 usertrap_amd64.go:122] [ 25530( 51): 25530( 51)] Allocate a new trap: 0xc000046480 42 D0317 18:30:28.317147 431499 usertrap_amd64.go:225] [ 25530( 51): 25530( 51)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:28.318738 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:28.318847 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 37 D0317 18:30:28.319715 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:28.332616 431499 task_exit.go:204] [ 25530( 51): 25530( 51)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.333636 431499 task_signals.go:204] [ 25530( 51): 25536( 52)] Signal 9, PID: 25530, TID: 25536, fault addr: 0x0: terminating thread group D0317 18:30:28.333795 431499 task_exit.go:204] [ 25530( 51): 25530( 51)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.334362 431499 task_exit.go:204] [ 25530( 51): 25536( 52)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.335452 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:28.335597 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 38 D0317 18:30:28.335706 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:28.341407 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:28.341485 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 38 D0317 18:30:28.341621 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:28.344922 431499 task_exit.go:204] [ 25530( 51): 25536( 52)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.345053 431499 task_exit.go:204] [ 25530( 51): 25536( 52)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.345154 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:28.345766 431499 task_exit.go:204] [ 25530( 51): 25530( 51)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000d4c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}}], 0x2, 0x0) D0317 18:30:28.352309 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:28.352400 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 39 D0317 18:30:28.352475 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:28.353982 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:28.354086 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 40 D0317 18:30:28.354156 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:28.355565 431499 usertrap_amd64.go:212] [ 25534( 138): 25538( 139)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:28.355748 431499 usertrap_amd64.go:122] [ 25534( 138): 25538( 139)] Allocate a new trap: 0xc0023047e0 41 D0317 18:30:28.355871 431499 usertrap_amd64.go:225] [ 25534( 138): 25538( 139)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:28.356813 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:28.356943 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 37 D0317 18:30:28.357190 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:28.357279 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 39 D0317 18:30:28.357350 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:28.358175 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:28.360790 431499 usertrap_amd64.go:212] [ 25534( 138): 25534( 138)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:28.360885 431499 usertrap_amd64.go:122] [ 25534( 138): 25534( 138)] Allocate a new trap: 0xc0023047e0 42 D0317 18:30:28.360973 431499 usertrap_amd64.go:225] [ 25534( 138): 25534( 138)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:28.364985 431499 task_exit.go:204] [ 25534( 138): 25534( 138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.365804 431499 task_signals.go:204] [ 25534( 138): 25538( 139)] Signal 9, PID: 25534, TID: 25538, fault addr: 0x0: terminating thread group D0317 18:30:28.365942 431499 task_exit.go:204] [ 25534( 138): 25534( 138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.366057 431499 task_exit.go:204] [ 25534( 138): 25538( 139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.372676 431499 task_exit.go:204] [ 25534( 138): 25538( 139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.372866 431499 task_exit.go:204] [ 25534( 138): 25538( 139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.372996 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:28.373184 431499 task_exit.go:204] [ 25534( 138): 25534( 138)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @private1, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@hoplimit={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}], 0x30}}], 0x1, 0x0) D0317 18:30:28.375902 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:28.375998 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 40 D0317 18:30:28.376096 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:28.378670 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:28.378750 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 41 D0317 18:30:28.378827 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:28.380101 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:28.380176 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 38 D0317 18:30:28.380252 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:28.380729 431499 usertrap_amd64.go:212] [ 25535(2771): 25540(2772)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:28.380828 431499 usertrap_amd64.go:122] [ 25535(2771): 25540(2772)] Allocate a new trap: 0xc0040ca570 42 D0317 18:30:28.380906 431499 usertrap_amd64.go:225] [ 25535(2771): 25540(2772)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:28.382890 431499 usertrap_amd64.go:212] [ 25535(2771): 25535(2771)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:28.382982 431499 usertrap_amd64.go:122] [ 25535(2771): 25535(2771)] Allocate a new trap: 0xc0040ca570 43 D0317 18:30:28.383080 431499 usertrap_amd64.go:225] [ 25535(2771): 25535(2771)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:28.397887 431499 task_exit.go:204] [ 25535(2771): 25535(2771)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.398031 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:28.398448 431499 task_exit.go:204] [ 25535(2771): 25535(2771)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.398673 431499 task_signals.go:204] [ 25535(2771): 25540(2772)] Signal 9, PID: 25535, TID: 25540, fault addr: 0x0: terminating thread group D0317 18:30:28.398757 431499 task_exit.go:204] [ 25535(2771): 25540(2772)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.399433 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 36 D0317 18:30:28.400417 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:28.407745 431499 task_exit.go:204] [ 25535(2771): 25540(2772)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.407850 431499 task_exit.go:204] [ 25535(2771): 25540(2772)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.407986 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:28.408118 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:28.408224 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 37 D0317 18:30:28.408303 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:28.409155 431499 task_exit.go:204] [ 25535(2771): 25535(2771)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @private}}}}) D0317 18:30:28.415030 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:28.415147 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 39 D0317 18:30:28.415221 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:28.508278 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:28.508579 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 40 D0317 18:30:28.508679 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:28.509306 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:28.509508 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 38 D0317 18:30:28.509685 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:28.512175 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:28.512253 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 41 D0317 18:30:28.512338 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:28.512623 431499 usertrap_amd64.go:212] [ 25537(1346): 25542(1347)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:28.512719 431499 usertrap_amd64.go:122] [ 25537(1346): 25542(1347)] Allocate a new trap: 0xc004fc6360 42 D0317 18:30:28.512825 431499 usertrap_amd64.go:225] [ 25537(1346): 25542(1347)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:28.513295 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:28.513426 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 36 D0317 18:30:28.514417 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:28.517255 431499 usertrap_amd64.go:212] [ 25537(1346): 25537(1346)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:28.517380 431499 usertrap_amd64.go:122] [ 25537(1346): 25537(1346)] Allocate a new trap: 0xc004fc6360 43 D0317 18:30:28.517482 431499 usertrap_amd64.go:225] [ 25537(1346): 25537(1346)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:28.520840 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:28.521051 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 37 D0317 18:30:28.521181 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:28.527917 431499 task_exit.go:204] [ 25537(1346): 25537(1346)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.530904 431499 task_signals.go:204] [ 25537(1346): 25542(1347)] Signal 9, PID: 25537, TID: 25542, fault addr: 0x0: terminating thread group D0317 18:30:28.532259 431499 task_exit.go:204] [ 25537(1346): 25537(1346)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.532392 431499 task_exit.go:204] [ 25537(1346): 25542(1347)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.536992 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:28.537209 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 37 D0317 18:30:28.540297 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:28.540961 431499 task_exit.go:204] [ 25537(1346): 25542(1347)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.541044 431499 task_exit.go:204] [ 25537(1346): 25542(1347)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.541311 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:28.541752 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:28.541921 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 39 D0317 18:30:28.542007 431499 task_exit.go:204] [ 25537(1346): 25537(1346)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.542014 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:28.544695 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:28.544890 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 40 D0317 18:30:28.545143 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:28.545661 431499 usertrap_amd64.go:212] [ 25539( 53): 25544( 54)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:28.545839 431499 usertrap_amd64.go:122] [ 25539( 53): 25544( 54)] Allocate a new trap: 0xc006f9c390 41 D0317 18:30:28.545949 431499 usertrap_amd64.go:225] [ 25539( 53): 25544( 54)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) 18:30:28 executing program 2: add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) D0317 18:30:28.549990 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:28.550155 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 38 D0317 18:30:28.550265 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:28.552973 431499 usertrap_amd64.go:212] [ 25539( 53): 25539( 53)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:28.553124 431499 usertrap_amd64.go:122] [ 25539( 53): 25539( 53)] Allocate a new trap: 0xc006f9c390 42 D0317 18:30:28.553213 431499 usertrap_amd64.go:225] [ 25539( 53): 25539( 53)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:28.554754 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:28.554860 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 38 D0317 18:30:28.554959 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:28.560280 431499 task_exit.go:204] [ 25539( 53): 25539( 53)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.560975 431499 task_signals.go:204] [ 25539( 53): 25544( 54)] Signal 9, PID: 25539, TID: 25544, fault addr: 0x0: terminating thread group D0317 18:30:28.561094 431499 task_exit.go:204] [ 25539( 53): 25539( 53)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.561457 431499 task_exit.go:204] [ 25539( 53): 25544( 54)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.564171 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:28.564242 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 39 D0317 18:30:28.564318 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:28.566475 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:28.566601 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 40 D0317 18:30:28.566754 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:28.568117 431499 usertrap_amd64.go:212] [ 25541( 140): 25545( 141)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:28.568422 431499 usertrap_amd64.go:122] [ 25541( 140): 25545( 141)] Allocate a new trap: 0xc0000464e0 41 D0317 18:30:28.568536 431499 usertrap_amd64.go:225] [ 25541( 140): 25545( 141)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:28.569765 431499 task_exit.go:204] [ 25539( 53): 25544( 54)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.569848 431499 task_exit.go:204] [ 25539( 53): 25544( 54)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.569934 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:28.570325 431499 task_exit.go:204] [ 25539( 53): 25539( 53)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 3: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) D0317 18:30:28.576549 431499 usertrap_amd64.go:212] [ 25541( 140): 25541( 140)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:28.576642 431499 usertrap_amd64.go:122] [ 25541( 140): 25541( 140)] Allocate a new trap: 0xc0000464e0 42 D0317 18:30:28.576719 431499 usertrap_amd64.go:225] [ 25541( 140): 25541( 140)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:28.583224 431499 task_exit.go:204] [ 25541( 140): 25541( 140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.584330 431499 task_exit.go:204] [ 25541( 140): 25541( 140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.584545 431499 task_signals.go:204] [ 25541( 140): 25545( 141)] Signal 9, PID: 25541, TID: 25545, fault addr: 0x0: terminating thread group D0317 18:30:28.584770 431499 task_exit.go:204] [ 25541( 140): 25545( 141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.589021 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:28.589260 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 39 D0317 18:30:28.589540 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:28.594748 431499 task_exit.go:204] [ 25541( 140): 25545( 141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.594886 431499 task_exit.go:204] [ 25541( 140): 25545( 141)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.595025 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:28.595498 431499 task_exit.go:204] [ 25541( 140): 25541( 140)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000cc0)={'ip_vti0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private}}}}) D0317 18:30:28.602434 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:28.602729 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 40 D0317 18:30:28.602947 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:28.605159 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:28.605489 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 41 D0317 18:30:28.605720 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:28.606023 431499 usertrap_amd64.go:212] [ 25543(2773): 25546(2774)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:28.606164 431499 usertrap_amd64.go:122] [ 25543(2773): 25546(2774)] Allocate a new trap: 0xc006f9c3c0 42 D0317 18:30:28.606311 431499 usertrap_amd64.go:225] [ 25543(2773): 25546(2774)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:28.614845 431499 usertrap_amd64.go:212] [ 25543(2773): 25543(2773)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:28.614964 431499 usertrap_amd64.go:122] [ 25543(2773): 25543(2773)] Allocate a new trap: 0xc006f9c3c0 43 D0317 18:30:28.615057 431499 usertrap_amd64.go:225] [ 25543(2773): 25543(2773)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:28.631678 431499 task_exit.go:204] [ 25543(2773): 25543(2773)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.632408 431499 task_signals.go:204] [ 25543(2773): 25546(2774)] Signal 9, PID: 25543, TID: 25546, fault addr: 0x0: terminating thread group D0317 18:30:28.632530 431499 task_exit.go:204] [ 25543(2773): 25543(2773)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.633111 431499 task_exit.go:204] [ 25543(2773): 25546(2774)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.635859 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:28.635938 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 36 D0317 18:30:28.636675 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:28.640398 431499 task_exit.go:204] [ 25543(2773): 25546(2774)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.640631 431499 task_exit.go:204] [ 25543(2773): 25546(2774)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.640840 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:28.641050 431499 task_exit.go:204] [ 25543(2773): 25543(2773)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.642452 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:28.642529 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 37 D0317 18:30:28.642624 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) 18:30:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000006c0)={'syztnl2\x00', &(0x7f0000000600)={'erspan0\x00', 0x0, 0x40, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x0, 0x7, 0x5c, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010100, @multicast2, {[@timestamp_addr={0x44, 0x2c, 0x7a, 0x1, 0x0, [{@broadcast, 0x1ff}, {@broadcast}, {@empty}, {@rand_addr, 0xac5}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @noop, @end, @end, @ra={0x94, 0x4}, @ssrr={0x89, 0x13, 0x0, [@loopback, @local, @multicast2, @multicast1]}]}}}}}) D0317 18:30:28.645658 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:28.645828 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 37 D0317 18:30:28.648333 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:28.654304 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:28.654471 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 36 D0317 18:30:28.656351 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:28.656504 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 38 D0317 18:30:28.656682 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:28.656894 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:28.666301 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:28.666539 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 38 D0317 18:30:28.666686 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:28.674875 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:28.674984 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 39 D0317 18:30:28.675062 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:28.677616 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:28.677733 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 40 D0317 18:30:28.678004 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:28.679888 431499 usertrap_amd64.go:212] [ 25547( 55): 25551( 56)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:28.679964 431499 usertrap_amd64.go:122] [ 25547( 55): 25551( 56)] Allocate a new trap: 0xc006e64450 41 D0317 18:30:28.680058 431499 usertrap_amd64.go:225] [ 25547( 55): 25551( 56)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:28.680986 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:28.681115 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 37 D0317 18:30:28.681182 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:28.684239 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:28.684363 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 39 D0317 18:30:28.684452 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:28.701279 431499 usertrap_amd64.go:212] [ 25547( 55): 25547( 55)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:28.701436 431499 usertrap_amd64.go:122] [ 25547( 55): 25547( 55)] Allocate a new trap: 0xc006e64450 42 D0317 18:30:28.701528 431499 usertrap_amd64.go:225] [ 25547( 55): 25547( 55)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:28.701880 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:28.702023 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 37 D0317 18:30:28.702715 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:28.706655 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:28.706831 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 38 D0317 18:30:28.707032 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:28.714211 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:28.714333 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 38 D0317 18:30:28.714464 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:28.717154 431499 task_exit.go:204] [ 25547( 55): 25547( 55)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.717863 431499 task_exit.go:204] [ 25547( 55): 25547( 55)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.718031 431499 task_signals.go:204] [ 25547( 55): 25551( 56)] Signal 9, PID: 25547, TID: 25551, fault addr: 0x0: terminating thread group D0317 18:30:28.718163 431499 task_exit.go:204] [ 25547( 55): 25551( 56)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.724881 431499 task_exit.go:204] [ 25547( 55): 25551( 56)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.725058 431499 task_exit.go:204] [ 25547( 55): 25551( 56)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.725184 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:28.726413 431499 task_exit.go:204] [ 25547( 55): 25547( 55)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @private2}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000140)="93", 0x1}], 0x3}}], 0x1, 0x0) D0317 18:30:28.730301 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:28.730397 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 39 D0317 18:30:28.730512 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:28.733182 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:28.733291 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 40 D0317 18:30:28.733476 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:28.735151 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:28.735208 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 41 D0317 18:30:28.735327 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:28.744141 431499 usertrap_amd64.go:212] [ 25548(1348): 25552(1349)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:28.744237 431499 usertrap_amd64.go:122] [ 25548(1348): 25552(1349)] Allocate a new trap: 0xc0026c6630 42 D0317 18:30:28.744357 431499 usertrap_amd64.go:225] [ 25548(1348): 25552(1349)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:28.746198 431499 usertrap_amd64.go:212] [ 25548(1348): 25548(1348)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:28.746304 431499 usertrap_amd64.go:122] [ 25548(1348): 25548(1348)] Allocate a new trap: 0xc0026c6630 43 D0317 18:30:28.746377 431499 usertrap_amd64.go:225] [ 25548(1348): 25548(1348)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:28.747395 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:28.747532 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 39 D0317 18:30:28.747669 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:28.749542 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:28.749612 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 40 D0317 18:30:28.749745 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:28.750221 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:28.750474 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 40 D0317 18:30:28.750636 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:28.751030 431499 usertrap_amd64.go:212] [ 25549( 142): 25553( 143)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:28.751270 431499 usertrap_amd64.go:122] [ 25549( 142): 25553( 143)] Allocate a new trap: 0xc0040ca630 41 D0317 18:30:28.751444 431499 usertrap_amd64.go:225] [ 25549( 142): 25553( 143)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:28.754073 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:28.754168 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 41 D0317 18:30:28.754276 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:28.755417 431499 usertrap_amd64.go:212] [ 25550(2775): 25554(2776)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:28.755512 431499 usertrap_amd64.go:122] [ 25550(2775): 25554(2776)] Allocate a new trap: 0xc00628a360 42 D0317 18:30:28.755659 431499 usertrap_amd64.go:225] [ 25550(2775): 25554(2776)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:28.760270 431499 usertrap_amd64.go:212] [ 25550(2775): 25550(2775)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:28.760465 431499 usertrap_amd64.go:122] [ 25550(2775): 25550(2775)] Allocate a new trap: 0xc00628a360 43 D0317 18:30:28.760671 431499 usertrap_amd64.go:225] [ 25550(2775): 25550(2775)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:28.763301 431499 task_exit.go:204] [ 25548(1348): 25548(1348)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.763739 431499 usertrap_amd64.go:212] [ 25549( 142): 25549( 142)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:28.763862 431499 usertrap_amd64.go:122] [ 25549( 142): 25549( 142)] Allocate a new trap: 0xc0040ca630 42 D0317 18:30:28.764025 431499 usertrap_amd64.go:225] [ 25549( 142): 25549( 142)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:28.764120 431499 task_exit.go:204] [ 25548(1348): 25548(1348)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.764624 431499 task_signals.go:204] [ 25548(1348): 25552(1349)] Signal 9, PID: 25548, TID: 25552, fault addr: 0x0: terminating thread group D0317 18:30:28.765087 431499 task_exit.go:204] [ 25548(1348): 25552(1349)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.772229 431499 task_signals.go:204] [ 25550(2775): 25554(2776)] Signal 9, PID: 25550, TID: 25554, fault addr: 0x0: terminating thread group D0317 18:30:28.772506 431499 task_exit.go:204] [ 25550(2775): 25550(2775)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.773261 431499 task_exit.go:204] [ 25550(2775): 25550(2775)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.774395 431499 task_exit.go:204] [ 25548(1348): 25552(1349)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.774563 431499 task_exit.go:204] [ 25548(1348): 25552(1349)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.774809 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:28.774987 431499 task_exit.go:204] [ 25550(2775): 25554(2776)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.775179 431499 task_signals.go:204] [ 25549( 142): 25553( 143)] Signal 9, PID: 25549, TID: 25553, fault addr: 0x0: terminating thread group D0317 18:30:28.775225 431499 task_exit.go:204] [ 25549( 142): 25549( 142)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.776279 431499 task_exit.go:204] [ 25549( 142): 25549( 142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.776476 431499 task_exit.go:204] [ 25549( 142): 25553( 143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.776823 431499 task_exit.go:204] [ 25548(1348): 25548(1348)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 2: socketpair(0x28, 0x1, 0x0, &(0x7f0000001080)) D0317 18:30:28.788759 431499 task_exit.go:204] [ 25550(2775): 25554(2776)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.789734 431499 task_exit.go:204] [ 25550(2775): 25554(2776)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.789998 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:28.790444 431499 task_exit.go:204] [ 25550(2775): 25550(2775)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.790817 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:28.790866 431499 task_exit.go:204] [ 25549( 142): 25553( 143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.790914 431499 task_exit.go:204] [ 25549( 142): 25553( 143)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.790928 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 36 D0317 18:30:28.791047 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 18:30:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched_retired(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000028c0)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xe}, {0x0, 0xe}}}, 0x24}}, 0x0) D0317 18:30:28.793245 431499 task_exit.go:204] [ 25549( 142): 25549( 142)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.795545 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) 18:30:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000600)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x4}}}, 0x24}}, 0x0) D0317 18:30:28.807036 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:28.807127 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 37 D0317 18:30:28.807252 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:28.847915 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:28.848195 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 36 D0317 18:30:28.849234 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:28.852056 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:28.852131 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 38 D0317 18:30:28.852201 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:28.852453 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:28.852603 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 37 D0317 18:30:28.853413 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:28.866324 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:28.866519 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 37 D0317 18:30:28.867234 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:28.867323 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 37 D0317 18:30:28.867470 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:28.867546 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:28.870927 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:28.871060 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 38 D0317 18:30:28.871161 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:28.875542 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:28.875750 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 39 D0317 18:30:28.876037 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:28.876173 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:28.876298 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 38 D0317 18:30:28.876406 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:28.878481 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:28.878565 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 40 D0317 18:30:28.878649 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:28.879692 431499 usertrap_amd64.go:212] [ 25555( 57): 25559( 58)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:28.879880 431499 usertrap_amd64.go:122] [ 25555( 57): 25559( 58)] Allocate a new trap: 0xc006e64480 41 D0317 18:30:28.880010 431499 usertrap_amd64.go:225] [ 25555( 57): 25559( 58)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:28.888026 431499 usertrap_amd64.go:212] [ 25555( 57): 25555( 57)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:28.888150 431499 usertrap_amd64.go:122] [ 25555( 57): 25555( 57)] Allocate a new trap: 0xc006e64480 42 D0317 18:30:28.888244 431499 usertrap_amd64.go:225] [ 25555( 57): 25555( 57)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:28.900330 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:28.900468 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 39 D0317 18:30:28.900590 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:28.908819 431499 task_exit.go:204] [ 25555( 57): 25555( 57)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.909753 431499 task_signals.go:204] [ 25555( 57): 25559( 58)] Signal 9, PID: 25555, TID: 25559, fault addr: 0x0: terminating thread group D0317 18:30:28.909880 431499 task_exit.go:204] [ 25555( 57): 25555( 57)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.910036 431499 task_exit.go:204] [ 25555( 57): 25559( 58)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.918775 431499 task_exit.go:204] [ 25555( 57): 25559( 58)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.918914 431499 task_exit.go:204] [ 25555( 57): 25559( 58)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.919051 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:28.919405 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:28.919660 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 38 D0317 18:30:28.919698 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:28.919797 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 39 D0317 18:30:28.919809 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:28.919921 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:28.920025 431499 task_exit.go:204] [ 25555( 57): 25555( 57)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) D0317 18:30:28.923120 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:28.923200 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 40 D0317 18:30:28.923285 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:28.925867 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:28.925941 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 41 D0317 18:30:28.926070 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:28.926716 431499 usertrap_amd64.go:212] [ 25557(2777): 25560(2778)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:28.927204 431499 usertrap_amd64.go:122] [ 25557(2777): 25560(2778)] Allocate a new trap: 0xc0023048a0 42 D0317 18:30:28.927447 431499 usertrap_amd64.go:225] [ 25557(2777): 25560(2778)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:28.933620 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:28.933738 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 39 D0317 18:30:28.933951 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:28.935767 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:28.936001 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 40 D0317 18:30:28.936205 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:28.937614 431499 usertrap_amd64.go:212] [ 25556( 144): 25561( 145)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:28.937711 431499 usertrap_amd64.go:122] [ 25556( 144): 25561( 145)] Allocate a new trap: 0xc006f9c3f0 41 D0317 18:30:28.937819 431499 usertrap_amd64.go:225] [ 25556( 144): 25561( 145)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:28.946050 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:28.946147 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 40 D0317 18:30:28.946269 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:28.947921 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:28.948034 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 41 D0317 18:30:28.948109 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:28.948562 431499 usertrap_amd64.go:212] [ 25557(2777): 25557(2777)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:28.948668 431499 usertrap_amd64.go:122] [ 25557(2777): 25557(2777)] Allocate a new trap: 0xc0023048a0 43 D0317 18:30:28.948781 431499 usertrap_amd64.go:225] [ 25557(2777): 25557(2777)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:28.948934 431499 usertrap_amd64.go:212] [ 25558(1350): 25562(1351)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:28.949050 431499 usertrap_amd64.go:122] [ 25558(1350): 25562(1351)] Allocate a new trap: 0xc00628a390 42 D0317 18:30:28.949209 431499 usertrap_amd64.go:225] [ 25558(1350): 25562(1351)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:28.952863 431499 usertrap_amd64.go:212] [ 25558(1350): 25558(1350)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:28.952960 431499 usertrap_amd64.go:122] [ 25558(1350): 25558(1350)] Allocate a new trap: 0xc00628a390 43 D0317 18:30:28.953283 431499 usertrap_amd64.go:225] [ 25558(1350): 25558(1350)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:28.956225 431499 usertrap_amd64.go:212] [ 25556( 144): 25556( 144)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:28.956317 431499 usertrap_amd64.go:122] [ 25556( 144): 25556( 144)] Allocate a new trap: 0xc006f9c3f0 42 D0317 18:30:28.956399 431499 usertrap_amd64.go:225] [ 25556( 144): 25556( 144)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:28.964643 431499 task_signals.go:204] [ 25557(2777): 25560(2778)] Signal 9, PID: 25557, TID: 25560, fault addr: 0x0: terminating thread group D0317 18:30:28.964947 431499 task_exit.go:204] [ 25557(2777): 25560(2778)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.965828 431499 task_exit.go:204] [ 25557(2777): 25560(2778)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.965938 431499 task_exit.go:204] [ 25557(2777): 25560(2778)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.966117 431499 task_exit.go:204] [ 25557(2777): 25557(2777)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.969030 431499 task_exit.go:204] [ 25556( 144): 25556( 144)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.969821 431499 task_exit.go:204] [ 25556( 144): 25556( 144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.970099 431499 task_signals.go:204] [ 25556( 144): 25561( 145)] Signal 9, PID: 25556, TID: 25561, fault addr: 0x0: terminating thread group D0317 18:30:28.970257 431499 task_exit.go:204] [ 25556( 144): 25561( 145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:28.973040 431499 task_exit.go:204] [ 25557(2777): 25557(2777)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.973282 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:28.974240 431499 task_exit.go:204] [ 25557(2777): 25557(2777)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 0: add_key(&(0x7f0000000100)='id_legacy\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) D0317 18:30:28.986318 431499 task_exit.go:204] [ 25556( 144): 25561( 145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:28.986459 431499 task_exit.go:204] [ 25556( 144): 25561( 145)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:28.986583 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:28.987016 431499 task_exit.go:204] [ 25556( 144): 25556( 144)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:28 executing program 1: socketpair(0xf, 0x0, 0x0, &(0x7f0000002400)) D0317 18:30:29.001303 431499 task_exit.go:204] [ 25558(1350): 25558(1350)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.002089 431499 task_exit.go:204] [ 25558(1350): 25558(1350)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.002415 431499 task_signals.go:204] [ 25558(1350): 25562(1351)] Signal 9, PID: 25558, TID: 25562, fault addr: 0x0: terminating thread group D0317 18:30:29.004536 431499 task_exit.go:204] [ 25558(1350): 25562(1351)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.009935 431499 task_exit.go:204] [ 25558(1350): 25562(1351)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.010054 431499 task_exit.go:204] [ 25558(1350): 25562(1351)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.010197 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.012665 431499 task_exit.go:204] [ 25558(1350): 25558(1350)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) D0317 18:30:29.019807 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.019952 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 36 D0317 18:30:29.021366 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.030044 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.030188 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 37 D0317 18:30:29.030270 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.036677 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.036849 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 37 D0317 18:30:29.037720 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.043010 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.043231 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 38 D0317 18:30:29.043516 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.064450 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.064559 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 38 D0317 18:30:29.064710 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.067678 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.067773 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 39 D0317 18:30:29.067847 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.082694 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.082878 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 39 D0317 18:30:29.083013 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.083205 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.083345 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 40 D0317 18:30:29.083529 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.085443 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.085589 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 40 D0317 18:30:29.085658 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.087124 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.087316 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 41 D0317 18:30:29.087187 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.087489 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.087590 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 37 D0317 18:30:29.087924 431499 usertrap_amd64.go:212] [ 25563( 59): 25567( 60)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.088536 431499 usertrap_amd64.go:122] [ 25563( 59): 25567( 60)] Allocate a new trap: 0xc0023048d0 41 D0317 18:30:29.088956 431499 usertrap_amd64.go:225] [ 25563( 59): 25567( 60)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.088368 431499 usertrap_amd64.go:212] [ 25564(2779): 25568(2780)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.088592 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.089626 431499 usertrap_amd64.go:122] [ 25564(2779): 25568(2780)] Allocate a new trap: 0xc0027803f0 42 D0317 18:30:29.090045 431499 usertrap_amd64.go:225] [ 25564(2779): 25568(2780)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.092057 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.092246 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 36 D0317 18:30:29.092935 431499 usertrap_amd64.go:212] [ 25564(2779): 25564(2779)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.093041 431499 usertrap_amd64.go:122] [ 25564(2779): 25564(2779)] Allocate a new trap: 0xc0027803f0 43 D0317 18:30:29.093134 431499 usertrap_amd64.go:225] [ 25564(2779): 25564(2779)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.094204 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.098243 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.098333 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 38 D0317 18:30:29.098432 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.099033 431499 task_exit.go:204] [ 25564(2779): 25564(2779)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.099681 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.099793 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 37 D0317 18:30:29.099877 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:29.100396 431499 task_exit.go:204] [ 25564(2779): 25564(2779)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.100387 431499 task_signals.go:204] [ 25564(2779): 25568(2780)] Signal 9, PID: 25564, TID: 25568, fault addr: 0x0: terminating thread group D0317 18:30:29.100617 431499 task_exit.go:204] [ 25564(2779): 25568(2780)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.104433 431499 usertrap_amd64.go:212] [ 25563( 59): 25563( 59)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.104685 431499 usertrap_amd64.go:122] [ 25563( 59): 25563( 59)] Allocate a new trap: 0xc0023048d0 42 D0317 18:30:29.104861 431499 usertrap_amd64.go:225] [ 25563( 59): 25563( 59)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.110664 431499 task_exit.go:204] [ 25563( 59): 25563( 59)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.110886 431499 task_signals.go:204] [ 25563( 59): 25567( 60)] Signal 9, PID: 25563, TID: 25567, fault addr: 0x0: terminating thread group D0317 18:30:29.111483 431499 task_exit.go:204] [ 25563( 59): 25563( 59)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.111786 431499 task_exit.go:204] [ 25563( 59): 25567( 60)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.121424 431499 task_exit.go:204] [ 25563( 59): 25567( 60)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.121523 431499 task_exit.go:204] [ 25563( 59): 25567( 60)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.121631 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.122316 431499 task_exit.go:204] [ 25563( 59): 25563( 59)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000016d00), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pimreg0\x00', 0x1}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)={'veth0_vlan\x00'}) D0317 18:30:29.126417 431499 task_exit.go:204] [ 25564(2779): 25568(2780)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.126608 431499 task_exit.go:204] [ 25564(2779): 25568(2780)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.126825 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.127047 431499 task_exit.go:204] [ 25564(2779): 25564(2779)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101e81, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0xffffffffffffffff) D0317 18:30:29.137467 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.138453 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 39 D0317 18:30:29.138642 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:29.139561 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.139772 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 38 D0317 18:30:29.140024 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.152004 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.152238 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 39 D0317 18:30:29.152412 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.154243 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.154370 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 40 D0317 18:30:29.154516 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.155432 431499 usertrap_amd64.go:212] [ 25566( 146): 25569( 147)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.155660 431499 usertrap_amd64.go:122] [ 25566( 146): 25569( 147)] Allocate a new trap: 0xc004fc6480 41 D0317 18:30:29.155820 431499 usertrap_amd64.go:225] [ 25566( 146): 25569( 147)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.158497 431499 usertrap_amd64.go:212] [ 25566( 146): 25566( 146)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.158798 431499 usertrap_amd64.go:122] [ 25566( 146): 25566( 146)] Allocate a new trap: 0xc004fc6480 42 D0317 18:30:29.159212 431499 usertrap_amd64.go:225] [ 25566( 146): 25566( 146)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.162070 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:29.162246 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 40 D0317 18:30:29.162347 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:29.164293 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:29.164399 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 41 D0317 18:30:29.164480 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:29.165206 431499 usertrap_amd64.go:212] [ 25565(1352): 25571(1353)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:29.165305 431499 usertrap_amd64.go:122] [ 25565(1352): 25571(1353)] Allocate a new trap: 0xc0040ca720 42 D0317 18:30:29.165413 431499 usertrap_amd64.go:225] [ 25565(1352): 25571(1353)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:29.177510 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.177632 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 37 D0317 18:30:29.178679 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.181085 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.181222 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 36 D0317 18:30:29.182162 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.182325 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 38 D0317 18:30:29.182428 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.183959 431499 task_exit.go:204] [ 25566( 146): 25566( 146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.184369 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.184864 431499 task_exit.go:204] [ 25566( 146): 25566( 146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.185174 431499 task_signals.go:204] [ 25566( 146): 25569( 147)] Signal 9, PID: 25566, TID: 25569, fault addr: 0x0: terminating thread group D0317 18:30:29.185434 431499 task_exit.go:204] [ 25566( 146): 25569( 147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.192677 431499 task_exit.go:204] [ 25566( 146): 25569( 147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.192663 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.192795 431499 task_exit.go:204] [ 25566( 146): 25569( 147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.192910 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 37 D0317 18:30:29.193086 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.193132 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.195185 431499 task_exit.go:204] [ 25566( 146): 25566( 146)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89ff, &(0x7f0000000500)={'erspan0\x00', 0x0}) D0317 18:30:29.206141 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.206228 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 39 D0317 18:30:29.206354 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.211754 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.212001 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 38 D0317 18:30:29.212128 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.216912 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.217038 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 40 D0317 18:30:29.217119 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.218844 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.218989 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 41 D0317 18:30:29.219137 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.219505 431499 usertrap_amd64.go:212] [ 25570(2781): 25573(2782)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.219591 431499 usertrap_amd64.go:122] [ 25570(2781): 25573(2782)] Allocate a new trap: 0xc0067dc450 42 D0317 18:30:29.219999 431499 usertrap_amd64.go:225] [ 25570(2781): 25573(2782)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.227210 431499 usertrap_amd64.go:212] [ 25570(2781): 25570(2781)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.227348 431499 usertrap_amd64.go:122] [ 25570(2781): 25570(2781)] Allocate a new trap: 0xc0067dc450 43 D0317 18:30:29.227448 431499 usertrap_amd64.go:225] [ 25570(2781): 25570(2781)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.228909 431499 usertrap_amd64.go:212] [ 25565(1352): 25565(1352)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:29.229006 431499 usertrap_amd64.go:122] [ 25565(1352): 25565(1352)] Allocate a new trap: 0xc0040ca720 43 D0317 18:30:29.229138 431499 usertrap_amd64.go:225] [ 25565(1352): 25565(1352)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:29.231795 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.231874 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 39 D0317 18:30:29.231992 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.233390 431499 task_signals.go:204] [ 25570(2781): 25573(2782)] Signal 9, PID: 25570, TID: 25573, fault addr: 0x0: terminating thread group D0317 18:30:29.233577 431499 task_exit.go:204] [ 25570(2781): 25573(2782)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.234385 431499 task_exit.go:204] [ 25570(2781): 25570(2781)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.236406 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.236633 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 40 D0317 18:30:29.236824 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.236971 431499 task_exit.go:204] [ 25565(1352): 25565(1352)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.237482 431499 task_signals.go:204] [ 25565(1352): 25571(1353)] Signal 9, PID: 25565, TID: 25571, fault addr: 0x0: terminating thread group D0317 18:30:29.237738 431499 task_signals.go:204] [ 25565(1352): 25574(1354)] Signal 9, PID: 25565, TID: 25574, fault addr: 0x0: terminating thread group D0317 18:30:29.237978 431499 task_exit.go:204] [ 25570(2781): 25573(2782)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.238117 431499 task_exit.go:204] [ 25570(2781): 25573(2782)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.238156 431499 usertrap_amd64.go:212] [ 25572( 61): 25576( 62)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.238250 431499 usertrap_amd64.go:122] [ 25572( 61): 25576( 62)] Allocate a new trap: 0xc004fc6510 41 D0317 18:30:29.238399 431499 task_exit.go:204] [ 25565(1352): 25574(1354)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.238428 431499 usertrap_amd64.go:225] [ 25572( 61): 25576( 62)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.239315 431499 task_exit.go:204] [ 25565(1352): 25571(1353)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.240230 431499 task_exit.go:204] [ 25565(1352): 25574(1354)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.240402 431499 task_exit.go:204] [ 25565(1352): 25574(1354)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.240683 431499 task_exit.go:204] [ 25565(1352): 25571(1353)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.240746 431499 task_exit.go:204] [ 25565(1352): 25571(1353)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.241971 431499 task_exit.go:204] [ 25570(2781): 25570(2781)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.242100 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.242260 431499 task_exit.go:204] [ 25570(2781): 25570(2781)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.244399 431499 usertrap_amd64.go:212] [ 25572( 61): 25572( 61)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.244532 431499 usertrap_amd64.go:122] [ 25572( 61): 25572( 61)] Allocate a new trap: 0xc004fc6510 42 D0317 18:30:29.244717 431499 usertrap_amd64.go:225] [ 25572( 61): 25572( 61)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.247591 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.247638 431499 task_exit.go:204] [ 25565(1352): 25565(1352)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.247742 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 36 D0317 18:30:29.247783 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.247965 431499 task_exit.go:204] [ 25565(1352): 25565(1352)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.248606 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.255179 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.255262 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 37 D0317 18:30:29.255393 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 18:30:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) D0317 18:30:29.258644 431499 task_signals.go:470] [ 7: 43] Notified of signal 23 D0317 18:30:29.259832 431499 task_signals.go:220] [ 7: 43] Signal 23: delivering to handler 18:30:29 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(r0, 0xc00c6211, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="db"}) D0317 18:30:29.264637 431499 task_exit.go:204] [ 25572( 61): 25572( 61)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.264835 431499 task_signals.go:204] [ 25572( 61): 25576( 62)] Signal 9, PID: 25572, TID: 25576, fault addr: 0x0: terminating thread group D0317 18:30:29.265304 431499 task_exit.go:204] [ 25572( 61): 25572( 61)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.265445 431499 task_exit.go:204] [ 25572( 61): 25576( 62)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.274451 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.274622 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 38 D0317 18:30:29.274771 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.275407 431499 task_exit.go:204] [ 25572( 61): 25576( 62)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.275553 431499 task_exit.go:204] [ 25572( 61): 25576( 62)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.275699 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.277996 431499 task_exit.go:204] [ 25572( 61): 25572( 61)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) D0317 18:30:29.288399 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.288557 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 39 D0317 18:30:29.288681 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.291275 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.291331 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 40 D0317 18:30:29.291401 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.292284 431499 usertrap_amd64.go:212] [ 25575( 148): 25579( 149)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.292362 431499 usertrap_amd64.go:122] [ 25575( 148): 25579( 149)] Allocate a new trap: 0xc002304930 41 D0317 18:30:29.292463 431499 usertrap_amd64.go:225] [ 25575( 148): 25579( 149)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.296149 431499 usertrap_amd64.go:212] [ 25575( 148): 25575( 148)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.296310 431499 usertrap_amd64.go:122] [ 25575( 148): 25575( 148)] Allocate a new trap: 0xc002304930 42 D0317 18:30:29.296687 431499 usertrap_amd64.go:225] [ 25575( 148): 25575( 148)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.299866 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.299998 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 37 D0317 18:30:29.301319 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.302425 431499 task_exit.go:204] [ 25575( 148): 25575( 148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.303652 431499 task_signals.go:204] [ 25575( 148): 25579( 149)] Signal 9, PID: 25575, TID: 25579, fault addr: 0x0: terminating thread group D0317 18:30:29.303945 431499 task_exit.go:204] [ 25575( 148): 25579( 149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.304379 431499 task_exit.go:204] [ 25575( 148): 25575( 148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.308647 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.309019 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 38 D0317 18:30:29.309314 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.313407 431499 task_exit.go:204] [ 25575( 148): 25579( 149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.313506 431499 task_exit.go:204] [ 25575( 148): 25579( 149)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.313643 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.314433 431499 task_exit.go:204] [ 25575( 148): 25575( 148)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002780)={0x0, 0x0, 0x0}, 0x42) D0317 18:30:29.328651 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.328785 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 36 D0317 18:30:29.329455 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.332662 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.332730 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 37 D0317 18:30:29.332816 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.338410 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.338568 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 37 D0317 18:30:29.339428 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.349451 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.349647 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 39 D0317 18:30:29.349750 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:29.352137 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.352212 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 38 D0317 18:30:29.352342 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.363160 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.363430 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 38 D0317 18:30:29.363685 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.371808 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:29.371891 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.371908 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 40 D0317 18:30:29.371943 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 39 D0317 18:30:29.371994 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:29.372038 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.375232 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:29.375370 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.375438 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 41 D0317 18:30:29.375564 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:29.375447 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 40 D0317 18:30:29.376260 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.376510 431499 usertrap_amd64.go:212] [ 25580( 63): 25583( 64)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.376676 431499 usertrap_amd64.go:122] [ 25580( 63): 25583( 64)] Allocate a new trap: 0xc000046630 41 D0317 18:30:29.376792 431499 usertrap_amd64.go:225] [ 25580( 63): 25583( 64)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.377871 431499 usertrap_amd64.go:212] [ 25577(1355): 25582(1356)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:29.378102 431499 usertrap_amd64.go:122] [ 25577(1355): 25582(1356)] Allocate a new trap: 0xc0067dc510 42 D0317 18:30:29.378186 431499 usertrap_amd64.go:225] [ 25577(1355): 25582(1356)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:29.378616 431499 usertrap_amd64.go:212] [ 25580( 63): 25580( 63)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.378804 431499 usertrap_amd64.go:122] [ 25580( 63): 25580( 63)] Allocate a new trap: 0xc000046630 42 D0317 18:30:29.379258 431499 usertrap_amd64.go:225] [ 25580( 63): 25580( 63)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.385758 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.385849 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 39 D0317 18:30:29.386009 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.388308 431499 usertrap_amd64.go:212] [ 25577(1355): 25577(1355)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:29.388394 431499 usertrap_amd64.go:122] [ 25577(1355): 25577(1355)] Allocate a new trap: 0xc0067dc510 43 D0317 18:30:29.388549 431499 usertrap_amd64.go:225] [ 25577(1355): 25577(1355)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:29.394858 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.395079 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 40 D0317 18:30:29.395192 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.396081 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.396360 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 36 D0317 18:30:29.396977 431499 task_exit.go:204] [ 25580( 63): 25580( 63)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.397184 431499 task_signals.go:204] [ 25580( 63): 25583( 64)] Signal 9, PID: 25580, TID: 25583, fault addr: 0x0: terminating thread group D0317 18:30:29.397331 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.398335 431499 task_exit.go:204] [ 25580( 63): 25583( 64)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.398616 431499 task_exit.go:204] [ 25580( 63): 25580( 63)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.400897 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.400997 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 41 D0317 18:30:29.401146 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.401527 431499 usertrap_amd64.go:212] [ 25578(2783): 25584(2784)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.401610 431499 usertrap_amd64.go:122] [ 25578(2783): 25584(2784)] Allocate a new trap: 0xc000046600 42 D0317 18:30:29.401692 431499 usertrap_amd64.go:225] [ 25578(2783): 25584(2784)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.402566 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.402676 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 37 D0317 18:30:29.402770 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:29.405097 431499 task_exit.go:204] [ 25580( 63): 25583( 64)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.405179 431499 task_exit.go:204] [ 25580( 63): 25583( 64)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.405317 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.405500 431499 task_exit.go:204] [ 25580( 63): 25580( 63)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.406056 431499 task_exit.go:204] [ 25577(1355): 25577(1355)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.406779 431499 task_signals.go:204] [ 25577(1355): 25582(1356)] Signal 9, PID: 25577, TID: 25582, fault addr: 0x0: terminating thread group D0317 18:30:29.406889 431499 task_exit.go:204] [ 25577(1355): 25577(1355)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.407365 431499 task_exit.go:204] [ 25577(1355): 25582(1356)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.410357 431499 usertrap_amd64.go:212] [ 25578(2783): 25578(2783)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.410434 431499 usertrap_amd64.go:122] [ 25578(2783): 25578(2783)] Allocate a new trap: 0xc000046600 43 D0317 18:30:29.410503 431499 usertrap_amd64.go:225] [ 25578(2783): 25578(2783)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) 18:30:29 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x54, 0x0, &(0x7f00000001c0)=[@decrefs, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) D0317 18:30:29.426363 431499 task_exit.go:204] [ 25577(1355): 25582(1356)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.426466 431499 task_exit.go:204] [ 25577(1355): 25582(1356)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.426595 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.427759 431499 task_exit.go:204] [ 25577(1355): 25577(1355)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89fa, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:29.436412 431499 task_exit.go:204] [ 25578(2783): 25578(2783)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.437349 431499 task_exit.go:204] [ 25578(2783): 25578(2783)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.437295 431499 task_signals.go:204] [ 25578(2783): 25584(2784)] Signal 9, PID: 25578, TID: 25584, fault addr: 0x0: terminating thread group D0317 18:30:29.437609 431499 task_exit.go:204] [ 25578(2783): 25584(2784)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.445330 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.445514 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 38 D0317 18:30:29.445719 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.447324 431499 task_exit.go:204] [ 25578(2783): 25584(2784)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.447504 431499 task_exit.go:204] [ 25578(2783): 25584(2784)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.447704 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.449632 431499 task_exit.go:204] [ 25578(2783): 25578(2783)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, 0x0) D0317 18:30:29.462623 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.462904 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 36 D0317 18:30:29.463849 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.467070 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.467187 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 39 D0317 18:30:29.467323 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.469389 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.469492 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 40 D0317 18:30:29.469603 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.470054 431499 usertrap_amd64.go:212] [ 25581( 150): 25587( 151)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.470496 431499 usertrap_amd64.go:122] [ 25581( 150): 25587( 151)] Allocate a new trap: 0xc0040fc630 41 D0317 18:30:29.470682 431499 usertrap_amd64.go:225] [ 25581( 150): 25587( 151)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.472802 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.472910 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 37 D0317 18:30:29.474070 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.474779 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.474881 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 37 D0317 18:30:29.475034 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.475423 431499 usertrap_amd64.go:212] [ 25581( 150): 25581( 150)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.475495 431499 usertrap_amd64.go:122] [ 25581( 150): 25581( 150)] Allocate a new trap: 0xc0040fc630 42 D0317 18:30:29.475733 431499 usertrap_amd64.go:225] [ 25581( 150): 25581( 150)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.479972 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.480164 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 38 D0317 18:30:29.480365 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.486965 431499 task_exit.go:204] [ 25581( 150): 25581( 150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.487220 431499 task_signals.go:204] [ 25581( 150): 25587( 151)] Signal 9, PID: 25581, TID: 25587, fault addr: 0x0: terminating thread group D0317 18:30:29.487936 431499 task_exit.go:204] [ 25581( 150): 25581( 150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.488067 431499 task_exit.go:204] [ 25581( 150): 25587( 151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.495200 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.495310 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 38 D0317 18:30:29.495436 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.499144 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.499415 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 39 D0317 18:30:29.499682 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:29.499825 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.499852 431499 task_exit.go:204] [ 25581( 150): 25587( 151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.499986 431499 task_exit.go:204] [ 25581( 150): 25587( 151)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.499967 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 37 D0317 18:30:29.500073 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.500387 431499 task_exit.go:204] [ 25581( 150): 25581( 150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.501051 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) 18:30:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='cifs.idmap\x00', 0x0, 0x0, 0x0, r0) D0317 18:30:29.518958 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.519333 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 39 D0317 18:30:29.519556 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.522339 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.522511 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 40 D0317 18:30:29.522739 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.523048 431499 usertrap_amd64.go:212] [ 25585( 65): 25589( 66)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.523213 431499 usertrap_amd64.go:122] [ 25585( 65): 25589( 66)] Allocate a new trap: 0xc0040ca7b0 41 D0317 18:30:29.523152 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.523335 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 38 D0317 18:30:29.523311 431499 usertrap_amd64.go:225] [ 25585( 65): 25589( 66)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.523531 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.526888 431499 usertrap_amd64.go:212] [ 25585( 65): 25585( 65)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.527173 431499 usertrap_amd64.go:122] [ 25585( 65): 25585( 65)] Allocate a new trap: 0xc0040ca7b0 42 D0317 18:30:29.527394 431499 usertrap_amd64.go:225] [ 25585( 65): 25585( 65)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.544552 431499 task_exit.go:204] [ 25585( 65): 25585( 65)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.545569 431499 task_signals.go:204] [ 25585( 65): 25589( 66)] Signal 9, PID: 25585, TID: 25589, fault addr: 0x0: terminating thread group D0317 18:30:29.545583 431499 task_exit.go:204] [ 25585( 65): 25585( 65)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.545727 431499 task_exit.go:204] [ 25585( 65): 25589( 66)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.546997 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:29.547210 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 40 D0317 18:30:29.547463 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:29.550843 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:29.550947 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 41 D0317 18:30:29.551051 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:29.551901 431499 usertrap_amd64.go:212] [ 25586(1357): 25590(1358)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:29.551991 431499 usertrap_amd64.go:122] [ 25586(1357): 25590(1358)] Allocate a new trap: 0xc0040ca7e0 42 D0317 18:30:29.552063 431499 usertrap_amd64.go:225] [ 25586(1357): 25590(1358)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:29.555174 431499 task_exit.go:204] [ 25585( 65): 25589( 66)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.556024 431499 task_exit.go:204] [ 25585( 65): 25589( 66)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.556458 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.556834 431499 task_exit.go:204] [ 25585( 65): 25585( 65)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.557235 431499 usertrap_amd64.go:212] [ 25586(1357): 25586(1357)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:29.557344 431499 usertrap_amd64.go:122] [ 25586(1357): 25586(1357)] Allocate a new trap: 0xc0040ca7e0 43 D0317 18:30:29.557559 431499 usertrap_amd64.go:225] [ 25586(1357): 25586(1357)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:29.558505 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.558631 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 39 D0317 18:30:29.558761 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @private2}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000000)="e6667b0b23868f27162c6b8916957dec350c39a0b59928c4ba617af8ba795b1a9324f4df25143d3a1667fb9422", 0x2d}, {&(0x7f0000000140)="93d5496bbebba25c26cc1548850602e02b1e371a730d1a521d83300272d7704ca96440f20913a500fced2d68bf115c90e05b2d3ccd3494a693e835d92bbf50e961e6accf", 0x44}], 0x2}}], 0x1, 0x0) D0317 18:30:29.573624 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.573763 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 40 D0317 18:30:29.573873 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.575638 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.578354 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 41 D0317 18:30:29.578499 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.577801 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.578814 431499 usertrap_amd64.go:212] [ 25588(2785): 25592(2786)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.578906 431499 usertrap_amd64.go:122] [ 25588(2785): 25592(2786)] Allocate a new trap: 0xc000046660 42 D0317 18:30:29.578866 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 36 D0317 18:30:29.579026 431499 usertrap_amd64.go:225] [ 25588(2785): 25592(2786)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.579651 431499 task_exit.go:204] [ 25586(1357): 25586(1357)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.580047 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.580213 431499 task_signals.go:204] [ 25586(1357): 25590(1358)] Signal 9, PID: 25586, TID: 25590, fault addr: 0x0: terminating thread group D0317 18:30:29.581145 431499 task_exit.go:204] [ 25586(1357): 25590(1358)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.581422 431499 task_exit.go:204] [ 25586(1357): 25586(1357)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.587296 431499 usertrap_amd64.go:212] [ 25588(2785): 25588(2785)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.587391 431499 usertrap_amd64.go:122] [ 25588(2785): 25588(2785)] Allocate a new trap: 0xc000046660 43 D0317 18:30:29.587492 431499 usertrap_amd64.go:225] [ 25588(2785): 25588(2785)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.590758 431499 task_exit.go:204] [ 25586(1357): 25590(1358)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.591000 431499 task_exit.go:204] [ 25586(1357): 25590(1358)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.591184 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.591423 431499 task_exit.go:204] [ 25586(1357): 25586(1357)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) D0317 18:30:29.597034 431499 task_exit.go:204] [ 25588(2785): 25588(2785)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.597881 431499 task_signals.go:204] [ 25588(2785): 25592(2786)] Signal 9, PID: 25588, TID: 25592, fault addr: 0x0: terminating thread group D0317 18:30:29.598017 431499 task_exit.go:204] [ 25588(2785): 25592(2786)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.598345 431499 task_exit.go:204] [ 25588(2785): 25588(2785)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.605843 431499 task_exit.go:204] [ 25588(2785): 25592(2786)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.606022 431499 task_exit.go:204] [ 25588(2785): 25592(2786)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.606228 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.606418 431499 task_exit.go:204] [ 25588(2785): 25588(2785)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.607971 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.608097 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 37 D0317 18:30:29.608202 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 18:30:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x11, 0x0, 0x0, &(0x7f0000000040)) D0317 18:30:29.626852 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.626972 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 36 D0317 18:30:29.627995 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.628043 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.628415 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 38 D0317 18:30:29.628584 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.633494 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.633643 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 37 D0317 18:30:29.633727 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.635563 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.635730 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 37 D0317 18:30:29.636624 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.641049 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.641193 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 38 D0317 18:30:29.641368 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.645427 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.645518 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 39 D0317 18:30:29.645596 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.647472 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.647564 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 40 D0317 18:30:29.647672 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.648042 431499 usertrap_amd64.go:212] [ 25591( 152): 25596( 153)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.648167 431499 usertrap_amd64.go:122] [ 25591( 152): 25596( 153)] Allocate a new trap: 0xc002780030 41 D0317 18:30:29.648240 431499 usertrap_amd64.go:225] [ 25591( 152): 25596( 153)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.651491 431499 usertrap_amd64.go:212] [ 25591( 152): 25591( 152)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.651585 431499 usertrap_amd64.go:122] [ 25591( 152): 25591( 152)] Allocate a new trap: 0xc002780030 42 D0317 18:30:29.651700 431499 usertrap_amd64.go:225] [ 25591( 152): 25591( 152)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.655508 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.655661 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 38 D0317 18:30:29.655816 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.659331 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.659570 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 37 D0317 18:30:29.660749 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.664871 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.664945 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 38 D0317 18:30:29.665043 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.669381 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.669491 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 39 D0317 18:30:29.669597 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.671348 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.671425 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 40 D0317 18:30:29.672193 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.675179 431499 usertrap_amd64.go:212] [ 25593( 67): 25597( 68)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.675276 431499 usertrap_amd64.go:122] [ 25593( 67): 25597( 68)] Allocate a new trap: 0xc0040ca060 41 D0317 18:30:29.675368 431499 usertrap_amd64.go:225] [ 25593( 67): 25597( 68)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.676063 431499 task_exit.go:204] [ 25591( 152): 25591( 152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.676312 431499 task_signals.go:204] [ 25591( 152): 25596( 153)] Signal 9, PID: 25591, TID: 25596, fault addr: 0x0: terminating thread group D0317 18:30:29.677348 431499 task_exit.go:204] [ 25591( 152): 25591( 152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.677596 431499 task_exit.go:204] [ 25591( 152): 25596( 153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.679170 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.679272 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 39 D0317 18:30:29.679364 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:29.684677 431499 usertrap_amd64.go:212] [ 25593( 67): 25593( 67)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.684884 431499 usertrap_amd64.go:122] [ 25593( 67): 25593( 67)] Allocate a new trap: 0xc0040ca060 42 D0317 18:30:29.685337 431499 usertrap_amd64.go:225] [ 25593( 67): 25593( 67)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.687101 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.687260 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 39 D0317 18:30:29.687374 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.687506 431499 task_exit.go:204] [ 25591( 152): 25596( 153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.687571 431499 task_exit.go:204] [ 25591( 152): 25596( 153)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.687856 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.689740 431499 task_exit.go:204] [ 25591( 152): 25591( 152)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000005c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@tclass={{0x14}}], 0x18}}], 0x1, 0x0) D0317 18:30:29.693754 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:29.693920 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 40 D0317 18:30:29.694092 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:29.696120 431499 task_signals.go:204] [ 25593( 67): 25597( 68)] Signal 9, PID: 25593, TID: 25597, fault addr: 0x0: terminating thread group D0317 18:30:29.696280 431499 task_exit.go:204] [ 25593( 67): 25593( 67)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.696424 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:29.696529 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 41 D0317 18:30:29.696620 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:29.697031 431499 task_exit.go:204] [ 25593( 67): 25593( 67)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.697230 431499 task_exit.go:204] [ 25593( 67): 25597( 68)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.697994 431499 usertrap_amd64.go:212] [ 25594(1359): 25598(1360)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:29.698069 431499 usertrap_amd64.go:122] [ 25594(1359): 25598(1360)] Allocate a new trap: 0xc00628a0c0 42 D0317 18:30:29.698156 431499 usertrap_amd64.go:225] [ 25594(1359): 25598(1360)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:29.701226 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.701303 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 40 D0317 18:30:29.701369 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.703344 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.703492 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 41 D0317 18:30:29.703642 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.704731 431499 usertrap_amd64.go:212] [ 25594(1359): 25594(1359)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:29.704811 431499 usertrap_amd64.go:122] [ 25594(1359): 25594(1359)] Allocate a new trap: 0xc00628a0c0 43 D0317 18:30:29.704915 431499 usertrap_amd64.go:225] [ 25594(1359): 25594(1359)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:29.705458 431499 task_exit.go:204] [ 25593( 67): 25597( 68)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.705526 431499 task_exit.go:204] [ 25593( 67): 25597( 68)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.705625 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.706133 431499 task_exit.go:204] [ 25593( 67): 25593( 67)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 3: request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) D0317 18:30:29.711706 431499 usertrap_amd64.go:212] [ 25595(2787): 25599(2788)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.711866 431499 usertrap_amd64.go:122] [ 25595(2787): 25599(2788)] Allocate a new trap: 0xc004fc60c0 42 D0317 18:30:29.711976 431499 usertrap_amd64.go:225] [ 25595(2787): 25599(2788)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.715230 431499 usertrap_amd64.go:212] [ 25595(2787): 25595(2787)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.715307 431499 usertrap_amd64.go:122] [ 25595(2787): 25595(2787)] Allocate a new trap: 0xc004fc60c0 43 D0317 18:30:29.715393 431499 usertrap_amd64.go:225] [ 25595(2787): 25595(2787)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.718283 431499 task_exit.go:204] [ 25594(1359): 25594(1359)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.719016 431499 task_signals.go:204] [ 25594(1359): 25598(1360)] Signal 9, PID: 25594, TID: 25598, fault addr: 0x0: terminating thread group D0317 18:30:29.719092 431499 task_exit.go:204] [ 25594(1359): 25594(1359)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.719201 431499 task_exit.go:204] [ 25594(1359): 25598(1360)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.726238 431499 task_exit.go:204] [ 25594(1359): 25598(1360)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.726337 431499 task_exit.go:204] [ 25594(1359): 25598(1360)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.726485 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.726858 431499 task_exit.go:204] [ 25594(1359): 25594(1359)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.728602 431499 task_exit.go:204] [ 25595(2787): 25595(2787)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newtaction={0x18, 0x30, 0x30b, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) D0317 18:30:29.729616 431499 task_signals.go:204] [ 25595(2787): 25599(2788)] Signal 9, PID: 25595, TID: 25599, fault addr: 0x0: terminating thread group D0317 18:30:29.729656 431499 task_exit.go:204] [ 25595(2787): 25595(2787)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.729818 431499 task_exit.go:204] [ 25595(2787): 25599(2788)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.738306 431499 task_exit.go:204] [ 25595(2787): 25599(2788)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.738396 431499 task_exit.go:204] [ 25595(2787): 25599(2788)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.738575 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.740730 431499 task_exit.go:204] [ 25595(2787): 25595(2787)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8935, &(0x7f0000000400)) D0317 18:30:29.764049 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.764277 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 36 D0317 18:30:29.765151 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.769928 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.770068 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 37 D0317 18:30:29.770164 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:29.772945 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.773139 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 37 D0317 18:30:29.776243 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.776428 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 36 D0317 18:30:29.777397 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.781134 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.781233 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 37 D0317 18:30:29.781300 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.784050 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.797169 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.797338 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 38 D0317 18:30:29.797412 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.797508 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 38 D0317 18:30:29.797601 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.797609 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.801380 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.801544 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 38 D0317 18:30:29.801724 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.802242 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.802383 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 37 D0317 18:30:29.804089 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.808520 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.808697 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 38 D0317 18:30:29.808790 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.820717 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.820807 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 39 D0317 18:30:29.820907 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.821993 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.822087 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 39 D0317 18:30:29.822231 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.822849 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.822981 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 40 D0317 18:30:29.823089 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.823442 431499 usertrap_amd64.go:212] [ 25600( 154): 25604( 155)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.823540 431499 usertrap_amd64.go:122] [ 25600( 154): 25604( 155)] Allocate a new trap: 0xc00628a2a0 41 D0317 18:30:29.823678 431499 usertrap_amd64.go:225] [ 25600( 154): 25604( 155)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.824560 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.824657 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 39 D0317 18:30:29.824753 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.828023 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.828049 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.828102 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 40 D0317 18:30:29.828172 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 39 D0317 18:30:29.828222 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.828288 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:29.829023 431499 usertrap_amd64.go:212] [ 25601( 69): 25605( 70)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.829199 431499 usertrap_amd64.go:122] [ 25601( 69): 25605( 70)] Allocate a new trap: 0xc0040fc060 41 D0317 18:30:29.829319 431499 usertrap_amd64.go:225] [ 25601( 69): 25605( 70)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.831276 431499 usertrap_amd64.go:212] [ 25600( 154): 25600( 154)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.831337 431499 usertrap_amd64.go:122] [ 25600( 154): 25600( 154)] Allocate a new trap: 0xc00628a2a0 42 D0317 18:30:29.831392 431499 usertrap_amd64.go:225] [ 25600( 154): 25600( 154)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.831646 431499 usertrap_amd64.go:212] [ 25601( 69): 25601( 69)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.831766 431499 usertrap_amd64.go:122] [ 25601( 69): 25601( 69)] Allocate a new trap: 0xc0040fc060 42 D0317 18:30:29.831909 431499 usertrap_amd64.go:225] [ 25601( 69): 25601( 69)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.838025 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.838127 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 40 D0317 18:30:29.838213 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.838273 431499 task_exit.go:204] [ 25601( 69): 25601( 69)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.838456 431499 task_signals.go:204] [ 25601( 69): 25605( 70)] Signal 9, PID: 25601, TID: 25605, fault addr: 0x0: terminating thread group D0317 18:30:29.839508 431499 task_exit.go:204] [ 25601( 69): 25605( 70)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.840172 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:29.840261 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 40 D0317 18:30:29.840369 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:29.846381 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.846465 431499 task_signals.go:204] [ 25600( 154): 25604( 155)] Signal 9, PID: 25600, TID: 25604, fault addr: 0x0: terminating thread group D0317 18:30:29.846463 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 41 D0317 18:30:29.846717 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.847122 431499 task_exit.go:204] [ 25601( 69): 25605( 70)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.847214 431499 task_exit.go:204] [ 25601( 69): 25605( 70)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.847410 431499 task_exit.go:204] [ 25600( 154): 25604( 155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.848728 431499 usertrap_amd64.go:212] [ 25603(2789): 25606(2790)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.848837 431499 usertrap_amd64.go:122] [ 25603(2789): 25606(2790)] Allocate a new trap: 0xc0026c6270 42 D0317 18:30:29.848919 431499 usertrap_amd64.go:225] [ 25603(2789): 25606(2790)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.849074 431499 task_exit.go:204] [ 25600( 154): 25600( 154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.849865 431499 task_exit.go:204] [ 25601( 69): 25601( 69)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.849926 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:29.850010 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 41 D0317 18:30:29.850043 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.850303 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:29.850342 431499 task_exit.go:204] [ 25600( 154): 25604( 155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.850508 431499 task_exit.go:204] [ 25600( 154): 25604( 155)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.850567 431499 usertrap_amd64.go:212] [ 25602(1361): 25607(1362)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:29.850628 431499 usertrap_amd64.go:122] [ 25602(1361): 25607(1362)] Allocate a new trap: 0xc006e64000 42 D0317 18:30:29.850745 431499 usertrap_amd64.go:225] [ 25602(1361): 25607(1362)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:29.851194 431499 task_exit.go:204] [ 25601( 69): 25601( 69)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) D0317 18:30:29.854774 431499 usertrap_amd64.go:212] [ 25602(1361): 25602(1361)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:29.854924 431499 usertrap_amd64.go:122] [ 25602(1361): 25602(1361)] Allocate a new trap: 0xc006e64000 43 D0317 18:30:29.855063 431499 usertrap_amd64.go:225] [ 25602(1361): 25602(1361)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:29.854803 431499 usertrap_amd64.go:212] [ 25603(2789): 25603(2789)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.855433 431499 usertrap_amd64.go:122] [ 25603(2789): 25603(2789)] Allocate a new trap: 0xc0026c6270 43 D0317 18:30:29.855657 431499 usertrap_amd64.go:225] [ 25603(2789): 25603(2789)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.857184 431499 task_exit.go:204] [ 25600( 154): 25600( 154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.857297 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.858388 431499 task_exit.go:204] [ 25600( 154): 25600( 154)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) D0317 18:30:29.874728 431499 task_exit.go:204] [ 25603(2789): 25603(2789)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.875098 431499 task_signals.go:204] [ 25603(2789): 25606(2790)] Signal 9, PID: 25603, TID: 25606, fault addr: 0x0: terminating thread group D0317 18:30:29.875716 431499 task_exit.go:204] [ 25603(2789): 25603(2789)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.876746 431499 task_signals.go:204] [ 25602(1361): 25607(1362)] Signal 9, PID: 25602, TID: 25607, fault addr: 0x0: terminating thread group D0317 18:30:29.876867 431499 task_exit.go:204] [ 25603(2789): 25606(2790)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.876987 431499 task_exit.go:204] [ 25602(1361): 25607(1362)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.877390 431499 task_exit.go:204] [ 25602(1361): 25602(1361)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.879244 431499 task_exit.go:204] [ 25602(1361): 25607(1362)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.879343 431499 task_exit.go:204] [ 25602(1361): 25607(1362)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.885065 431499 task_exit.go:204] [ 25602(1361): 25602(1361)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.885173 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:29.885907 431499 task_exit.go:204] [ 25603(2789): 25606(2790)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.885991 431499 task_exit.go:204] [ 25603(2789): 25606(2790)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.886111 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:29.886411 431499 task_exit.go:204] [ 25603(2789): 25603(2789)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.886835 431499 task_exit.go:204] [ 25602(1361): 25602(1361)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 0: request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) 18:30:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @private1, 0x3}, 0x1c, 0x0}}], 0x1, 0x0) D0317 18:30:29.912270 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:29.912408 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 36 D0317 18:30:29.913702 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:29.918423 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:29.918540 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 36 D0317 18:30:29.919676 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:29.922009 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:29.922114 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 37 D0317 18:30:29.922296 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:29.924071 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:29.924145 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 37 D0317 18:30:29.924261 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:29.929760 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:29.931010 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 37 D0317 18:30:29.933664 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:29.942203 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:29.942267 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 38 D0317 18:30:29.942349 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:29.943999 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:29.944257 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 38 D0317 18:30:29.944379 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:29.945203 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:29.945372 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 37 D0317 18:30:29.949722 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:29.949849 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 38 D0317 18:30:29.949989 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:29.952103 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:29.957011 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:29.957124 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 39 D0317 18:30:29.957220 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:29.959211 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:29.959360 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 40 D0317 18:30:29.959464 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:29.959752 431499 usertrap_amd64.go:212] [ 25608( 71): 25612( 72)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:29.959833 431499 usertrap_amd64.go:122] [ 25608( 71): 25612( 72)] Allocate a new trap: 0xc002304030 41 D0317 18:30:29.959907 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:29.959923 431499 usertrap_amd64.go:225] [ 25608( 71): 25612( 72)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:29.960018 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 38 D0317 18:30:29.962122 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:29.963061 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:29.963132 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 39 D0317 18:30:29.963175 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:29.963221 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 39 D0317 18:30:29.963203 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:29.963281 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:29.965152 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:29.965253 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 40 D0317 18:30:29.965451 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:29.965599 431499 usertrap_amd64.go:212] [ 25608( 71): 25608( 71)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:29.965673 431499 usertrap_amd64.go:122] [ 25608( 71): 25608( 71)] Allocate a new trap: 0xc002304030 42 D0317 18:30:29.965726 431499 usertrap_amd64.go:225] [ 25608( 71): 25608( 71)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:29.965780 431499 usertrap_amd64.go:212] [ 25609( 156): 25613( 157)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:29.966393 431499 usertrap_amd64.go:122] [ 25609( 156): 25613( 157)] Allocate a new trap: 0xc002304060 41 D0317 18:30:29.966516 431499 usertrap_amd64.go:225] [ 25609( 156): 25613( 157)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:29.970436 431499 usertrap_amd64.go:212] [ 25609( 156): 25609( 156)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:29.970497 431499 usertrap_amd64.go:122] [ 25609( 156): 25609( 156)] Allocate a new trap: 0xc002304060 42 D0317 18:30:29.970553 431499 usertrap_amd64.go:225] [ 25609( 156): 25609( 156)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:29.980523 431499 task_exit.go:204] [ 25609( 156): 25609( 156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.981367 431499 task_signals.go:204] [ 25609( 156): 25613( 157)] Signal 9, PID: 25609, TID: 25613, fault addr: 0x0: terminating thread group D0317 18:30:29.981392 431499 task_exit.go:204] [ 25609( 156): 25609( 156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.981566 431499 task_exit.go:204] [ 25609( 156): 25613( 157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.982121 431499 task_exit.go:204] [ 25608( 71): 25608( 71)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.982530 431499 task_signals.go:204] [ 25608( 71): 25612( 72)] Signal 9, PID: 25608, TID: 25612, fault addr: 0x0: terminating thread group D0317 18:30:29.983266 431499 task_exit.go:204] [ 25608( 71): 25608( 71)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.983899 431499 task_exit.go:204] [ 25608( 71): 25612( 72)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:29.988397 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:29.988525 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 40 D0317 18:30:29.988607 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:29.990252 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:29.990337 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 41 D0317 18:30:29.990417 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:29.991332 431499 task_exit.go:204] [ 25609( 156): 25613( 157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.991432 431499 task_exit.go:204] [ 25609( 156): 25613( 157)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.991671 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:29.991340 431499 usertrap_amd64.go:212] [ 25610(2791): 25614(2792)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:29.991906 431499 usertrap_amd64.go:122] [ 25610(2791): 25614(2792)] Allocate a new trap: 0xc006dc8060 42 D0317 18:30:29.992069 431499 usertrap_amd64.go:225] [ 25610(2791): 25614(2792)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:29.992325 431499 task_exit.go:204] [ 25609( 156): 25609( 156)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.994574 431499 usertrap_amd64.go:212] [ 25610(2791): 25610(2791)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:29.994689 431499 usertrap_amd64.go:122] [ 25610(2791): 25610(2791)] Allocate a new trap: 0xc006dc8060 43 D0317 18:30:29.994812 431499 usertrap_amd64.go:225] [ 25610(2791): 25610(2791)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:29.995907 431499 task_exit.go:204] [ 25608( 71): 25612( 72)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:29.995998 431499 task_exit.go:204] [ 25608( 71): 25612( 72)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:29.996129 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:29.996359 431499 task_exit.go:204] [ 25608( 71): 25608( 71)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) D0317 18:30:29.998567 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:29.998686 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 39 D0317 18:30:29.998820 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) 18:30:30 executing program 3: socket$inet(0x2, 0xa, 0x0) socketpair(0x11, 0x3, 0x0, &(0x7f0000001140)) D0317 18:30:30.003132 431499 task_exit.go:204] [ 25610(2791): 25610(2791)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.003420 431499 task_signals.go:204] [ 25610(2791): 25614(2792)] Signal 9, PID: 25610, TID: 25614, fault addr: 0x0: terminating thread group D0317 18:30:30.003961 431499 task_exit.go:204] [ 25610(2791): 25614(2792)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.004502 431499 task_exit.go:204] [ 25610(2791): 25610(2791)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.010268 431499 task_exit.go:204] [ 25610(2791): 25614(2792)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.010392 431499 task_exit.go:204] [ 25610(2791): 25614(2792)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.010496 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.010668 431499 task_exit.go:204] [ 25610(2791): 25610(2791)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.012681 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.012739 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 40 D0317 18:30:30.012797 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) 18:30:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8931, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:30.014327 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.014471 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 41 D0317 18:30:30.014582 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.015173 431499 usertrap_amd64.go:212] [ 25611(1363): 25615(1364)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.015249 431499 usertrap_amd64.go:122] [ 25611(1363): 25615(1364)] Allocate a new trap: 0xc004fc62a0 42 D0317 18:30:30.015322 431499 usertrap_amd64.go:225] [ 25611(1363): 25615(1364)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.019913 431499 usertrap_amd64.go:212] [ 25611(1363): 25611(1363)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.020019 431499 usertrap_amd64.go:122] [ 25611(1363): 25611(1363)] Allocate a new trap: 0xc004fc62a0 43 D0317 18:30:30.020090 431499 usertrap_amd64.go:225] [ 25611(1363): 25611(1363)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.025048 431499 task_exit.go:204] [ 25611(1363): 25611(1363)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.025904 431499 task_exit.go:204] [ 25611(1363): 25611(1363)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.026192 431499 task_signals.go:204] [ 25611(1363): 25615(1364)] Signal 9, PID: 25611, TID: 25615, fault addr: 0x0: terminating thread group D0317 18:30:30.026322 431499 task_exit.go:204] [ 25611(1363): 25615(1364)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.033893 431499 task_exit.go:204] [ 25611(1363): 25615(1364)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.033992 431499 task_exit.go:204] [ 25611(1363): 25615(1364)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.034093 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.034598 431499 task_exit.go:204] [ 25611(1363): 25611(1363)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private2}}) D0317 18:30:30.051708 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.052003 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 36 D0317 18:30:30.053063 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.058319 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.058606 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 37 D0317 18:30:30.059503 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.063300 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.063470 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 38 D0317 18:30:30.063594 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.064759 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.064851 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 37 D0317 18:30:30.064917 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.075692 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.075954 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 36 D0317 18:30:30.077034 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.083182 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.083370 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 37 D0317 18:30:30.083506 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.083490 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.084299 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 39 D0317 18:30:30.084700 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.090663 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.090775 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 38 D0317 18:30:30.090884 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.093500 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.093632 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 37 D0317 18:30:30.099812 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.099918 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 39 D0317 18:30:30.099995 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:30.102546 431499 usertrap_amd64.go:212] [ 25616( 73): 25620( 74)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.102635 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.102672 431499 usertrap_amd64.go:122] [ 25616( 73): 25620( 74)] Allocate a new trap: 0xc0040fc240 40 D0317 18:30:30.102803 431499 usertrap_amd64.go:225] [ 25616( 73): 25620( 74)] Apply the binary patch addr 55a8b05c0320 trap addr 64c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.102967 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.103082 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 40 D0317 18:30:30.103202 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.103217 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.103331 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 41 D0317 18:30:30.103677 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b05c0c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.105144 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.105248 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 41 D0317 18:30:30.105335 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.105985 431499 usertrap_amd64.go:212] [ 25617(2793): 25621(2794)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.106054 431499 usertrap_amd64.go:122] [ 25617(2793): 25621(2794)] Allocate a new trap: 0xc0023040f0 42 D0317 18:30:30.106177 431499 usertrap_amd64.go:225] [ 25617(2793): 25621(2794)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.106941 431499 usertrap_amd64.go:212] [ 25616( 73): 25616( 73)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.107124 431499 usertrap_amd64.go:122] [ 25616( 73): 25616( 73)] Allocate a new trap: 0xc0040fc240 42 D0317 18:30:30.107217 431499 usertrap_amd64.go:225] [ 25616( 73): 25616( 73)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.109282 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.109364 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 38 D0317 18:30:30.109450 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.110199 431499 usertrap_amd64.go:212] [ 25617(2793): 25617(2793)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.110357 431499 usertrap_amd64.go:122] [ 25617(2793): 25617(2793)] Allocate a new trap: 0xc0023040f0 43 D0317 18:30:30.110643 431499 usertrap_amd64.go:225] [ 25617(2793): 25617(2793)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.110960 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.111048 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 38 D0317 18:30:30.111171 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.114836 431499 task_exit.go:204] [ 25616( 73): 25616( 73)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.115678 431499 task_signals.go:204] [ 25616( 73): 25620( 74)] Signal 9, PID: 25616, TID: 25620, fault addr: 0x0: terminating thread group D0317 18:30:30.115906 431499 task_exit.go:204] [ 25616( 73): 25620( 74)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.116266 431499 task_exit.go:204] [ 25616( 73): 25616( 73)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.119874 431499 task_exit.go:204] [ 25617(2793): 25617(2793)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.120080 431499 task_signals.go:204] [ 25617(2793): 25621(2794)] Signal 9, PID: 25617, TID: 25621, fault addr: 0x0: terminating thread group D0317 18:30:30.120700 431499 task_exit.go:204] [ 25617(2793): 25617(2793)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.120852 431499 task_exit.go:204] [ 25617(2793): 25621(2794)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.124105 431499 task_exit.go:204] [ 25616( 73): 25620( 74)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.124289 431499 task_exit.go:204] [ 25616( 73): 25620( 74)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.126240 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.126577 431499 task_exit.go:204] [ 25616( 73): 25616( 73)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.128023 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.128108 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 39 D0317 18:30:30.128194 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) 18:30:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1d}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x8000) D0317 18:30:30.129314 431499 task_exit.go:204] [ 25617(2793): 25621(2794)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.129478 431499 task_exit.go:204] [ 25617(2793): 25621(2794)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.129629 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.130459 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.130561 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 39 D0317 18:30:30.130590 431499 task_exit.go:204] [ 25617(2793): 25617(2793)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.130668 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) 18:30:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2, 0x1}}) D0317 18:30:30.132479 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.132546 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 40 D0317 18:30:30.132646 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.133591 431499 usertrap_amd64.go:212] [ 25618( 158): 25622( 159)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.133706 431499 usertrap_amd64.go:122] [ 25618( 158): 25622( 159)] Allocate a new trap: 0xc006dc80c0 41 D0317 18:30:30.133882 431499 usertrap_amd64.go:225] [ 25618( 158): 25622( 159)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.136841 431499 usertrap_amd64.go:212] [ 25618( 158): 25618( 158)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.136922 431499 usertrap_amd64.go:122] [ 25618( 158): 25618( 158)] Allocate a new trap: 0xc006dc80c0 42 D0317 18:30:30.137033 431499 usertrap_amd64.go:225] [ 25618( 158): 25618( 158)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.140851 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.140948 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 40 D0317 18:30:30.141022 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.142832 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.143012 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 41 D0317 18:30:30.143144 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.143252 431499 task_exit.go:204] [ 25618( 158): 25618( 158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.143372 431499 usertrap_amd64.go:212] [ 25619(1365): 25623(1366)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.143443 431499 usertrap_amd64.go:122] [ 25619(1365): 25623(1366)] Allocate a new trap: 0xc0040fc2a0 42 D0317 18:30:30.143537 431499 usertrap_amd64.go:225] [ 25619(1365): 25623(1366)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.144104 431499 task_signals.go:204] [ 25618( 158): 25622( 159)] Signal 9, PID: 25618, TID: 25622, fault addr: 0x0: terminating thread group D0317 18:30:30.144190 431499 task_exit.go:204] [ 25618( 158): 25618( 158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.144518 431499 task_exit.go:204] [ 25618( 158): 25622( 159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.149119 431499 usertrap_amd64.go:212] [ 25619(1365): 25619(1365)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.149204 431499 usertrap_amd64.go:122] [ 25619(1365): 25619(1365)] Allocate a new trap: 0xc0040fc2a0 43 D0317 18:30:30.149278 431499 usertrap_amd64.go:225] [ 25619(1365): 25619(1365)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.152981 431499 task_exit.go:204] [ 25618( 158): 25622( 159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.153907 431499 task_exit.go:204] [ 25618( 158): 25622( 159)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.154014 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.155635 431499 task_exit.go:204] [ 25619(1365): 25619(1365)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.155823 431499 task_exit.go:204] [ 25618( 158): 25618( 158)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.156154 431499 task_signals.go:204] [ 25619(1365): 25623(1366)] Signal 9, PID: 25619, TID: 25623, fault addr: 0x0: terminating thread group D0317 18:30:30.156261 431499 task_exit.go:204] [ 25619(1365): 25623(1366)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.156895 431499 task_exit.go:204] [ 25619(1365): 25619(1365)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 18:30:30 executing program 1: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000011c0), &(0x7f0000001200)={'fscrypt:', @desc1}, &(0x7f0000001240)={0x0, "e30e8094597f3b6f7d123d7a96ea192a00a134d577efb8fe67cc048e33abab4fdefbf88976d13231a3c0ca0f2d7ab01a9e4404425dbf856d56f66d5416b6801c"}, 0x48, 0xfffffffffffffffe) D0317 18:30:30.164500 431499 task_exit.go:204] [ 25619(1365): 25623(1366)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.164628 431499 task_exit.go:204] [ 25619(1365): 25623(1366)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.164752 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.165118 431499 task_exit.go:204] [ 25619(1365): 25619(1365)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001a00)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x18112, 0x0) D0317 18:30:30.175226 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.175331 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 36 D0317 18:30:30.184386 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.186740 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.186850 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 37 D0317 18:30:30.187662 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.189453 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.189528 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 37 D0317 18:30:30.189599 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.194278 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.194391 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 38 D0317 18:30:30.194531 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.223545 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.223660 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 38 D0317 18:30:30.223812 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.225585 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.225725 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 36 D0317 18:30:30.226629 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.229927 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.230057 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 37 D0317 18:30:30.230889 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.231267 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.231361 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 37 D0317 18:30:30.231522 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.234615 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.234676 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 38 D0317 18:30:30.234811 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.237090 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.237174 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 39 D0317 18:30:30.237297 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:30.238922 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.239054 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 40 D0317 18:30:30.239327 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.239741 431499 usertrap_amd64.go:212] [ 25624( 75): 25628( 76)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.239812 431499 usertrap_amd64.go:122] [ 25624( 75): 25628( 76)] Allocate a new trap: 0xc006dc8120 41 D0317 18:30:30.239916 431499 usertrap_amd64.go:225] [ 25624( 75): 25628( 76)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.244235 431499 usertrap_amd64.go:212] [ 25624( 75): 25624( 75)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.244412 431499 usertrap_amd64.go:122] [ 25624( 75): 25624( 75)] Allocate a new trap: 0xc006dc8120 42 D0317 18:30:30.244632 431499 usertrap_amd64.go:225] [ 25624( 75): 25624( 75)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.251318 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.251423 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 38 D0317 18:30:30.251492 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.255514 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.255713 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 39 D0317 18:30:30.255987 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.260720 431499 task_exit.go:204] [ 25624( 75): 25624( 75)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.261435 431499 task_signals.go:204] [ 25624( 75): 25628( 76)] Signal 9, PID: 25624, TID: 25628, fault addr: 0x0: terminating thread group D0317 18:30:30.261459 431499 task_exit.go:204] [ 25624( 75): 25624( 75)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.261717 431499 task_exit.go:204] [ 25624( 75): 25628( 76)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.265595 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.265657 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 39 D0317 18:30:30.265733 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:30.267509 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.267652 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 40 D0317 18:30:30.267734 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.267875 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.267979 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 40 D0317 18:30:30.268053 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.268370 431499 usertrap_amd64.go:212] [ 25627( 160): 25629( 161)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.268485 431499 usertrap_amd64.go:122] [ 25627( 160): 25629( 161)] Allocate a new trap: 0xc0000460c0 41 D0317 18:30:30.268558 431499 usertrap_amd64.go:225] [ 25627( 160): 25629( 161)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.269036 431499 task_exit.go:204] [ 25624( 75): 25628( 76)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.269197 431499 task_exit.go:204] [ 25624( 75): 25628( 76)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.269421 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.269867 431499 task_exit.go:204] [ 25624( 75): 25624( 75)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) D0317 18:30:30.272280 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.272406 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 41 D0317 18:30:30.272491 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.272682 431499 usertrap_amd64.go:212] [ 25625(2795): 25630(2796)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.272818 431499 usertrap_amd64.go:122] [ 25625(2795): 25630(2796)] Allocate a new trap: 0xc003cb2030 42 D0317 18:30:30.273068 431499 usertrap_amd64.go:225] [ 25625(2795): 25630(2796)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.272768 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.273579 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 39 D0317 18:30:30.273821 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.274401 431499 usertrap_amd64.go:212] [ 25627( 160): 25627( 160)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.274672 431499 usertrap_amd64.go:122] [ 25627( 160): 25627( 160)] Allocate a new trap: 0xc0000460c0 42 D0317 18:30:30.275037 431499 usertrap_amd64.go:225] [ 25627( 160): 25627( 160)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.282273 431499 usertrap_amd64.go:212] [ 25625(2795): 25625(2795)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.282354 431499 usertrap_amd64.go:122] [ 25625(2795): 25625(2795)] Allocate a new trap: 0xc003cb2030 43 D0317 18:30:30.282476 431499 usertrap_amd64.go:225] [ 25625(2795): 25625(2795)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.285825 431499 task_exit.go:204] [ 25627( 160): 25627( 160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.285998 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.286582 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 40 D0317 18:30:30.286788 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.287056 431499 task_exit.go:204] [ 25627( 160): 25627( 160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.287051 431499 task_signals.go:204] [ 25627( 160): 25629( 161)] Signal 9, PID: 25627, TID: 25629, fault addr: 0x0: terminating thread group D0317 18:30:30.287198 431499 task_exit.go:204] [ 25627( 160): 25629( 161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.289624 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.289701 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 41 D0317 18:30:30.290005 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.290170 431499 task_exit.go:204] [ 25625(2795): 25625(2795)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.290793 431499 task_exit.go:204] [ 25625(2795): 25625(2795)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.290996 431499 task_signals.go:204] [ 25625(2795): 25630(2796)] Signal 9, PID: 25625, TID: 25630, fault addr: 0x0: terminating thread group D0317 18:30:30.291110 431499 task_exit.go:204] [ 25625(2795): 25630(2796)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.291218 431499 usertrap_amd64.go:212] [ 25626(1367): 25631(1368)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.291274 431499 usertrap_amd64.go:122] [ 25626(1367): 25631(1368)] Allocate a new trap: 0xc0040ca180 42 D0317 18:30:30.291350 431499 usertrap_amd64.go:225] [ 25626(1367): 25631(1368)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.298263 431499 usertrap_amd64.go:212] [ 25626(1367): 25626(1367)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.298365 431499 usertrap_amd64.go:122] [ 25626(1367): 25626(1367)] Allocate a new trap: 0xc0040ca180 43 D0317 18:30:30.298441 431499 usertrap_amd64.go:225] [ 25626(1367): 25626(1367)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.299379 431499 task_exit.go:204] [ 25627( 160): 25629( 161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.299494 431499 task_exit.go:204] [ 25627( 160): 25629( 161)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.299647 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.300471 431499 task_exit.go:204] [ 25625(2795): 25630(2796)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.300559 431499 task_exit.go:204] [ 25625(2795): 25630(2796)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.300697 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.301126 431499 task_exit.go:204] [ 25627( 160): 25627( 160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.301425 431499 task_exit.go:204] [ 25625(2795): 25625(2795)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 18:30:30 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)={0x0, "98f5698db6210b0784d5d963f8a67fd0015132e76a60a7520bac253f81c897bab47b0a891a609fb071a914651c6a868333c074e9d93b1847c41c307eb2669972"}, 0x48, r0) D0317 18:30:30.316180 431499 task_exit.go:204] [ 25626(1367): 25626(1367)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.317090 431499 task_signals.go:204] [ 25626(1367): 25631(1368)] Signal 9, PID: 25626, TID: 25631, fault addr: 0x0: terminating thread group D0317 18:30:30.317252 431499 task_exit.go:204] [ 25626(1367): 25626(1367)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.317386 431499 task_exit.go:204] [ 25626(1367): 25631(1368)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.325463 431499 task_exit.go:204] [ 25626(1367): 25631(1368)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.325594 431499 task_exit.go:204] [ 25626(1367): 25631(1368)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.325700 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.326553 431499 task_exit.go:204] [ 25626(1367): 25626(1367)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)='7', 0x1, 0xfffffffffffffffe) D0317 18:30:30.342152 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.342281 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 36 D0317 18:30:30.343216 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.349179 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.349263 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 37 D0317 18:30:30.349420 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.365946 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.366100 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 37 D0317 18:30:30.367262 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.370989 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.371116 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 38 D0317 18:30:30.371203 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.374928 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.375010 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 37 D0317 18:30:30.375660 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.380285 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.380373 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 38 D0317 18:30:30.380476 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.381338 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.381473 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 38 D0317 18:30:30.382739 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.392093 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.392637 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 36 D0317 18:30:30.392902 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.393023 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 39 D0317 18:30:30.393137 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:30.393847 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.395178 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.395259 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 40 D0317 18:30:30.395375 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.396490 431499 usertrap_amd64.go:212] [ 25632( 77): 25636( 78)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.396677 431499 usertrap_amd64.go:122] [ 25632( 77): 25636( 78)] Allocate a new trap: 0xc006dc81b0 41 D0317 18:30:30.396859 431499 usertrap_amd64.go:225] [ 25632( 77): 25636( 78)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.404170 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.404342 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 37 D0317 18:30:30.404494 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.404966 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.405042 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 39 D0317 18:30:30.405073 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.405268 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.405403 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 39 D0317 18:30:30.405604 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.418115 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.418230 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 40 D0317 18:30:30.418321 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.420669 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.420777 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 41 D0317 18:30:30.420840 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.421111 431499 usertrap_amd64.go:212] [ 25635(1369): 25637(1370)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.421188 431499 usertrap_amd64.go:122] [ 25635(1369): 25637(1370)] Allocate a new trap: 0xc0040ca210 42 D0317 18:30:30.421310 431499 usertrap_amd64.go:225] [ 25635(1369): 25637(1370)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.421917 431499 usertrap_amd64.go:212] [ 25632( 77): 25632( 77)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.421999 431499 usertrap_amd64.go:122] [ 25632( 77): 25632( 77)] Allocate a new trap: 0xc006dc81b0 42 D0317 18:30:30.422124 431499 usertrap_amd64.go:225] [ 25632( 77): 25632( 77)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.423325 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.423414 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 40 D0317 18:30:30.423528 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.424312 431499 usertrap_amd64.go:212] [ 25635(1369): 25635(1369)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.424366 431499 usertrap_amd64.go:122] [ 25635(1369): 25635(1369)] Allocate a new trap: 0xc0040ca210 43 D0317 18:30:30.424462 431499 usertrap_amd64.go:225] [ 25635(1369): 25635(1369)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.425202 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.425285 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 41 D0317 18:30:30.425362 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.426136 431499 usertrap_amd64.go:212] [ 25633(2797): 25638(2798)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.426203 431499 usertrap_amd64.go:122] [ 25633(2797): 25638(2798)] Allocate a new trap: 0xc006dc8210 42 D0317 18:30:30.426304 431499 usertrap_amd64.go:225] [ 25633(2797): 25638(2798)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.429049 431499 usertrap_amd64.go:212] [ 25633(2797): 25633(2797)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.429203 431499 usertrap_amd64.go:122] [ 25633(2797): 25633(2797)] Allocate a new trap: 0xc006dc8210 43 D0317 18:30:30.429386 431499 usertrap_amd64.go:225] [ 25633(2797): 25633(2797)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.430536 431499 task_exit.go:204] [ 25635(1369): 25635(1369)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.431091 431499 task_exit.go:204] [ 25635(1369): 25635(1369)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.431083 431499 task_signals.go:204] [ 25635(1369): 25637(1370)] Signal 9, PID: 25635, TID: 25637, fault addr: 0x0: terminating thread group D0317 18:30:30.431266 431499 task_exit.go:204] [ 25635(1369): 25637(1370)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.432169 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.432319 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 38 D0317 18:30:30.432425 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.433084 431499 task_exit.go:204] [ 25632( 77): 25632( 77)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.433761 431499 task_signals.go:204] [ 25632( 77): 25636( 78)] Signal 9, PID: 25632, TID: 25636, fault addr: 0x0: terminating thread group D0317 18:30:30.433884 431499 task_exit.go:204] [ 25632( 77): 25632( 77)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.434212 431499 task_exit.go:204] [ 25632( 77): 25636( 78)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.438114 431499 task_exit.go:204] [ 25635(1369): 25637(1370)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.438211 431499 task_exit.go:204] [ 25635(1369): 25637(1370)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.438324 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.438109 431499 task_signals.go:204] [ 25633(2797): 25638(2798)] Signal 9, PID: 25633, TID: 25638, fault addr: 0x0: terminating thread group D0317 18:30:30.438499 431499 task_exit.go:204] [ 25635(1369): 25635(1369)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.438786 431499 task_exit.go:204] [ 25633(2797): 25633(2797)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.439378 431499 task_exit.go:204] [ 25633(2797): 25633(2797)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.439523 431499 task_exit.go:204] [ 25633(2797): 25638(2798)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.441133 431499 task_exit.go:204] [ 25632( 77): 25636( 78)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.441246 431499 task_exit.go:204] [ 25632( 77): 25636( 78)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) D0317 18:30:30.441436 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.441637 431499 task_exit.go:204] [ 25632( 77): 25632( 77)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 3: socketpair(0x22, 0x2, 0x4, &(0x7f0000000740)) D0317 18:30:30.446366 431499 task_exit.go:204] [ 25633(2797): 25638(2798)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.446496 431499 task_exit.go:204] [ 25633(2797): 25638(2798)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.446650 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.447052 431499 task_exit.go:204] [ 25633(2797): 25633(2797)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) D0317 18:30:30.453103 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.453169 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 39 D0317 18:30:30.453250 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:30.454676 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.454756 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 40 D0317 18:30:30.454845 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.455207 431499 usertrap_amd64.go:212] [ 25634( 162): 25639( 163)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.455313 431499 usertrap_amd64.go:122] [ 25634( 162): 25639( 163)] Allocate a new trap: 0xc000046120 41 D0317 18:30:30.455386 431499 usertrap_amd64.go:225] [ 25634( 162): 25639( 163)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.460834 431499 usertrap_amd64.go:212] [ 25634( 162): 25634( 162)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.460911 431499 usertrap_amd64.go:122] [ 25634( 162): 25634( 162)] Allocate a new trap: 0xc000046120 42 D0317 18:30:30.460984 431499 usertrap_amd64.go:225] [ 25634( 162): 25634( 162)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.469050 431499 task_exit.go:204] [ 25634( 162): 25634( 162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.469724 431499 task_signals.go:204] [ 25634( 162): 25639( 163)] Signal 9, PID: 25634, TID: 25639, fault addr: 0x0: terminating thread group D0317 18:30:30.469835 431499 task_exit.go:204] [ 25634( 162): 25634( 162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.470014 431499 task_exit.go:204] [ 25634( 162): 25639( 163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.478164 431499 task_exit.go:204] [ 25634( 162): 25639( 163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.478237 431499 task_exit.go:204] [ 25634( 162): 25639( 163)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.478345 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.478924 431499 task_exit.go:204] [ 25634( 162): 25634( 162)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000ac0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='8'], 0x38}}], 0x1, 0x0) D0317 18:30:30.484640 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.484738 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 37 D0317 18:30:30.485622 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.486795 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.486930 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 36 D0317 18:30:30.488058 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.490038 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.490203 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 38 D0317 18:30:30.490287 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.491594 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.491776 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 37 D0317 18:30:30.492606 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.493797 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.493893 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 37 D0317 18:30:30.493992 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.497183 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.497284 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 38 D0317 18:30:30.497371 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.504133 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.504196 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 39 D0317 18:30:30.504280 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.511180 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.511264 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 38 D0317 18:30:30.511339 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.512813 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.512889 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 40 D0317 18:30:30.513188 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.515088 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.515265 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 41 D0317 18:30:30.515368 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.515681 431499 usertrap_amd64.go:212] [ 25642(2799): 25643(2800)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.515804 431499 usertrap_amd64.go:122] [ 25642(2799): 25643(2800)] Allocate a new trap: 0xc0040ca390 42 D0317 18:30:30.516019 431499 usertrap_amd64.go:225] [ 25642(2799): 25643(2800)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.516659 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.516771 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 39 D0317 18:30:30.516864 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.520814 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.520879 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 39 D0317 18:30:30.520951 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:30.523161 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.523269 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 40 D0317 18:30:30.523350 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.523535 431499 usertrap_amd64.go:212] [ 25641( 79): 25645( 80)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.523659 431499 usertrap_amd64.go:122] [ 25641( 79): 25645( 80)] Allocate a new trap: 0xc0040ca270 41 D0317 18:30:30.523736 431499 usertrap_amd64.go:225] [ 25641( 79): 25645( 80)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.525314 431499 usertrap_amd64.go:212] [ 25641( 79): 25641( 79)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.525391 431499 usertrap_amd64.go:122] [ 25641( 79): 25641( 79)] Allocate a new trap: 0xc0040ca270 42 D0317 18:30:30.525476 431499 usertrap_amd64.go:225] [ 25641( 79): 25641( 79)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.525792 431499 usertrap_amd64.go:212] [ 25642(2799): 25642(2799)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.525859 431499 usertrap_amd64.go:122] [ 25642(2799): 25642(2799)] Allocate a new trap: 0xc0040ca390 43 D0317 18:30:30.525927 431499 usertrap_amd64.go:225] [ 25642(2799): 25642(2799)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.528349 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.528915 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 40 D0317 18:30:30.529076 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.530509 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.530613 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 41 D0317 18:30:30.530680 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.531399 431499 usertrap_amd64.go:212] [ 25640(1371): 25646(1372)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.531474 431499 usertrap_amd64.go:122] [ 25640(1371): 25646(1372)] Allocate a new trap: 0xc0040ca240 42 D0317 18:30:30.531695 431499 usertrap_amd64.go:225] [ 25640(1371): 25646(1372)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.533116 431499 task_exit.go:204] [ 25641( 79): 25641( 79)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.533348 431499 task_signals.go:204] [ 25642(2799): 25643(2800)] Signal 9, PID: 25642, TID: 25643, fault addr: 0x0: terminating thread group D0317 18:30:30.533729 431499 task_signals.go:204] [ 25641( 79): 25645( 80)] Signal 9, PID: 25641, TID: 25645, fault addr: 0x0: terminating thread group D0317 18:30:30.533821 431499 task_exit.go:204] [ 25641( 79): 25641( 79)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.533959 431499 task_exit.go:204] [ 25642(2799): 25643(2800)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.534495 431499 task_exit.go:204] [ 25642(2799): 25643(2800)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.534577 431499 task_exit.go:204] [ 25642(2799): 25643(2800)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.534848 431499 task_exit.go:204] [ 25642(2799): 25642(2799)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.535129 431499 task_exit.go:204] [ 25641( 79): 25645( 80)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.537419 431499 usertrap_amd64.go:212] [ 25640(1371): 25640(1371)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.537503 431499 usertrap_amd64.go:122] [ 25640(1371): 25640(1371)] Allocate a new trap: 0xc0040ca240 43 D0317 18:30:30.537607 431499 usertrap_amd64.go:225] [ 25640(1371): 25640(1371)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.542992 431499 task_exit.go:204] [ 25642(2799): 25642(2799)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.543117 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.543946 431499 task_exit.go:204] [ 25642(2799): 25642(2799)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.544392 431499 task_exit.go:204] [ 25641( 79): 25645( 80)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.544502 431499 task_exit.go:204] [ 25641( 79): 25645( 80)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.545000 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 18:30:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) D0317 18:30:30.545359 431499 task_exit.go:204] [ 25641( 79): 25641( 79)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@multicast, @link_local, @empty, @random="069d72244a77"]}) D0317 18:30:30.548966 431499 task_exit.go:204] [ 25640(1371): 25640(1371)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.549537 431499 task_exit.go:204] [ 25640(1371): 25640(1371)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.549543 431499 task_signals.go:204] [ 25640(1371): 25646(1372)] Signal 9, PID: 25640, TID: 25646, fault addr: 0x0: terminating thread group D0317 18:30:30.549658 431499 task_exit.go:204] [ 25640(1371): 25646(1372)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.556920 431499 task_exit.go:204] [ 25640(1371): 25646(1372)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.557152 431499 task_exit.go:204] [ 25640(1371): 25646(1372)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.557288 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.557856 431499 task_exit.go:204] [ 25640(1371): 25640(1371)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.558999 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.559187 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 36 18:30:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@local}) D0317 18:30:30.560664 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.565988 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.566077 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 37 D0317 18:30:30.566163 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.573725 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.573895 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 37 D0317 18:30:30.575017 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.586450 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.586525 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 38 D0317 18:30:30.586658 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.587831 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.587949 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 38 D0317 18:30:30.588096 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.597518 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.597619 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 39 D0317 18:30:30.597725 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:30.599294 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.599488 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.599509 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 36 D0317 18:30:30.599567 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 40 D0317 18:30:30.599738 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.600646 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.600703 431499 usertrap_amd64.go:212] [ 25644( 164): 25650( 165)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.600772 431499 usertrap_amd64.go:122] [ 25644( 164): 25650( 165)] Allocate a new trap: 0xc0026c62a0 41 D0317 18:30:30.600851 431499 usertrap_amd64.go:225] [ 25644( 164): 25650( 165)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.603048 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.603142 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 39 D0317 18:30:30.603213 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.605351 431499 usertrap_amd64.go:212] [ 25644( 164): 25644( 164)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.605494 431499 usertrap_amd64.go:122] [ 25644( 164): 25644( 164)] Allocate a new trap: 0xc0026c62a0 42 D0317 18:30:30.605660 431499 usertrap_amd64.go:225] [ 25644( 164): 25644( 164)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.612540 431499 task_exit.go:204] [ 25644( 164): 25644( 164)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.613134 431499 task_signals.go:204] [ 25644( 164): 25650( 165)] Signal 9, PID: 25644, TID: 25650, fault addr: 0x0: terminating thread group D0317 18:30:30.613918 431499 task_exit.go:204] [ 25644( 164): 25644( 164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.614195 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.614275 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 40 D0317 18:30:30.614325 431499 task_exit.go:204] [ 25644( 164): 25650( 165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.614375 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.614599 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.614720 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 37 D0317 18:30:30.614829 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.616426 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.616522 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 41 D0317 18:30:30.616635 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.617946 431499 usertrap_amd64.go:212] [ 25647(2801): 25651(2802)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.618037 431499 usertrap_amd64.go:122] [ 25647(2801): 25651(2802)] Allocate a new trap: 0xc0067dc2d0 42 D0317 18:30:30.618305 431499 usertrap_amd64.go:225] [ 25647(2801): 25651(2802)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.621490 431499 usertrap_amd64.go:212] [ 25647(2801): 25647(2801)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.621613 431499 usertrap_amd64.go:122] [ 25647(2801): 25647(2801)] Allocate a new trap: 0xc0067dc2d0 43 D0317 18:30:30.621598 431499 task_exit.go:204] [ 25644( 164): 25650( 165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.621707 431499 task_exit.go:204] [ 25644( 164): 25650( 165)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.621926 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.621723 431499 usertrap_amd64.go:225] [ 25647(2801): 25647(2801)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.622357 431499 task_exit.go:204] [ 25644( 164): 25644( 164)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.622712 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.622824 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 37 D0317 18:30:30.623845 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) 18:30:30 executing program 1: add_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) D0317 18:30:30.629198 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.629271 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 38 D0317 18:30:30.629379 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.630489 431499 task_exit.go:204] [ 25647(2801): 25647(2801)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.630775 431499 task_signals.go:204] [ 25647(2801): 25651(2802)] Signal 9, PID: 25647, TID: 25651, fault addr: 0x0: terminating thread group D0317 18:30:30.631497 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.631644 431499 task_exit.go:204] [ 25647(2801): 25651(2802)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.631677 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 38 D0317 18:30:30.631784 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.632115 431499 task_exit.go:204] [ 25647(2801): 25647(2801)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.638470 431499 task_exit.go:204] [ 25647(2801): 25651(2802)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.638614 431499 task_exit.go:204] [ 25647(2801): 25651(2802)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.638921 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.639324 431499 task_exit.go:204] [ 25647(2801): 25647(2801)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.643201 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.643265 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 39 D0317 18:30:30.643432 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) 18:30:30 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000740)={0x4c, 0x0, &(0x7f0000000540)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000640)="8f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000009c0)={0x44, 0x0, &(0x7f0000000900)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) D0317 18:30:30.645457 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.645635 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 40 D0317 18:30:30.645780 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.646030 431499 usertrap_amd64.go:212] [ 25648( 81): 25652( 82)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.646164 431499 usertrap_amd64.go:122] [ 25648( 81): 25652( 82)] Allocate a new trap: 0xc00628a5a0 41 D0317 18:30:30.646343 431499 usertrap_amd64.go:225] [ 25648( 81): 25652( 82)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.647012 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.647117 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 39 D0317 18:30:30.647217 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.656656 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.656857 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 40 D0317 18:30:30.657054 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.658652 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.658713 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 41 D0317 18:30:30.658809 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.659338 431499 usertrap_amd64.go:212] [ 25649(1373): 25654(1374)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.659504 431499 usertrap_amd64.go:122] [ 25649(1373): 25654(1374)] Allocate a new trap: 0xc0040fc3c0 42 D0317 18:30:30.659711 431499 usertrap_amd64.go:225] [ 25649(1373): 25654(1374)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.663068 431499 usertrap_amd64.go:212] [ 25649(1373): 25649(1373)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.663284 431499 usertrap_amd64.go:122] [ 25649(1373): 25649(1373)] Allocate a new trap: 0xc0040fc3c0 43 D0317 18:30:30.663412 431499 usertrap_amd64.go:225] [ 25649(1373): 25649(1373)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.667872 431499 usertrap_amd64.go:212] [ 25648( 81): 25648( 81)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.667956 431499 usertrap_amd64.go:122] [ 25648( 81): 25648( 81)] Allocate a new trap: 0xc00628a5a0 42 D0317 18:30:30.668060 431499 usertrap_amd64.go:225] [ 25648( 81): 25648( 81)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.669696 431499 task_exit.go:204] [ 25649(1373): 25649(1373)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.669960 431499 task_signals.go:204] [ 25649(1373): 25654(1374)] Signal 9, PID: 25649, TID: 25654, fault addr: 0x0: terminating thread group D0317 18:30:30.670593 431499 task_exit.go:204] [ 25649(1373): 25654(1374)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.671121 431499 task_exit.go:204] [ 25649(1373): 25649(1373)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.673396 431499 task_exit.go:204] [ 25648( 81): 25648( 81)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.674070 431499 task_signals.go:204] [ 25648( 81): 25652( 82)] Signal 9, PID: 25648, TID: 25652, fault addr: 0x0: terminating thread group D0317 18:30:30.674114 431499 task_exit.go:204] [ 25648( 81): 25648( 81)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.674273 431499 task_exit.go:204] [ 25648( 81): 25652( 82)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.679263 431499 task_exit.go:204] [ 25649(1373): 25654(1374)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.679351 431499 task_exit.go:204] [ 25649(1373): 25654(1374)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.679477 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.680109 431499 task_exit.go:204] [ 25649(1373): 25649(1373)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.681248 431499 task_exit.go:204] [ 25648( 81): 25652( 82)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.681419 431499 task_exit.go:204] [ 25648( 81): 25652( 82)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.681591 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.681771 431499 task_exit.go:204] [ 25648( 81): 25648( 81)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: request_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 18:30:30 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002780)={0x0, 0x0, 0x0}, 0x0) D0317 18:30:30.690355 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.690547 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 36 D0317 18:30:30.691836 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.692024 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.692184 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 37 D0317 18:30:30.693047 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.696730 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.696815 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 37 D0317 18:30:30.696891 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.697773 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.697855 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 38 D0317 18:30:30.697967 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.709927 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.710091 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 38 D0317 18:30:30.710239 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.715030 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.715131 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 39 D0317 18:30:30.715392 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:30.717761 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.717843 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 39 D0317 18:30:30.717951 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:30.719528 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.719638 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 40 D0317 18:30:30.719821 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.720573 431499 usertrap_amd64.go:212] [ 25653( 166): 25658( 167)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.720673 431499 usertrap_amd64.go:122] [ 25653( 166): 25658( 167)] Allocate a new trap: 0xc0040ca3f0 41 D0317 18:30:30.720759 431499 usertrap_amd64.go:225] [ 25653( 166): 25658( 167)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.724344 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.724479 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 37 D0317 18:30:30.725293 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.731582 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.731707 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 36 D0317 18:30:30.731985 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.732062 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 38 D0317 18:30:30.732140 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.732550 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.736264 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.736485 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 40 D0317 18:30:30.736652 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.738343 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.738446 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 37 D0317 18:30:30.738543 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.738818 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.738908 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 41 D0317 18:30:30.739056 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.740072 431499 usertrap_amd64.go:212] [ 25655(2803): 25659(2804)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.740180 431499 usertrap_amd64.go:122] [ 25655(2803): 25659(2804)] Allocate a new trap: 0xc00628a5d0 42 D0317 18:30:30.740289 431499 usertrap_amd64.go:225] [ 25655(2803): 25659(2804)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.740982 431499 usertrap_amd64.go:212] [ 25653( 166): 25653( 166)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.741110 431499 usertrap_amd64.go:122] [ 25653( 166): 25653( 166)] Allocate a new trap: 0xc0040ca3f0 42 D0317 18:30:30.741197 431499 usertrap_amd64.go:225] [ 25653( 166): 25653( 166)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.745747 431499 usertrap_amd64.go:212] [ 25655(2803): 25655(2803)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.745822 431499 usertrap_amd64.go:122] [ 25655(2803): 25655(2803)] Allocate a new trap: 0xc00628a5d0 43 D0317 18:30:30.745915 431499 usertrap_amd64.go:225] [ 25655(2803): 25655(2803)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.747348 431499 task_exit.go:204] [ 25653( 166): 25653( 166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.748134 431499 task_exit.go:204] [ 25653( 166): 25653( 166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.748410 431499 task_signals.go:204] [ 25653( 166): 25658( 167)] Signal 9, PID: 25653, TID: 25658, fault addr: 0x0: terminating thread group D0317 18:30:30.748559 431499 task_exit.go:204] [ 25653( 166): 25658( 167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.752286 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.752420 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 39 D0317 18:30:30.752601 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.756144 431499 task_exit.go:204] [ 25653( 166): 25658( 167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.756266 431499 task_exit.go:204] [ 25653( 166): 25658( 167)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.756631 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.756841 431499 task_signals.go:204] [ 25655(2803): 25659(2804)] Signal 9, PID: 25655, TID: 25659, fault addr: 0x0: terminating thread group D0317 18:30:30.757040 431499 task_exit.go:204] [ 25655(2803): 25659(2804)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.758329 431499 task_exit.go:204] [ 25655(2803): 25655(2803)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.758514 431499 task_exit.go:204] [ 25653( 166): 25653( 166)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.758920 431499 task_exit.go:204] [ 25655(2803): 25659(2804)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.759009 431499 task_exit.go:204] [ 25655(2803): 25659(2804)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.759362 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.759569 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 38 D0317 18:30:30.759741 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) 18:30:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000000c0)={'fscrypt:', @auto=[0x62, 0x0, 0x31, 0x0, 0x0, 0x0, 0x39]}, &(0x7f0000000100)={0x0, "54b8b10d8e0fc6329959138eef8636dc808f20410d661b0910e6c46a5c2aed4f71082bd5345dbeaac916fa634f99e35cc0cfc91b621de955bd29be1ef324a424"}, 0x48, 0xfffffffffffffffb) D0317 18:30:30.767319 431499 task_exit.go:204] [ 25655(2803): 25655(2803)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.767464 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.767745 431499 task_exit.go:204] [ 25655(2803): 25655(2803)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.769952 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.770054 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 39 D0317 18:30:30.770162 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) 18:30:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'erspan0\x00', 0x0}) D0317 18:30:30.771811 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.771964 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.772072 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 40 D0317 18:30:30.772040 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 40 D0317 18:30:30.772182 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.772201 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.773404 431499 usertrap_amd64.go:212] [ 25656( 83): 25660( 84)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.773478 431499 usertrap_amd64.go:122] [ 25656( 83): 25660( 84)] Allocate a new trap: 0xc0027800f0 41 D0317 18:30:30.773570 431499 usertrap_amd64.go:225] [ 25656( 83): 25660( 84)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.775294 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.775402 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 41 D0317 18:30:30.775484 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.775709 431499 usertrap_amd64.go:212] [ 25657(1375): 25661(1376)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.775871 431499 usertrap_amd64.go:122] [ 25657(1375): 25661(1376)] Allocate a new trap: 0xc00628a600 42 D0317 18:30:30.776061 431499 usertrap_amd64.go:225] [ 25657(1375): 25661(1376)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.777718 431499 usertrap_amd64.go:212] [ 25657(1375): 25657(1375)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.777876 431499 usertrap_amd64.go:122] [ 25657(1375): 25657(1375)] Allocate a new trap: 0xc00628a600 43 D0317 18:30:30.777979 431499 usertrap_amd64.go:225] [ 25657(1375): 25657(1375)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.778403 431499 usertrap_amd64.go:212] [ 25656( 83): 25656( 83)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.778472 431499 usertrap_amd64.go:122] [ 25656( 83): 25656( 83)] Allocate a new trap: 0xc0027800f0 42 D0317 18:30:30.778540 431499 usertrap_amd64.go:225] [ 25656( 83): 25656( 83)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.789374 431499 task_exit.go:204] [ 25657(1375): 25657(1375)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.789686 431499 task_signals.go:204] [ 25657(1375): 25661(1376)] Signal 9, PID: 25657, TID: 25661, fault addr: 0x0: terminating thread group D0317 18:30:30.789772 431499 task_exit.go:204] [ 25657(1375): 25661(1376)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.790529 431499 task_exit.go:204] [ 25657(1375): 25657(1375)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.792170 431499 task_exit.go:204] [ 25656( 83): 25656( 83)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.792865 431499 task_signals.go:204] [ 25656( 83): 25660( 84)] Signal 9, PID: 25656, TID: 25660, fault addr: 0x0: terminating thread group D0317 18:30:30.792855 431499 task_exit.go:204] [ 25656( 83): 25656( 83)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.792989 431499 task_exit.go:204] [ 25656( 83): 25660( 84)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.798121 431499 task_exit.go:204] [ 25657(1375): 25661(1376)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.798216 431499 task_exit.go:204] [ 25657(1375): 25661(1376)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.798644 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.798852 431499 task_exit.go:204] [ 25657(1375): 25657(1375)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.800151 431499 task_exit.go:204] [ 25656( 83): 25660( 84)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.800259 431499 task_exit.go:204] [ 25656( 83): 25660( 84)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.800371 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.800871 431499 task_exit.go:204] [ 25656( 83): 25656( 83)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: socketpair(0x23, 0x0, 0x3f, &(0x7f0000000900)) 18:30:30 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x204000, 0x0) D0317 18:30:30.825143 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.825409 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 36 D0317 18:30:30.826570 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.831319 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.831386 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 37 D0317 18:30:30.831463 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.842636 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:30.842796 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 37 D0317 18:30:30.843769 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:30.864768 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:30.864841 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 38 D0317 18:30:30.864922 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:30.869542 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:30.869707 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 38 D0317 18:30:30.869891 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:30.876430 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.876609 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 36 D0317 18:30:30.877641 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.881394 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:30.881596 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 39 D0317 18:30:30.881932 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:30.884166 431499 usertrap_amd64.go:212] [ 25662( 168): 25666( 169)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:30.884241 431499 usertrap_amd64.go:122] [ 25662( 168): 25666( 169)] Allocate a new trap: 0xc006e64510 40 D0317 18:30:30.884355 431499 usertrap_amd64.go:225] [ 25662( 168): 25666( 169)] Apply the binary patch addr 5637f8770320 trap addr 62c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:30.884658 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:30.884751 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 41 D0317 18:30:30.884815 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f8770c10 trap addr 62cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:30.886809 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.887017 431499 usertrap_amd64.go:212] [ 25662( 168): 25662( 168)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:30.887178 431499 usertrap_amd64.go:122] [ 25662( 168): 25662( 168)] Allocate a new trap: 0xc006e64510 42 D0317 18:30:30.887301 431499 usertrap_amd64.go:225] [ 25662( 168): 25662( 168)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:30.887147 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 37 D0317 18:30:30.887460 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:30.889515 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:30.889729 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 37 D0317 18:30:30.891311 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:30.891362 431499 task_exit.go:204] [ 25662( 168): 25662( 168)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.892098 431499 task_signals.go:204] [ 25662( 168): 25666( 169)] Signal 9, PID: 25662, TID: 25666, fault addr: 0x0: terminating thread group D0317 18:30:30.892200 431499 task_exit.go:204] [ 25662( 168): 25662( 168)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.895756 431499 task_exit.go:204] [ 25662( 168): 25666( 169)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.899580 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:30.899710 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 38 D0317 18:30:30.899798 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:30.902273 431499 task_exit.go:204] [ 25662( 168): 25666( 169)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.902351 431499 task_exit.go:204] [ 25662( 168): 25666( 169)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.903808 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:30.904180 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:30.904253 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 38 D0317 18:30:30.904327 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:30.904454 431499 task_exit.go:204] [ 25662( 168): 25662( 168)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.905961 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:30.906056 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 39 D0317 18:30:30.906187 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:30 executing program 1: socketpair(0x25, 0x5, 0xfffff800, &(0x7f0000000000)) D0317 18:30:30.914385 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:30.914498 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 39 D0317 18:30:30.914598 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:30.915906 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:30.915976 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 40 D0317 18:30:30.916047 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:30.916628 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:30.916715 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 40 D0317 18:30:30.916778 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:30.917113 431499 usertrap_amd64.go:212] [ 25664( 85): 25667( 86)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:30.917196 431499 usertrap_amd64.go:122] [ 25664( 85): 25667( 86)] Allocate a new trap: 0xc003cb22a0 41 D0317 18:30:30.917452 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:30.917535 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:30.917612 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 41 D0317 18:30:30.917679 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:30.917661 431499 usertrap_amd64.go:225] [ 25664( 85): 25667( 86)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:30.917533 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 39 D0317 18:30:30.918248 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:30.918718 431499 usertrap_amd64.go:212] [ 25663(2805): 25668(2806)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:30.918800 431499 usertrap_amd64.go:122] [ 25663(2805): 25668(2806)] Allocate a new trap: 0xc006f9c180 42 D0317 18:30:30.918888 431499 usertrap_amd64.go:225] [ 25663(2805): 25668(2806)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:30.920721 431499 usertrap_amd64.go:212] [ 25664( 85): 25664( 85)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:30.920849 431499 usertrap_amd64.go:122] [ 25664( 85): 25664( 85)] Allocate a new trap: 0xc003cb22a0 42 D0317 18:30:30.921037 431499 usertrap_amd64.go:225] [ 25664( 85): 25664( 85)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:30.923162 431499 usertrap_amd64.go:212] [ 25663(2805): 25663(2805)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:30.923272 431499 usertrap_amd64.go:122] [ 25663(2805): 25663(2805)] Allocate a new trap: 0xc006f9c180 43 D0317 18:30:30.923384 431499 usertrap_amd64.go:225] [ 25663(2805): 25663(2805)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:30.926977 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:30.927071 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 40 D0317 18:30:30.927145 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:30.928809 431499 task_signals.go:204] [ 25664( 85): 25667( 86)] Signal 9, PID: 25664, TID: 25667, fault addr: 0x0: terminating thread group D0317 18:30:30.928884 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:30.929425 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 41 D0317 18:30:30.929644 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:30.928909 431499 task_exit.go:204] [ 25664( 85): 25664( 85)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.929942 431499 usertrap_amd64.go:212] [ 25665(1377): 25669(1378)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:30.930011 431499 usertrap_amd64.go:122] [ 25665(1377): 25669(1378)] Allocate a new trap: 0xc0040fc3f0 42 D0317 18:30:30.929924 431499 task_signals.go:204] [ 25663(2805): 25668(2806)] Signal 9, PID: 25663, TID: 25668, fault addr: 0x0: terminating thread group D0317 18:30:30.930106 431499 usertrap_amd64.go:225] [ 25665(1377): 25669(1378)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:30.930513 431499 task_exit.go:204] [ 25664( 85): 25664( 85)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.930678 431499 task_exit.go:204] [ 25663(2805): 25663(2805)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.930863 431499 task_exit.go:204] [ 25663(2805): 25668(2806)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.931023 431499 task_exit.go:204] [ 25664( 85): 25667( 86)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.931448 431499 usertrap_amd64.go:212] [ 25665(1377): 25665(1377)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:30.931528 431499 usertrap_amd64.go:122] [ 25665(1377): 25665(1377)] Allocate a new trap: 0xc0040fc3f0 43 D0317 18:30:30.931645 431499 usertrap_amd64.go:225] [ 25665(1377): 25665(1377)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:30.931798 431499 task_exit.go:204] [ 25663(2805): 25663(2805)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.938197 431499 task_exit.go:204] [ 25664( 85): 25667( 86)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.938282 431499 task_exit.go:204] [ 25664( 85): 25667( 86)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.938522 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:30.939125 431499 task_exit.go:204] [ 25664( 85): 25664( 85)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.940350 431499 task_exit.go:204] [ 25665(1377): 25665(1377)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.940583 431499 task_signals.go:204] [ 25665(1377): 25669(1378)] Signal 9, PID: 25665, TID: 25669, fault addr: 0x0: terminating thread group D0317 18:30:30.941200 431499 task_exit.go:204] [ 25665(1377): 25665(1377)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.941328 431499 task_exit.go:204] [ 25665(1377): 25669(1378)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:30.942522 431499 task_exit.go:204] [ 25663(2805): 25668(2806)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.942633 431499 task_exit.go:204] [ 25663(2805): 25668(2806)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x3, 0x4) D0317 18:30:30.942771 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:30.943295 431499 task_exit.go:204] [ 25663(2805): 25663(2805)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x891e, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:30.949520 431499 task_exit.go:204] [ 25665(1377): 25669(1378)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:30.949662 431499 task_exit.go:204] [ 25665(1377): 25669(1378)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:30.949790 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:30.950435 431499 task_exit.go:204] [ 25665(1377): 25665(1377)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0317 18:30:30.970757 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:30.970880 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 36 D0317 18:30:30.973273 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:30.981725 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:30.981815 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 37 D0317 18:30:30.981910 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:30.987773 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:30.988119 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 36 D0317 18:30:30.988980 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:30.992919 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:30.993011 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 37 D0317 18:30:30.993114 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.005653 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.005767 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 37 D0317 18:30:31.006626 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.009185 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.009364 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 38 D0317 18:30:31.009508 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.010200 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.010269 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:31.010289 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 38 D0317 18:30:31.010403 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 37 D0317 18:30:31.010436 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.011330 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:31.012586 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.012686 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 38 D0317 18:30:31.012778 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.016207 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:31.016284 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 38 D0317 18:30:31.016364 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:31.018519 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.018611 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 39 D0317 18:30:31.018765 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.020454 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.020566 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 40 D0317 18:30:31.020740 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.021073 431499 usertrap_amd64.go:212] [ 25671( 87): 25674( 88)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.021190 431499 usertrap_amd64.go:122] [ 25671( 87): 25674( 88)] Allocate a new trap: 0xc006e64570 41 D0317 18:30:31.021288 431499 usertrap_amd64.go:225] [ 25671( 87): 25674( 88)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.023089 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.023174 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 39 D0317 18:30:31.023283 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.025210 431499 usertrap_amd64.go:212] [ 25671( 87): 25671( 87)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.025242 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.025353 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 40 D0317 18:30:31.025335 431499 usertrap_amd64.go:122] [ 25671( 87): 25671( 87)] Allocate a new trap: 0xc006e64570 42 D0317 18:30:31.025471 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.025748 431499 usertrap_amd64.go:225] [ 25671( 87): 25671( 87)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.026214 431499 usertrap_amd64.go:212] [ 25670( 170): 25675( 171)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.026285 431499 usertrap_amd64.go:122] [ 25670( 170): 25675( 171)] Allocate a new trap: 0xc00628a690 41 D0317 18:30:31.026380 431499 usertrap_amd64.go:225] [ 25670( 170): 25675( 171)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.029088 431499 task_exit.go:204] [ 25671( 87): 25671( 87)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.029852 431499 task_exit.go:204] [ 25671( 87): 25671( 87)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.029817 431499 task_signals.go:204] [ 25671( 87): 25674( 88)] Signal 9, PID: 25671, TID: 25674, fault addr: 0x0: terminating thread group D0317 18:30:31.030009 431499 task_exit.go:204] [ 25671( 87): 25674( 88)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.035800 431499 usertrap_amd64.go:212] [ 25670( 170): 25670( 170)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.035885 431499 usertrap_amd64.go:122] [ 25670( 170): 25670( 170)] Allocate a new trap: 0xc00628a690 42 D0317 18:30:31.035984 431499 usertrap_amd64.go:225] [ 25670( 170): 25670( 170)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.037109 431499 task_exit.go:204] [ 25671( 87): 25674( 88)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.037187 431499 task_exit.go:204] [ 25671( 87): 25674( 88)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.037286 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.037504 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:31.037604 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 39 D0317 18:30:31.037709 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:31.037994 431499 task_exit.go:204] [ 25671( 87): 25671( 87)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8917, &(0x7f0000000400)) D0317 18:30:31.042361 431499 task_exit.go:204] [ 25670( 170): 25670( 170)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.042474 431499 task_signals.go:204] [ 25670( 170): 25675( 171)] Signal 9, PID: 25670, TID: 25675, fault addr: 0x0: terminating thread group D0317 18:30:31.043102 431499 task_exit.go:204] [ 25670( 170): 25670( 170)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.043796 431499 task_exit.go:204] [ 25670( 170): 25675( 171)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.047259 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.047387 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 39 D0317 18:30:31.047549 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.050593 431499 task_exit.go:204] [ 25670( 170): 25675( 171)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.050709 431499 task_exit.go:204] [ 25670( 170): 25675( 171)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.050833 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.051037 431499 task_exit.go:204] [ 25670( 170): 25670( 170)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xfdd4d5bbfbe196ce, 0x0) D0317 18:30:31.060190 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:31.060285 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 40 D0317 18:30:31.060400 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:31.061918 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:31.061998 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 41 D0317 18:30:31.062207 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:31.062449 431499 usertrap_amd64.go:212] [ 25673(1379): 25676(1380)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:31.062518 431499 usertrap_amd64.go:122] [ 25673(1379): 25676(1380)] Allocate a new trap: 0xc00628a6c0 42 D0317 18:30:31.062644 431499 usertrap_amd64.go:225] [ 25673(1379): 25676(1380)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:31.068585 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.068662 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 40 D0317 18:30:31.068733 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.070470 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.070520 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 41 D0317 18:30:31.070583 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.071297 431499 usertrap_amd64.go:212] [ 25672(2807): 25678(2808)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.071394 431499 usertrap_amd64.go:122] [ 25672(2807): 25678(2808)] Allocate a new trap: 0xc0067dc480 42 D0317 18:30:31.071466 431499 usertrap_amd64.go:225] [ 25672(2807): 25678(2808)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.084077 431499 usertrap_amd64.go:212] [ 25672(2807): 25672(2807)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.084160 431499 usertrap_amd64.go:122] [ 25672(2807): 25672(2807)] Allocate a new trap: 0xc0067dc480 43 D0317 18:30:31.084269 431499 usertrap_amd64.go:225] [ 25672(2807): 25672(2807)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.091911 431499 task_exit.go:204] [ 25672(2807): 25672(2807)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.092190 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.092429 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 36 D0317 18:30:31.092640 431499 task_signals.go:204] [ 25672(2807): 25678(2808)] Signal 9, PID: 25672, TID: 25678, fault addr: 0x0: terminating thread group D0317 18:30:31.093147 431499 task_exit.go:204] [ 25672(2807): 25672(2807)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.093269 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.093586 431499 task_exit.go:204] [ 25672(2807): 25678(2808)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.098591 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.099154 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 37 D0317 18:30:31.099359 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.100064 431499 task_exit.go:204] [ 25672(2807): 25678(2808)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.100083 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.100201 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 36 D0317 18:30:31.100140 431499 task_exit.go:204] [ 25672(2807): 25678(2808)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.100616 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.100817 431499 task_exit.go:204] [ 25672(2807): 25672(2807)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.101090 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 18:30:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) D0317 18:30:31.106101 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.106184 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 37 D0317 18:30:31.106250 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:31.112719 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.112793 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 38 D0317 18:30:31.112879 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.118713 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e7a71ae:sysno 230 D0317 18:30:31.119013 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 43 D0317 18:30:31.119111 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e7a71ae trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:31.120133 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.120236 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 39 D0317 18:30:31.120342 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.122148 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.122247 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 40 D0317 18:30:31.122364 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.122541 431499 usertrap_amd64.go:212] [ 25677( 89): 25680( 90)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.122615 431499 usertrap_amd64.go:122] [ 25677( 89): 25680( 90)] Allocate a new trap: 0xc0040ca450 41 D0317 18:30:31.122686 431499 usertrap_amd64.go:225] [ 25677( 89): 25680( 90)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.122921 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.123033 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 38 D0317 18:30:31.123125 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.125582 431499 usertrap_amd64.go:212] [ 25677( 89): 25677( 89)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.125650 431499 usertrap_amd64.go:122] [ 25677( 89): 25677( 89)] Allocate a new trap: 0xc0040ca450 42 D0317 18:30:31.125739 431499 usertrap_amd64.go:225] [ 25677( 89): 25677( 89)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.130738 431499 task_exit.go:204] [ 25677( 89): 25677( 89)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.131332 431499 task_signals.go:204] [ 25677( 89): 25680( 90)] Signal 9, PID: 25677, TID: 25680, fault addr: 0x0: terminating thread group D0317 18:30:31.131438 431499 task_exit.go:204] [ 25677( 89): 25680( 90)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.131668 431499 task_exit.go:204] [ 25677( 89): 25677( 89)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.132954 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.133145 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 39 D0317 18:30:31.133256 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.134670 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.134738 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 40 D0317 18:30:31.134815 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.135232 431499 usertrap_amd64.go:212] [ 25679( 172): 25682( 173)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.135353 431499 usertrap_amd64.go:122] [ 25679( 172): 25682( 173)] Allocate a new trap: 0xc002780270 41 D0317 18:30:31.135515 431499 usertrap_amd64.go:225] [ 25679( 172): 25682( 173)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.136980 431499 usertrap_amd64.go:212] [ 25679( 172): 25679( 172)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.137053 431499 usertrap_amd64.go:122] [ 25679( 172): 25679( 172)] Allocate a new trap: 0xc002780270 42 D0317 18:30:31.137132 431499 usertrap_amd64.go:225] [ 25679( 172): 25679( 172)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.138135 431499 task_exit.go:204] [ 25677( 89): 25680( 90)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.138184 431499 task_exit.go:204] [ 25677( 89): 25680( 90)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.138267 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.139370 431499 task_exit.go:204] [ 25677( 89): 25677( 89)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) D0317 18:30:31.143714 431499 task_exit.go:204] [ 25679( 172): 25679( 172)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.144391 431499 task_exit.go:204] [ 25679( 172): 25679( 172)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.144684 431499 task_signals.go:204] [ 25679( 172): 25682( 173)] Signal 9, PID: 25679, TID: 25682, fault addr: 0x0: terminating thread group D0317 18:30:31.144800 431499 task_exit.go:204] [ 25679( 172): 25682( 173)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.151741 431499 task_exit.go:204] [ 25679( 172): 25682( 173)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.151834 431499 task_exit.go:204] [ 25679( 172): 25682( 173)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.151932 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.152328 431499 task_exit.go:204] [ 25679( 172): 25679( 172)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.153077 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.153390 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 37 18:30:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="2710"], 0x8) D0317 18:30:31.154589 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.173116 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.173245 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 38 D0317 18:30:31.173501 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.185769 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.185874 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 36 D0317 18:30:31.186536 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.192017 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.192117 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 37 D0317 18:30:31.192227 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.194110 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.194242 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 39 D0317 18:30:31.194421 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.206701 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.206843 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 38 D0317 18:30:31.207146 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.211951 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.212098 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 40 D0317 18:30:31.212183 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.214915 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.214997 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 41 D0317 18:30:31.215073 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.215273 431499 usertrap_amd64.go:212] [ 25681(2809): 25685(2810)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.215371 431499 usertrap_amd64.go:122] [ 25681(2809): 25685(2810)] Allocate a new trap: 0xc006dc8330 42 D0317 18:30:31.215512 431499 usertrap_amd64.go:225] [ 25681(2809): 25685(2810)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.216154 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.216238 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 39 D0317 18:30:31.216311 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.216627 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.216753 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 36 D0317 18:30:31.217568 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:31.217945 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.218054 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 40 D0317 18:30:31.218318 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.218588 431499 usertrap_amd64.go:212] [ 25683( 91): 25686( 92)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.218986 431499 usertrap_amd64.go:122] [ 25683( 91): 25686( 92)] Allocate a new trap: 0xc0040ca4e0 41 D0317 18:30:31.219653 431499 usertrap_amd64.go:212] [ 25681(2809): 25681(2809)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.219834 431499 usertrap_amd64.go:122] [ 25681(2809): 25681(2809)] Allocate a new trap: 0xc006dc8330 43 D0317 18:30:31.219710 431499 usertrap_amd64.go:225] [ 25683( 91): 25686( 92)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.219952 431499 usertrap_amd64.go:225] [ 25681(2809): 25681(2809)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.222305 431499 usertrap_amd64.go:212] [ 25683( 91): 25683( 91)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.222381 431499 usertrap_amd64.go:122] [ 25683( 91): 25683( 91)] Allocate a new trap: 0xc0040ca4e0 42 D0317 18:30:31.222447 431499 usertrap_amd64.go:225] [ 25683( 91): 25683( 91)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.226778 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.226832 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 37 D0317 18:30:31.226945 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:31.227002 431499 task_exit.go:204] [ 25683( 91): 25683( 91)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.228335 431499 task_exit.go:204] [ 25683( 91): 25683( 91)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.228891 431499 task_signals.go:204] [ 25683( 91): 25686( 92)] Signal 9, PID: 25683, TID: 25686, fault addr: 0x0: terminating thread group D0317 18:30:31.229632 431499 task_exit.go:204] [ 25683( 91): 25686( 92)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.235920 431499 task_exit.go:204] [ 25683( 91): 25686( 92)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.236066 431499 task_exit.go:204] [ 25683( 91): 25686( 92)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.236178 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.236700 431499 task_exit.go:204] [ 25683( 91): 25683( 91)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000340)) D0317 18:30:31.242569 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.242664 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 38 D0317 18:30:31.242755 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.247889 431499 task_exit.go:204] [ 25681(2809): 25681(2809)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.248463 431499 task_signals.go:204] [ 25681(2809): 25685(2810)] Signal 9, PID: 25681, TID: 25685, fault addr: 0x0: terminating thread group D0317 18:30:31.248519 431499 task_exit.go:204] [ 25681(2809): 25681(2809)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.248671 431499 task_exit.go:204] [ 25681(2809): 25685(2810)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.254820 431499 task_exit.go:204] [ 25681(2809): 25685(2810)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.255123 431499 task_exit.go:204] [ 25681(2809): 25685(2810)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.255321 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.255423 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.255507 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 39 D0317 18:30:31.255502 431499 task_exit.go:204] [ 25681(2809): 25681(2809)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.255700 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) 18:30:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) D0317 18:30:31.266091 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.266216 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 40 D0317 18:30:31.266351 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.267179 431499 usertrap_amd64.go:212] [ 25684( 174): 25688( 175)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.267270 431499 usertrap_amd64.go:122] [ 25684( 174): 25688( 175)] Allocate a new trap: 0xc0040ca510 41 D0317 18:30:31.267409 431499 usertrap_amd64.go:225] [ 25684( 174): 25688( 175)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.272382 431499 usertrap_amd64.go:212] [ 25684( 174): 25684( 174)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.272562 431499 usertrap_amd64.go:122] [ 25684( 174): 25684( 174)] Allocate a new trap: 0xc0040ca510 42 D0317 18:30:31.272696 431499 usertrap_amd64.go:225] [ 25684( 174): 25684( 174)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.277387 431499 task_exit.go:204] [ 25684( 174): 25684( 174)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.277616 431499 task_signals.go:204] [ 25684( 174): 25688( 175)] Signal 9, PID: 25684, TID: 25688, fault addr: 0x0: terminating thread group D0317 18:30:31.278061 431499 task_exit.go:204] [ 25684( 174): 25684( 174)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.278427 431499 task_exit.go:204] [ 25684( 174): 25688( 175)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.280521 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.280705 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 36 D0317 18:30:31.281800 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.287073 431499 task_exit.go:204] [ 25684( 174): 25688( 175)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.287739 431499 task_exit.go:204] [ 25684( 174): 25688( 175)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.288283 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.288322 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.288412 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 37 D0317 18:30:31.288516 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.288537 431499 task_exit.go:204] [ 25684( 174): 25684( 174)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8995, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:31.301380 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.301492 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 37 D0317 18:30:31.302710 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.306116 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.306238 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 38 D0317 18:30:31.306261 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.306320 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.306352 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 38 D0317 18:30:31.306438 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.318836 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.318925 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 39 D0317 18:30:31.319025 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.320512 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.320567 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.320743 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 40 D0317 18:30:31.320841 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.320706 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 39 D0317 18:30:31.321023 431499 usertrap_amd64.go:212] [ 25687( 93): 25690( 94)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.321107 431499 usertrap_amd64.go:122] [ 25687( 93): 25690( 94)] Allocate a new trap: 0xc006e64600 41 D0317 18:30:31.321086 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.321204 431499 usertrap_amd64.go:225] [ 25687( 93): 25690( 94)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.327121 431499 usertrap_amd64.go:212] [ 25687( 93): 25687( 93)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.327244 431499 usertrap_amd64.go:122] [ 25687( 93): 25687( 93)] Allocate a new trap: 0xc006e64600 42 D0317 18:30:31.327300 431499 usertrap_amd64.go:225] [ 25687( 93): 25687( 93)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.329251 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.329330 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 40 D0317 18:30:31.329407 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.330627 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.330705 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 41 D0317 18:30:31.330787 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.331659 431499 usertrap_amd64.go:212] [ 25689(2811): 25692(2812)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.331730 431499 usertrap_amd64.go:122] [ 25689(2811): 25692(2812)] Allocate a new trap: 0xc0067dc4e0 42 D0317 18:30:31.331798 431499 task_exit.go:204] [ 25687( 93): 25687( 93)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.331874 431499 usertrap_amd64.go:225] [ 25689(2811): 25692(2812)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.331950 431499 task_signals.go:204] [ 25687( 93): 25690( 94)] Signal 9, PID: 25687, TID: 25690, fault addr: 0x0: terminating thread group D0317 18:30:31.332442 431499 task_exit.go:204] [ 25687( 93): 25687( 93)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.333114 431499 task_exit.go:204] [ 25687( 93): 25690( 94)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.334418 431499 usertrap_amd64.go:212] [ 25689(2811): 25689(2811)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.334495 431499 usertrap_amd64.go:122] [ 25689(2811): 25689(2811)] Allocate a new trap: 0xc0067dc4e0 43 D0317 18:30:31.334571 431499 usertrap_amd64.go:225] [ 25689(2811): 25689(2811)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.337913 431499 task_exit.go:204] [ 25689(2811): 25689(2811)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.338089 431499 task_signals.go:204] [ 25689(2811): 25692(2812)] Signal 9, PID: 25689, TID: 25692, fault addr: 0x0: terminating thread group D0317 18:30:31.338627 431499 task_exit.go:204] [ 25689(2811): 25689(2811)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.338785 431499 task_exit.go:204] [ 25689(2811): 25692(2812)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.339247 431499 task_exit.go:204] [ 25687( 93): 25690( 94)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.339316 431499 task_exit.go:204] [ 25687( 93): 25690( 94)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.339387 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.340050 431499 task_exit.go:204] [ 25687( 93): 25687( 93)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: add_key(&(0x7f0000000000)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) D0317 18:30:31.345387 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.345504 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 36 D0317 18:30:31.345776 431499 task_exit.go:204] [ 25689(2811): 25692(2812)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.345834 431499 task_exit.go:204] [ 25689(2811): 25692(2812)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.345967 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.346462 431499 task_exit.go:204] [ 25689(2811): 25689(2811)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.346739 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 18:30:31 executing program 0: add_key(&(0x7f0000000000)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) D0317 18:30:31.351463 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.351536 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 37 D0317 18:30:31.351661 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:31.373715 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.373825 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 38 D0317 18:30:31.373893 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.391996 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.392158 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 39 D0317 18:30:31.392273 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.394001 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.394190 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 40 D0317 18:30:31.394329 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.394912 431499 usertrap_amd64.go:212] [ 25691( 176): 25695( 177)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.395055 431499 usertrap_amd64.go:122] [ 25691( 176): 25695( 177)] Allocate a new trap: 0xc006dc8360 41 D0317 18:30:31.395386 431499 usertrap_amd64.go:225] [ 25691( 176): 25695( 177)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.396474 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.396607 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 36 D0317 18:30:31.397706 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.400267 431499 usertrap_amd64.go:212] [ 25691( 176): 25691( 176)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.400340 431499 usertrap_amd64.go:122] [ 25691( 176): 25691( 176)] Allocate a new trap: 0xc006dc8360 42 D0317 18:30:31.400420 431499 usertrap_amd64.go:225] [ 25691( 176): 25691( 176)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.401050 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.401149 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 37 D0317 18:30:31.402011 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.403509 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.403642 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 37 D0317 18:30:31.403789 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.405903 431499 task_exit.go:204] [ 25691( 176): 25691( 176)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.406474 431499 task_exit.go:204] [ 25691( 176): 25691( 176)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.406550 431499 task_signals.go:204] [ 25691( 176): 25695( 177)] Signal 9, PID: 25691, TID: 25695, fault addr: 0x0: terminating thread group D0317 18:30:31.406658 431499 task_exit.go:204] [ 25691( 176): 25695( 177)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.406683 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.406788 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 38 D0317 18:30:31.406856 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.413058 431499 task_exit.go:204] [ 25691( 176): 25695( 177)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.413170 431499 task_exit.go:204] [ 25691( 176): 25695( 177)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.413302 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.413925 431499 task_exit.go:204] [ 25691( 176): 25691( 176)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x891c, &(0x7f0000000400)) D0317 18:30:31.420721 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.420783 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 38 D0317 18:30:31.420864 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.422343 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.422459 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 39 D0317 18:30:31.422645 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.431004 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.431171 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.431128 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 39 D0317 18:30:31.431244 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 40 D0317 18:30:31.431320 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.431339 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.433179 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.433252 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 40 D0317 18:30:31.433317 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.433612 431499 usertrap_amd64.go:212] [ 25693( 95): 25696( 96)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.433698 431499 usertrap_amd64.go:122] [ 25693( 95): 25696( 96)] Allocate a new trap: 0xc0040fc540 41 D0317 18:30:31.433763 431499 usertrap_amd64.go:225] [ 25693( 95): 25696( 96)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.434587 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.434738 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 41 D0317 18:30:31.434828 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.435010 431499 usertrap_amd64.go:212] [ 25694(2813): 25697(2814)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.435088 431499 usertrap_amd64.go:122] [ 25694(2813): 25697(2814)] Allocate a new trap: 0xc00628a6f0 42 D0317 18:30:31.435153 431499 usertrap_amd64.go:225] [ 25694(2813): 25697(2814)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.436654 431499 usertrap_amd64.go:212] [ 25693( 95): 25693( 95)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.436754 431499 usertrap_amd64.go:122] [ 25693( 95): 25693( 95)] Allocate a new trap: 0xc0040fc540 42 D0317 18:30:31.436851 431499 usertrap_amd64.go:225] [ 25693( 95): 25693( 95)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.437294 431499 usertrap_amd64.go:212] [ 25694(2813): 25694(2813)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.437347 431499 usertrap_amd64.go:122] [ 25694(2813): 25694(2813)] Allocate a new trap: 0xc00628a6f0 43 D0317 18:30:31.437400 431499 usertrap_amd64.go:225] [ 25694(2813): 25694(2813)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.440654 431499 task_exit.go:204] [ 25694(2813): 25694(2813)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.441182 431499 task_exit.go:204] [ 25694(2813): 25694(2813)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.441332 431499 task_signals.go:204] [ 25694(2813): 25697(2814)] Signal 9, PID: 25694, TID: 25697, fault addr: 0x0: terminating thread group D0317 18:30:31.441516 431499 task_exit.go:204] [ 25694(2813): 25697(2814)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.443754 431499 task_exit.go:204] [ 25693( 95): 25693( 95)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.444392 431499 task_exit.go:204] [ 25693( 95): 25693( 95)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.444709 431499 task_signals.go:204] [ 25693( 95): 25696( 96)] Signal 9, PID: 25693, TID: 25696, fault addr: 0x0: terminating thread group D0317 18:30:31.444801 431499 task_exit.go:204] [ 25693( 95): 25696( 96)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.447934 431499 task_exit.go:204] [ 25694(2813): 25697(2814)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.448047 431499 task_exit.go:204] [ 25694(2813): 25697(2814)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.448189 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.449099 431499 task_exit.go:204] [ 25694(2813): 25694(2813)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb701, 0x0) D0317 18:30:31.452447 431499 task_exit.go:204] [ 25693( 95): 25696( 96)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.452530 431499 task_exit.go:204] [ 25693( 95): 25696( 96)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.452652 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.454446 431499 task_exit.go:204] [ 25693( 95): 25693( 95)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.456017 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.456105 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 36 D0317 18:30:31.456880 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:31.460041 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.460107 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 37 D0317 18:30:31.460179 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 18:30:31 executing program 3: request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0) D0317 18:30:31.472548 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.472670 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 38 D0317 18:30:31.472736 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.480391 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.480459 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 39 D0317 18:30:31.480531 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.481990 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.482276 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 40 D0317 18:30:31.482423 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.482667 431499 usertrap_amd64.go:212] [ 25698( 178): 25701( 179)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.482743 431499 usertrap_amd64.go:122] [ 25698( 178): 25701( 179)] Allocate a new trap: 0xc00628a720 41 D0317 18:30:31.482808 431499 usertrap_amd64.go:225] [ 25698( 178): 25701( 179)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.485993 431499 usertrap_amd64.go:212] [ 25698( 178): 25698( 178)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.486073 431499 usertrap_amd64.go:122] [ 25698( 178): 25698( 178)] Allocate a new trap: 0xc00628a720 42 D0317 18:30:31.486185 431499 usertrap_amd64.go:225] [ 25698( 178): 25698( 178)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.489113 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.489241 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 37 D0317 18:30:31.489969 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.491531 431499 task_signals.go:204] [ 25698( 178): 25701( 179)] Signal 9, PID: 25698, TID: 25701, fault addr: 0x0: terminating thread group D0317 18:30:31.491660 431499 task_exit.go:204] [ 25698( 178): 25698( 178)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.492275 431499 task_exit.go:204] [ 25698( 178): 25698( 178)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.492400 431499 task_exit.go:204] [ 25698( 178): 25701( 179)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.493550 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.493638 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 38 D0317 18:30:31.493715 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.496700 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.496815 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 36 D0317 18:30:31.497535 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.498537 431499 task_exit.go:204] [ 25698( 178): 25701( 179)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.498628 431499 task_exit.go:204] [ 25698( 178): 25701( 179)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.498728 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.499407 431499 task_exit.go:204] [ 25698( 178): 25698( 178)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.500783 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.500865 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 37 D0317 18:30:31.500934 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) 18:30:31 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) D0317 18:30:31.510281 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.510350 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 39 D0317 18:30:31.510403 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.517478 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.517572 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 40 D0317 18:30:31.517635 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.519001 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.519089 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 41 D0317 18:30:31.519170 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.519682 431499 usertrap_amd64.go:212] [ 25699(2815): 25702(2816)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.519748 431499 usertrap_amd64.go:122] [ 25699(2815): 25702(2816)] Allocate a new trap: 0xc0040ca570 42 D0317 18:30:31.519831 431499 usertrap_amd64.go:225] [ 25699(2815): 25702(2816)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.520420 431499 usertrap_amd64.go:212] [ 25699(2815): 25702(2816)] Found the pattern at ip 55ef2c836999:sysno 257 D0317 18:30:31.520587 431499 usertrap_amd64.go:122] [ 25699(2815): 25702(2816)] Allocate a new trap: 0xc0040ca570 43 D0317 18:30:31.520642 431499 usertrap_amd64.go:225] [ 25699(2815): 25702(2816)] Apply the binary patch addr 55ef2c836999 trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.525536 431499 usertrap_amd64.go:212] [ 25699(2815): 25699(2815)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.525628 431499 usertrap_amd64.go:122] [ 25699(2815): 25699(2815)] Allocate a new trap: 0xc0040ca570 44 D0317 18:30:31.525724 431499 usertrap_amd64.go:225] [ 25699(2815): 25699(2815)] Apply the binary patch addr 55ef2c836c93 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0317 18:30:31.527880 431499 task_exit.go:204] [ 25699(2815): 25699(2815)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.528498 431499 task_signals.go:204] [ 25699(2815): 25702(2816)] Signal 9, PID: 25699, TID: 25702, fault addr: 0x0: terminating thread group D0317 18:30:31.528580 431499 task_exit.go:204] [ 25699(2815): 25699(2815)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.528649 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.528749 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 38 D0317 18:30:31.528814 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.528837 431499 task_exit.go:204] [ 25699(2815): 25702(2816)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.536251 431499 task_exit.go:204] [ 25699(2815): 25702(2816)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.536355 431499 task_exit.go:204] [ 25699(2815): 25702(2816)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.536459 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.536814 431499 task_exit.go:204] [ 25699(2815): 25699(2815)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8911, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:31.544363 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.544484 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 39 D0317 18:30:31.544556 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.546490 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.546638 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 40 D0317 18:30:31.546809 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.547721 431499 usertrap_amd64.go:212] [ 25700( 97): 25704( 98)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.547790 431499 usertrap_amd64.go:122] [ 25700( 97): 25704( 98)] Allocate a new trap: 0xc00628a750 41 D0317 18:30:31.547928 431499 usertrap_amd64.go:225] [ 25700( 97): 25704( 98)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.549897 431499 usertrap_amd64.go:212] [ 25700( 97): 25700( 97)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.550007 431499 usertrap_amd64.go:122] [ 25700( 97): 25700( 97)] Allocate a new trap: 0xc00628a750 42 D0317 18:30:31.550094 431499 usertrap_amd64.go:225] [ 25700( 97): 25700( 97)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.553844 431499 task_exit.go:204] [ 25700( 97): 25700( 97)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.554678 431499 task_exit.go:204] [ 25700( 97): 25700( 97)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.554670 431499 task_signals.go:204] [ 25700( 97): 25704( 98)] Signal 9, PID: 25700, TID: 25704, fault addr: 0x0: terminating thread group D0317 18:30:31.555012 431499 task_exit.go:204] [ 25700( 97): 25704( 98)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.556089 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.556184 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 36 D0317 18:30:31.556891 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:31.562328 431499 task_exit.go:204] [ 25700( 97): 25704( 98)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.562448 431499 task_exit.go:204] [ 25700( 97): 25704( 98)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.562551 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.562830 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.563535 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 37 D0317 18:30:31.563132 431499 task_exit.go:204] [ 25700( 97): 25700( 97)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.563695 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 18:30:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) D0317 18:30:31.574912 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.575034 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 38 D0317 18:30:31.575114 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.576090 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.576201 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 37 D0317 18:30:31.577084 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.580956 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.581132 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 38 D0317 18:30:31.581275 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.582741 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.583379 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 39 D0317 18:30:31.583574 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.585759 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.585828 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 40 D0317 18:30:31.585964 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.586205 431499 usertrap_amd64.go:212] [ 25703( 180): 25707( 181)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.586296 431499 usertrap_amd64.go:122] [ 25703( 180): 25707( 181)] Allocate a new trap: 0xc006e646f0 41 D0317 18:30:31.586416 431499 usertrap_amd64.go:225] [ 25703( 180): 25707( 181)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.588864 431499 usertrap_amd64.go:212] [ 25703( 180): 25703( 180)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:31.588929 431499 usertrap_amd64.go:122] [ 25703( 180): 25703( 180)] Allocate a new trap: 0xc006e646f0 42 D0317 18:30:31.589000 431499 usertrap_amd64.go:225] [ 25703( 180): 25703( 180)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.593455 431499 task_exit.go:204] [ 25703( 180): 25703( 180)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.593697 431499 task_signals.go:204] [ 25703( 180): 25707( 181)] Signal 9, PID: 25703, TID: 25707, fault addr: 0x0: terminating thread group D0317 18:30:31.594282 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.594333 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 39 D0317 18:30:31.594288 431499 task_exit.go:204] [ 25703( 180): 25703( 180)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.594392 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.594728 431499 task_exit.go:204] [ 25703( 180): 25707( 181)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.594817 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.594924 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 36 D0317 18:30:31.595736 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.601875 431499 task_exit.go:204] [ 25703( 180): 25707( 181)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.601976 431499 task_exit.go:204] [ 25703( 180): 25707( 181)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.602051 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:31.602214 431499 task_exit.go:204] [ 25703( 180): 25703( 180)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0317 18:30:31.605986 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.606204 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 40 D0317 18:30:31.606382 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.606741 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.606908 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 37 D0317 18:30:31.607122 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.608228 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.608390 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 41 D0317 18:30:31.609104 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.609380 431499 usertrap_amd64.go:212] [ 25705(2817): 25708(2818)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.609474 431499 usertrap_amd64.go:122] [ 25705(2817): 25708(2818)] Allocate a new trap: 0xc0027803f0 42 D0317 18:30:31.609559 431499 usertrap_amd64.go:225] [ 25705(2817): 25708(2818)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.614076 431499 usertrap_amd64.go:212] [ 25705(2817): 25705(2817)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.614187 431499 usertrap_amd64.go:122] [ 25705(2817): 25705(2817)] Allocate a new trap: 0xc0027803f0 43 D0317 18:30:31.614278 431499 usertrap_amd64.go:225] [ 25705(2817): 25705(2817)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.620186 431499 task_exit.go:204] [ 25705(2817): 25705(2817)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.620877 431499 task_signals.go:204] [ 25705(2817): 25708(2818)] Signal 9, PID: 25705, TID: 25708, fault addr: 0x0: terminating thread group D0317 18:30:31.620950 431499 task_exit.go:204] [ 25705(2817): 25705(2817)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.621357 431499 task_exit.go:204] [ 25705(2817): 25708(2818)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.628160 431499 task_exit.go:204] [ 25705(2817): 25708(2818)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.628253 431499 task_exit.go:204] [ 25705(2817): 25708(2818)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.628465 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.629427 431499 task_exit.go:204] [ 25705(2817): 25705(2817)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffa) D0317 18:30:31.638931 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.639065 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 38 D0317 18:30:31.639170 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.647050 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.647124 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 39 D0317 18:30:31.647236 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.649815 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.649936 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 40 D0317 18:30:31.650042 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.650392 431499 usertrap_amd64.go:212] [ 25706( 99): 25710( 100)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.650474 431499 usertrap_amd64.go:122] [ 25706( 99): 25710( 100)] Allocate a new trap: 0xc002304390 41 D0317 18:30:31.650548 431499 usertrap_amd64.go:225] [ 25706( 99): 25710( 100)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.651435 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:31.651668 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 36 D0317 18:30:31.652456 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:31.654651 431499 usertrap_amd64.go:212] [ 25706( 99): 25706( 99)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.654693 431499 usertrap_amd64.go:122] [ 25706( 99): 25706( 99)] Allocate a new trap: 0xc002304390 42 D0317 18:30:31.654743 431499 usertrap_amd64.go:225] [ 25706( 99): 25706( 99)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.662671 431499 task_exit.go:204] [ 25706( 99): 25706( 99)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.663340 431499 task_exit.go:204] [ 25706( 99): 25706( 99)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.663861 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:31.663934 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 37 D0317 18:30:31.664074 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:31.665178 431499 task_signals.go:204] [ 25706( 99): 25710( 100)] Signal 9, PID: 25706, TID: 25710, fault addr: 0x0: terminating thread group D0317 18:30:31.665329 431499 task_exit.go:204] [ 25706( 99): 25710( 100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.671874 431499 task_exit.go:204] [ 25706( 99): 25710( 100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.671947 431499 task_exit.go:204] [ 25706( 99): 25710( 100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.672109 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.672524 431499 task_exit.go:204] [ 25706( 99): 25706( 99)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: syz_clone(0x4500, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f00000002c0)) D0317 18:30:31.677951 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:31.678057 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 38 D0317 18:30:31.678132 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:31.687933 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.688080 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 37 D0317 18:30:31.688839 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.693597 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:31.693762 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 39 D0317 18:30:31.694016 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:31.694518 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.694616 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 38 D0317 18:30:31.694729 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.699056 431499 usertrap_amd64.go:212] [ 25709( 182): 25712( 183)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:31.699143 431499 usertrap_amd64.go:122] [ 25709( 182): 25712( 183)] Allocate a new trap: 0xc002780540 40 D0317 18:30:31.699213 431499 usertrap_amd64.go:225] [ 25709( 182): 25712( 183)] Apply the binary patch addr 5637f8770320 trap addr 62c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:31.699700 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:31.699767 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 41 D0317 18:30:31.699880 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f8770c10 trap addr 62cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:31.712433 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.712578 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 39 D0317 18:30:31.712678 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.721127 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.721226 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 40 D0317 18:30:31.721308 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.722978 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.723122 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 41 D0317 18:30:31.723116 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.723352 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 36 D0317 18:30:31.723378 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.723707 431499 usertrap_amd64.go:212] [ 25711(2819): 25714(2820)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.723820 431499 usertrap_amd64.go:122] [ 25711(2819): 25714(2820)] Allocate a new trap: 0xc0040fc6c0 42 D0317 18:30:31.723890 431499 usertrap_amd64.go:225] [ 25711(2819): 25714(2820)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.724145 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.725510 431499 usertrap_amd64.go:212] [ 25711(2819): 25711(2819)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.725574 431499 usertrap_amd64.go:122] [ 25711(2819): 25711(2819)] Allocate a new trap: 0xc0040fc6c0 43 D0317 18:30:31.725646 431499 usertrap_amd64.go:225] [ 25711(2819): 25711(2819)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.727958 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:31.728043 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 37 D0317 18:30:31.728134 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:31.729318 431499 task_exit.go:204] [ 25711(2819): 25711(2819)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.729567 431499 task_signals.go:204] [ 25711(2819): 25714(2820)] Signal 9, PID: 25711, TID: 25714, fault addr: 0x0: terminating thread group D0317 18:30:31.730108 431499 task_exit.go:204] [ 25711(2819): 25711(2819)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.730411 431499 task_exit.go:204] [ 25711(2819): 25714(2820)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.736685 431499 task_exit.go:204] [ 25711(2819): 25714(2820)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.736778 431499 task_exit.go:204] [ 25711(2819): 25714(2820)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.736897 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.737033 431499 task_exit.go:204] [ 25711(2819): 25711(2819)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000380)=[{0x3}, {0x0, 0xfdb8}], 0x2, &(0x7f00000003c0)) D0317 18:30:31.740074 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:31.740148 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 38 D0317 18:30:31.740223 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:31.747981 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:31.748072 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 39 D0317 18:30:31.748158 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:31.750122 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:31.750189 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 40 D0317 18:30:31.750265 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:31.751138 431499 usertrap_amd64.go:212] [ 25713( 101): 25715( 102)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:31.751218 431499 usertrap_amd64.go:122] [ 25713( 101): 25715( 102)] Allocate a new trap: 0xc003cb2300 41 D0317 18:30:31.751527 431499 usertrap_amd64.go:225] [ 25713( 101): 25715( 102)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:31.756771 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f87c71ae:sysno 230 D0317 18:30:31.756862 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 42 D0317 18:30:31.756945 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f87c71ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:31.762042 431499 task_stop.go:118] [ 25713( 101): 25715( 102)] Entering internal stop (*kernel.vforkStop)(nil) D0317 18:30:31.767364 431499 usertrap_amd64.go:212] [ 25717( 103): 25717( 103)] Found the pattern at ip 55a8b06171ae:sysno 230 D0317 18:30:31.767486 431499 usertrap_amd64.go:122] [ 25717( 103): 25717( 103)] Allocate a new trap: 0xc006dc8420 42 D0317 18:30:31.768187 431499 usertrap_amd64.go:225] [ 25717( 103): 25717( 103)] Apply the binary patch addr 55a8b06171ae trap addr 64d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.776452 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.776547 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 37 D0317 18:30:31.777577 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.781002 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.781100 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 38 D0317 18:30:31.781204 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.792715 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.792782 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 39 D0317 18:30:31.792854 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.800622 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.800704 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 40 D0317 18:30:31.800773 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.802281 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.802353 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 41 D0317 18:30:31.802452 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.803085 431499 usertrap_amd64.go:212] [ 25716(2821): 25718(2822)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.803314 431499 usertrap_amd64.go:122] [ 25716(2821): 25718(2822)] Allocate a new trap: 0xc00628a810 42 D0317 18:30:31.803442 431499 usertrap_amd64.go:225] [ 25716(2821): 25718(2822)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.806409 431499 usertrap_amd64.go:212] [ 25716(2821): 25716(2821)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.806507 431499 usertrap_amd64.go:122] [ 25716(2821): 25716(2821)] Allocate a new trap: 0xc00628a810 43 D0317 18:30:31.806645 431499 usertrap_amd64.go:225] [ 25716(2821): 25716(2821)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.811498 431499 task_exit.go:204] [ 25716(2821): 25716(2821)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.812391 431499 task_signals.go:204] [ 25716(2821): 25718(2822)] Signal 9, PID: 25716, TID: 25718, fault addr: 0x0: terminating thread group D0317 18:30:31.812501 431499 task_exit.go:204] [ 25716(2821): 25716(2821)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.812672 431499 task_exit.go:204] [ 25716(2821): 25718(2822)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.819317 431499 task_exit.go:204] [ 25716(2821): 25718(2822)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.819402 431499 task_exit.go:204] [ 25716(2821): 25718(2822)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.819580 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.820461 431499 task_exit.go:204] [ 25716(2821): 25716(2821)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 0: mount$9p_fd(0x0, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) D0317 18:30:31.828035 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b06171ae:sysno 230 D0317 18:30:31.828166 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 42 D0317 18:30:31.828436 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b06171ae trap addr 64d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:31.864508 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.864714 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 37 D0317 18:30:31.865473 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.875515 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.875645 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 38 D0317 18:30:31.875758 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.875811 431499 usertrap_amd64.go:212] [ 25673(1379): 25673(1379)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:31.875870 431499 usertrap_amd64.go:122] [ 25673(1379): 25673(1379)] Allocate a new trap: 0xc00628a6c0 44 D0317 18:30:31.875961 431499 usertrap_amd64.go:225] [ 25673(1379): 25673(1379)] Apply the binary patch addr 55ae6e77ac93 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0317 18:30:31.885647 431499 task_exit.go:204] [ 25673(1379): 25673(1379)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.885948 431499 task_signals.go:204] [ 25673(1379): 25676(1380)] Signal 9, PID: 25673, TID: 25676, fault addr: 0x0: terminating thread group D0317 18:30:31.886075 431499 task_exit.go:204] [ 25673(1379): 25676(1380)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.887001 431499 task_exit.go:204] [ 25673(1379): 25676(1380)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.887098 431499 task_exit.go:204] [ 25673(1379): 25676(1380)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.894138 431499 task_exit.go:204] [ 25673(1379): 25673(1379)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.894233 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:31.894767 431499 task_exit.go:204] [ 25673(1379): 25673(1379)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}}], 0x2, 0x0) D0317 18:30:31.910244 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:31.910377 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 39 D0317 18:30:31.910517 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:31.923079 431499 task_exit.go:204] [ 25717( 103): 25717( 103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.925064 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:31.925193 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 40 D0317 18:30:31.925263 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:31.927389 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:31.927523 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 41 D0317 18:30:31.927770 431499 task_stop.go:138] [ 25713( 101): 25715( 102)] Leaving internal stop (*kernel.vforkStop)(nil) D0317 18:30:31.928126 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:31.928797 431499 usertrap_amd64.go:212] [ 25720(2823): 25722(2824)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:31.928900 431499 usertrap_amd64.go:122] [ 25720(2823): 25722(2824)] Allocate a new trap: 0xc006dc8450 42 D0317 18:30:31.929001 431499 usertrap_amd64.go:225] [ 25720(2823): 25722(2824)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:31.929005 431499 task_exit.go:204] [ 25717( 103): 25717( 103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.930503 431499 usertrap_amd64.go:212] [ 25713( 101): 25713( 101)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:31.930792 431499 usertrap_amd64.go:122] [ 25713( 101): 25713( 101)] Allocate a new trap: 0xc003cb2300 43 D0317 18:30:31.930960 431499 usertrap_amd64.go:225] [ 25713( 101): 25713( 101)] Apply the binary patch addr 55a8b05eac93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0317 18:30:31.931903 431499 usertrap_amd64.go:212] [ 25720(2823): 25720(2823)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:31.931975 431499 usertrap_amd64.go:122] [ 25720(2823): 25720(2823)] Allocate a new trap: 0xc006dc8450 43 D0317 18:30:31.932090 431499 usertrap_amd64.go:225] [ 25720(2823): 25720(2823)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:31.937920 431499 task_exit.go:204] [ 25713( 101): 25713( 101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.938142 431499 task_signals.go:204] [ 25713( 101): 25719( 104)] Signal 9, PID: 25713, TID: 25719, fault addr: 0x0: terminating thread group D0317 18:30:31.938694 431499 task_signals.go:204] [ 25713( 101): 25715( 102)] Signal 9, PID: 25713, TID: 25715, fault addr: 0x0: terminating thread group D0317 18:30:31.938765 431499 task_exit.go:204] [ 25713( 101): 25719( 104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.939449 431499 task_exit.go:204] [ 25713( 101): 25719( 104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.939514 431499 task_exit.go:204] [ 25713( 101): 25719( 104)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.939872 431499 task_exit.go:204] [ 25713( 101): 25713( 101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.940078 431499 task_exit.go:204] [ 25713( 101): 25715( 102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.942571 431499 task_exit.go:204] [ 25720(2823): 25720(2823)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.942777 431499 task_signals.go:204] [ 25720(2823): 25722(2824)] Signal 9, PID: 25720, TID: 25722, fault addr: 0x0: terminating thread group D0317 18:30:31.942883 431499 task_exit.go:204] [ 25720(2823): 25722(2824)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:31.943872 431499 task_exit.go:204] [ 25720(2823): 25722(2824)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.944060 431499 task_exit.go:204] [ 25720(2823): 25722(2824)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.946723 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:31.946873 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 37 D0317 18:30:31.947466 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.947629 431499 task_exit.go:204] [ 25713( 101): 25715( 102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.947672 431499 task_exit.go:204] [ 25713( 101): 25715( 102)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.947785 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:31.947966 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:31.948133 431499 task_exit.go:204] [ 25717( 103): 25717( 103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.949885 431499 task_exit.go:204] [ 25713( 101): 25713( 101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:31.950669 431499 task_exit.go:204] [ 25720(2823): 25720(2823)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:31.950823 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:31.951021 431499 task_exit.go:204] [ 25720(2823): 25720(2823)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:31 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90880) write$P9_RLINK(r0, 0x0, 0x0) 18:30:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0317 18:30:31.967946 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:31.968072 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 38 D0317 18:30:31.968160 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:31.984029 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:31.984168 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 39 D0317 18:30:31.984244 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:31.988161 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:31.988270 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 37 D0317 18:30:31.989166 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:31.992328 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:31.992417 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 38 D0317 18:30:31.992491 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:31.995787 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:31.995889 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 36 D0317 18:30:31.995983 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:31.996098 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 40 D0317 18:30:31.996294 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:31.996625 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:31.998224 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:31.998297 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 41 D0317 18:30:31.998412 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:31.998619 431499 usertrap_amd64.go:212] [ 25721(1381): 25725(1382)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:31.999055 431499 usertrap_amd64.go:122] [ 25721(1381): 25725(1382)] Allocate a new trap: 0xc00628a8a0 42 D0317 18:30:31.999225 431499 usertrap_amd64.go:225] [ 25721(1381): 25725(1382)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.001696 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.001827 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 37 D0317 18:30:32.001928 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.002652 431499 usertrap_amd64.go:212] [ 25721(1381): 25721(1381)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.002761 431499 usertrap_amd64.go:122] [ 25721(1381): 25721(1381)] Allocate a new trap: 0xc00628a8a0 43 D0317 18:30:32.002953 431499 usertrap_amd64.go:225] [ 25721(1381): 25721(1381)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.007675 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.007746 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 39 D0317 18:30:32.007806 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.008735 431499 task_exit.go:204] [ 25721(1381): 25721(1381)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.008987 431499 task_signals.go:204] [ 25721(1381): 25725(1382)] Signal 9, PID: 25721, TID: 25725, fault addr: 0x0: terminating thread group D0317 18:30:32.009502 431499 task_exit.go:204] [ 25721(1381): 25721(1381)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.009649 431499 task_exit.go:204] [ 25721(1381): 25725(1382)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.016095 431499 task_exit.go:204] [ 25721(1381): 25725(1382)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.016194 431499 task_exit.go:204] [ 25721(1381): 25725(1382)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.016286 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.016455 431499 task_exit.go:204] [ 25721(1381): 25721(1381)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000000c0)={'fscrypt:', @auto=[0x0, 0x31, 0x0, 0x30, 0x0, 0x334bd69e4c95c066, 0x0, 0x5b]}, &(0x7f0000000100)={0x0, "54b8b10d8e0fc6329959138eef8636dc808f20410d661b0910e6c46a5c2aed4f71082bd5345dbeaac916fa634f99e35cc0cfc91b621de955bd29be1ef324a424"}, 0x48, 0xfffffffffffffffb) D0317 18:30:32.030161 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.030244 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 40 D0317 18:30:32.030341 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.031976 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.032082 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 38 D0317 18:30:32.032019 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.032225 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 41 D0317 18:30:32.032183 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.032355 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.032488 431499 usertrap_amd64.go:212] [ 25724(2825): 25726(2826)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.032661 431499 usertrap_amd64.go:122] [ 25724(2825): 25726(2826)] Allocate a new trap: 0xc003cb2390 42 D0317 18:30:32.032758 431499 usertrap_amd64.go:225] [ 25724(2825): 25726(2826)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.036706 431499 usertrap_amd64.go:212] [ 25724(2825): 25724(2825)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.036840 431499 usertrap_amd64.go:122] [ 25724(2825): 25724(2825)] Allocate a new trap: 0xc003cb2390 43 D0317 18:30:32.036958 431499 usertrap_amd64.go:225] [ 25724(2825): 25724(2825)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.040774 431499 task_exit.go:204] [ 25724(2825): 25724(2825)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.041004 431499 task_signals.go:204] [ 25724(2825): 25726(2826)] Signal 9, PID: 25724, TID: 25726, fault addr: 0x0: terminating thread group D0317 18:30:32.041191 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.041267 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 39 D0317 18:30:32.041370 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.041502 431499 task_exit.go:204] [ 25724(2825): 25726(2826)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.044766 431499 task_exit.go:204] [ 25724(2825): 25724(2825)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.044867 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.044919 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 40 D0317 18:30:32.044991 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.045220 431499 usertrap_amd64.go:212] [ 25723( 105): 25728( 106)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.045803 431499 usertrap_amd64.go:122] [ 25723( 105): 25728( 106)] Allocate a new trap: 0xc006e64780 41 D0317 18:30:32.046101 431499 usertrap_amd64.go:225] [ 25723( 105): 25728( 106)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.052707 431499 task_exit.go:204] [ 25724(2825): 25726(2826)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.053729 431499 task_exit.go:204] [ 25724(2825): 25726(2826)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.053905 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.054133 431499 task_exit.go:204] [ 25724(2825): 25724(2825)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.057370 431499 usertrap_amd64.go:212] [ 25723( 105): 25723( 105)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.057433 431499 usertrap_amd64.go:122] [ 25723( 105): 25723( 105)] Allocate a new trap: 0xc006e64780 42 D0317 18:30:32.057524 431499 usertrap_amd64.go:225] [ 25723( 105): 25723( 105)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) 18:30:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0317 18:30:32.061237 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.061328 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 37 D0317 18:30:32.062739 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.064425 431499 task_exit.go:204] [ 25723( 105): 25723( 105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.064626 431499 task_signals.go:204] [ 25723( 105): 25728( 106)] Signal 9, PID: 25723, TID: 25728, fault addr: 0x0: terminating thread group D0317 18:30:32.065116 431499 task_exit.go:204] [ 25723( 105): 25723( 105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.065242 431499 task_exit.go:204] [ 25723( 105): 25728( 106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.072165 431499 task_exit.go:204] [ 25723( 105): 25728( 106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.072267 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.072289 431499 task_exit.go:204] [ 25723( 105): 25728( 106)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.072352 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 38 D0317 18:30:32.072455 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.072471 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.072825 431499 task_exit.go:204] [ 25723( 105): 25723( 105)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: pipe2$watch_queue(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000000)=ANY=[@ANYRES8=r0]) D0317 18:30:32.089875 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.089950 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 39 D0317 18:30:32.090015 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.097088 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.097234 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 37 D0317 18:30:32.098241 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.102625 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.102685 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 38 D0317 18:30:32.102802 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.105994 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.106180 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 36 D0317 18:30:32.106845 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.110174 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.110267 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 37 D0317 18:30:32.110374 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.118730 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.118862 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 39 D0317 18:30:32.119017 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.131903 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.132017 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 40 D0317 18:30:32.131948 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.132146 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.132203 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 40 D0317 18:30:32.132346 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.134053 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.134141 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 41 D0317 18:30:32.134255 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.134350 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.134418 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 38 D0317 18:30:32.134491 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.134993 431499 usertrap_amd64.go:212] [ 25727(1383): 25731(1384)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.135133 431499 usertrap_amd64.go:122] [ 25727(1383): 25731(1384)] Allocate a new trap: 0xc006dc8480 42 D0317 18:30:32.135225 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.135359 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 41 D0317 18:30:32.135545 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.135484 431499 usertrap_amd64.go:225] [ 25727(1383): 25731(1384)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.137363 431499 usertrap_amd64.go:212] [ 25727(1383): 25727(1383)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.137452 431499 usertrap_amd64.go:122] [ 25727(1383): 25727(1383)] Allocate a new trap: 0xc006dc8480 43 D0317 18:30:32.137522 431499 usertrap_amd64.go:225] [ 25727(1383): 25727(1383)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.137993 431499 usertrap_amd64.go:212] [ 25729(2827): 25732(2828)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.138098 431499 usertrap_amd64.go:122] [ 25729(2827): 25732(2828)] Allocate a new trap: 0xc0026c65a0 42 D0317 18:30:32.138165 431499 usertrap_amd64.go:225] [ 25729(2827): 25732(2828)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.147792 431499 usertrap_amd64.go:212] [ 25729(2827): 25729(2827)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.147980 431499 usertrap_amd64.go:122] [ 25729(2827): 25729(2827)] Allocate a new trap: 0xc0026c65a0 43 D0317 18:30:32.148117 431499 usertrap_amd64.go:225] [ 25729(2827): 25729(2827)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.149041 431499 task_exit.go:204] [ 25727(1383): 25727(1383)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.149207 431499 task_signals.go:204] [ 25727(1383): 25731(1384)] Signal 9, PID: 25727, TID: 25731, fault addr: 0x0: terminating thread group D0317 18:30:32.149350 431499 task_exit.go:204] [ 25727(1383): 25731(1384)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.150135 431499 task_exit.go:204] [ 25727(1383): 25731(1384)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.150311 431499 task_exit.go:204] [ 25727(1383): 25731(1384)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.154458 431499 task_exit.go:204] [ 25729(2827): 25729(2827)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.155097 431499 task_signals.go:204] [ 25729(2827): 25732(2828)] Signal 9, PID: 25729, TID: 25732, fault addr: 0x0: terminating thread group D0317 18:30:32.155194 431499 task_exit.go:204] [ 25729(2827): 25732(2828)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.155385 431499 task_exit.go:204] [ 25729(2827): 25729(2827)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.159857 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.159944 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 39 D0317 18:30:32.160087 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.162046 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.162239 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 40 D0317 18:30:32.162439 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.162667 431499 task_exit.go:204] [ 25729(2827): 25732(2828)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.162746 431499 task_exit.go:204] [ 25729(2827): 25732(2828)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.162837 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.163140 431499 usertrap_amd64.go:212] [ 25730( 107): 25733( 108)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.163206 431499 usertrap_amd64.go:122] [ 25730( 107): 25733( 108)] Allocate a new trap: 0xc00628a900 41 D0317 18:30:32.163301 431499 usertrap_amd64.go:225] [ 25730( 107): 25733( 108)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.163992 431499 task_exit.go:204] [ 25727(1383): 25727(1383)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.164143 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.164270 431499 task_exit.go:204] [ 25727(1383): 25727(1383)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.164644 431499 task_exit.go:204] [ 25729(2827): 25729(2827)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006640)=[{{&(0x7f0000003b80)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, &(0x7f0000006840)=[{&(0x7f0000003bc0)="e6", 0x1}], 0x1}}], 0x1, 0x0) 18:30:32 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x800) D0317 18:30:32.169486 431499 usertrap_amd64.go:212] [ 25730( 107): 25730( 107)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.169579 431499 usertrap_amd64.go:122] [ 25730( 107): 25730( 107)] Allocate a new trap: 0xc00628a900 42 D0317 18:30:32.169649 431499 usertrap_amd64.go:225] [ 25730( 107): 25730( 107)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.181723 431499 task_exit.go:204] [ 25730( 107): 25730( 107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.182436 431499 task_signals.go:204] [ 25730( 107): 25733( 108)] Signal 9, PID: 25730, TID: 25733, fault addr: 0x0: terminating thread group D0317 18:30:32.182619 431499 task_exit.go:204] [ 25730( 107): 25730( 107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.182827 431499 task_exit.go:204] [ 25730( 107): 25733( 108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.190051 431499 task_exit.go:204] [ 25730( 107): 25733( 108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.190166 431499 task_exit.go:204] [ 25730( 107): 25733( 108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.190294 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.190848 431499 task_exit.go:204] [ 25730( 107): 25730( 107)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) D0317 18:30:32.198843 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.198947 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 37 D0317 18:30:32.201787 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.207808 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.207999 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 38 D0317 18:30:32.208184 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.209076 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.209197 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 37 D0317 18:30:32.209943 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.216564 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.216769 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 38 D0317 18:30:32.216873 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.226093 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.226188 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 39 D0317 18:30:32.226256 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.235204 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.235280 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 40 D0317 18:30:32.235359 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.237139 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.237265 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 41 D0317 18:30:32.237382 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.237592 431499 usertrap_amd64.go:212] [ 25734(1385): 25737(1386)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.237665 431499 usertrap_amd64.go:122] [ 25734(1385): 25737(1386)] Allocate a new trap: 0xc0023043c0 42 D0317 18:30:32.237783 431499 usertrap_amd64.go:225] [ 25734(1385): 25737(1386)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.238908 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.239002 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 39 D0317 18:30:32.239123 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.240465 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.240558 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 36 D0317 18:30:32.241510 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.241902 431499 usertrap_amd64.go:212] [ 25734(1385): 25734(1385)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.241979 431499 usertrap_amd64.go:122] [ 25734(1385): 25734(1385)] Allocate a new trap: 0xc0023043c0 43 D0317 18:30:32.242107 431499 usertrap_amd64.go:225] [ 25734(1385): 25734(1385)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.245907 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.246003 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 37 D0317 18:30:32.246262 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.248192 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.248263 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 40 D0317 18:30:32.248449 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.250220 431499 task_exit.go:204] [ 25734(1385): 25734(1385)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.250333 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.250417 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 41 D0317 18:30:32.250509 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.250625 431499 task_signals.go:204] [ 25734(1385): 25737(1386)] Signal 9, PID: 25734, TID: 25737, fault addr: 0x0: terminating thread group D0317 18:30:32.251123 431499 usertrap_amd64.go:212] [ 25735(2829): 25738(2830)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.251194 431499 usertrap_amd64.go:122] [ 25735(2829): 25738(2830)] Allocate a new trap: 0xc006dc84b0 42 D0317 18:30:32.251268 431499 usertrap_amd64.go:225] [ 25735(2829): 25738(2830)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.251400 431499 task_exit.go:204] [ 25734(1385): 25737(1386)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.251557 431499 task_exit.go:204] [ 25734(1385): 25734(1385)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.253866 431499 usertrap_amd64.go:212] [ 25735(2829): 25735(2829)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.253939 431499 usertrap_amd64.go:122] [ 25735(2829): 25735(2829)] Allocate a new trap: 0xc006dc84b0 43 D0317 18:30:32.254051 431499 usertrap_amd64.go:225] [ 25735(2829): 25735(2829)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.258467 431499 task_exit.go:204] [ 25735(2829): 25735(2829)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.258650 431499 task_signals.go:204] [ 25735(2829): 25738(2830)] Signal 9, PID: 25735, TID: 25738, fault addr: 0x0: terminating thread group D0317 18:30:32.259070 431499 task_exit.go:204] [ 25735(2829): 25735(2829)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.259199 431499 task_exit.go:204] [ 25735(2829): 25738(2830)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.265821 431499 task_exit.go:204] [ 25735(2829): 25738(2830)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.265896 431499 task_exit.go:204] [ 25735(2829): 25738(2830)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.265992 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.267718 431499 task_exit.go:204] [ 25735(2829): 25735(2829)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000740)="d5", 0x1}], 0x2}}], 0x1, 0x0) D0317 18:30:32.272870 431499 task_exit.go:204] [ 25734(1385): 25737(1386)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.272993 431499 task_exit.go:204] [ 25734(1385): 25737(1386)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.273133 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.272905 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.273226 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 38 D0317 18:30:32.273337 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.273629 431499 task_exit.go:204] [ 25734(1385): 25734(1385)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x2}, &(0x7f0000000080)={0x3}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) D0317 18:30:32.286862 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.286975 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 39 D0317 18:30:32.287136 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.289660 431499 usertrap_amd64.go:212] [ 25736( 109): 25739( 110)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.289767 431499 usertrap_amd64.go:122] [ 25736( 109): 25739( 110)] Allocate a new trap: 0xc0026c6600 40 D0317 18:30:32.289835 431499 usertrap_amd64.go:225] [ 25736( 109): 25739( 110)] Apply the binary patch addr 55a8b05c0320 trap addr 64c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.290565 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.290704 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 41 D0317 18:30:32.290821 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b05c0c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.294368 431499 usertrap_amd64.go:212] [ 25736( 109): 25736( 109)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.294500 431499 usertrap_amd64.go:122] [ 25736( 109): 25736( 109)] Allocate a new trap: 0xc0026c6600 42 D0317 18:30:32.294602 431499 usertrap_amd64.go:225] [ 25736( 109): 25736( 109)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.299190 431499 task_exit.go:204] [ 25736( 109): 25736( 109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.299871 431499 task_signals.go:204] [ 25736( 109): 25739( 110)] Signal 9, PID: 25736, TID: 25739, fault addr: 0x0: terminating thread group D0317 18:30:32.299870 431499 task_exit.go:204] [ 25736( 109): 25736( 109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.299964 431499 task_exit.go:204] [ 25736( 109): 25739( 110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.305730 431499 task_exit.go:204] [ 25736( 109): 25739( 110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.305813 431499 task_exit.go:204] [ 25736( 109): 25739( 110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.305893 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.305997 431499 task_exit.go:204] [ 25736( 109): 25736( 109)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=""/2, 0x2}, 0x42) D0317 18:30:32.317261 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.317402 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 37 D0317 18:30:32.318193 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.323397 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.323470 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 38 D0317 18:30:32.323550 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.329404 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.329500 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 37 D0317 18:30:32.330313 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.335665 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.335789 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 38 D0317 18:30:32.335850 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.348567 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.348633 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 39 D0317 18:30:32.348761 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.352407 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.352589 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 36 D0317 18:30:32.352700 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.352817 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 39 D0317 18:30:32.352892 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.353382 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.357082 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.357136 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 37 D0317 18:30:32.357220 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.360149 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.360250 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 40 D0317 18:30:32.360390 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.360785 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.360858 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 40 D0317 18:30:32.360928 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.362046 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.362119 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 41 D0317 18:30:32.362212 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.362509 431499 usertrap_amd64.go:212] [ 25740(2831): 25743(2832)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.362585 431499 usertrap_amd64.go:122] [ 25740(2831): 25743(2832)] Allocate a new trap: 0xc0000462a0 42 D0317 18:30:32.362646 431499 usertrap_amd64.go:225] [ 25740(2831): 25743(2832)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.363278 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.363346 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 41 D0317 18:30:32.363417 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.364072 431499 usertrap_amd64.go:212] [ 25741(1387): 25744(1388)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.364159 431499 usertrap_amd64.go:122] [ 25741(1387): 25744(1388)] Allocate a new trap: 0xc000046300 42 D0317 18:30:32.364264 431499 usertrap_amd64.go:225] [ 25741(1387): 25744(1388)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.366572 431499 usertrap_amd64.go:212] [ 25741(1387): 25741(1387)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.366654 431499 usertrap_amd64.go:122] [ 25741(1387): 25741(1387)] Allocate a new trap: 0xc000046300 43 D0317 18:30:32.366749 431499 usertrap_amd64.go:225] [ 25741(1387): 25741(1387)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.369857 431499 usertrap_amd64.go:212] [ 25740(2831): 25740(2831)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.369936 431499 usertrap_amd64.go:122] [ 25740(2831): 25740(2831)] Allocate a new trap: 0xc0000462a0 43 D0317 18:30:32.370058 431499 usertrap_amd64.go:225] [ 25740(2831): 25740(2831)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.370993 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.371064 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 38 D0317 18:30:32.371190 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.371697 431499 task_exit.go:204] [ 25741(1387): 25741(1387)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.372426 431499 task_signals.go:204] [ 25741(1387): 25744(1388)] Signal 9, PID: 25741, TID: 25744, fault addr: 0x0: terminating thread group D0317 18:30:32.372446 431499 task_exit.go:204] [ 25741(1387): 25741(1387)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.372730 431499 task_exit.go:204] [ 25741(1387): 25744(1388)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.376196 431499 task_exit.go:204] [ 25740(2831): 25740(2831)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.376502 431499 task_signals.go:204] [ 25740(2831): 25743(2832)] Signal 9, PID: 25740, TID: 25743, fault addr: 0x0: terminating thread group D0317 18:30:32.377194 431499 task_exit.go:204] [ 25740(2831): 25740(2831)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.377338 431499 task_exit.go:204] [ 25740(2831): 25743(2832)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.378567 431499 task_exit.go:204] [ 25741(1387): 25744(1388)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.378714 431499 task_exit.go:204] [ 25741(1387): 25744(1388)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.378871 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.379061 431499 task_exit.go:204] [ 25741(1387): 25741(1387)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001740)=[{{&(0x7f00000001c0)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private1}}}], 0x28}}], 0x1, 0x0) D0317 18:30:32.384132 431499 task_exit.go:204] [ 25740(2831): 25743(2832)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.384286 431499 task_exit.go:204] [ 25740(2831): 25743(2832)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.384457 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.384668 431499 task_exit.go:204] [ 25740(2831): 25740(2831)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.385807 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.385880 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 39 D0317 18:30:32.385944 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) 18:30:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast1}}) D0317 18:30:32.387529 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.387598 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 40 D0317 18:30:32.387704 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.388395 431499 usertrap_amd64.go:212] [ 25742( 111): 25745( 112)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.388461 431499 usertrap_amd64.go:122] [ 25742( 111): 25745( 112)] Allocate a new trap: 0xc0067dc510 41 D0317 18:30:32.388550 431499 usertrap_amd64.go:225] [ 25742( 111): 25745( 112)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.391070 431499 usertrap_amd64.go:212] [ 25742( 111): 25742( 111)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.391133 431499 usertrap_amd64.go:122] [ 25742( 111): 25742( 111)] Allocate a new trap: 0xc0067dc510 42 D0317 18:30:32.391227 431499 usertrap_amd64.go:225] [ 25742( 111): 25742( 111)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.397733 431499 task_exit.go:204] [ 25742( 111): 25742( 111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.399226 431499 task_signals.go:204] [ 25742( 111): 25745( 112)] Signal 9, PID: 25742, TID: 25745, fault addr: 0x0: terminating thread group D0317 18:30:32.400058 431499 task_exit.go:204] [ 25742( 111): 25745( 112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.400314 431499 task_exit.go:204] [ 25742( 111): 25742( 111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.406380 431499 task_exit.go:204] [ 25742( 111): 25745( 112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.406439 431499 task_exit.go:204] [ 25742( 111): 25745( 112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.406510 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.407642 431499 task_exit.go:204] [ 25742( 111): 25742( 111)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast2}}) D0317 18:30:32.414499 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.414572 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 37 D0317 18:30:32.415395 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.418918 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.419007 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 38 D0317 18:30:32.419091 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.428379 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.428491 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 37 D0317 18:30:32.429397 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.431172 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.431259 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 39 D0317 18:30:32.431337 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.433193 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.433248 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 38 D0317 18:30:32.433315 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.444043 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.444187 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 40 D0317 18:30:32.444344 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.445596 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.445705 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 36 D0317 18:30:32.446224 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.446294 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 41 D0317 18:30:32.446370 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.446889 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.447732 431499 usertrap_amd64.go:212] [ 25746(1389): 25749(1390)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.447863 431499 usertrap_amd64.go:122] [ 25746(1389): 25749(1390)] Allocate a new trap: 0xc003cb24e0 42 D0317 18:30:32.447959 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.448039 431499 usertrap_amd64.go:225] [ 25746(1389): 25749(1390)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.448019 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 39 D0317 18:30:32.448330 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.450280 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.450347 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 37 D0317 18:30:32.450407 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.452956 431499 usertrap_amd64.go:212] [ 25746(1389): 25746(1389)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.453148 431499 usertrap_amd64.go:122] [ 25746(1389): 25746(1389)] Allocate a new trap: 0xc003cb24e0 43 D0317 18:30:32.453664 431499 usertrap_amd64.go:225] [ 25746(1389): 25746(1389)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.459739 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.459821 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 40 D0317 18:30:32.459918 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.461572 431499 task_exit.go:204] [ 25746(1389): 25746(1389)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.461714 431499 task_signals.go:204] [ 25746(1389): 25749(1390)] Signal 9, PID: 25746, TID: 25749, fault addr: 0x0: terminating thread group D0317 18:30:32.462162 431499 task_exit.go:204] [ 25746(1389): 25746(1389)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.462267 431499 task_exit.go:204] [ 25746(1389): 25749(1390)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.463149 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.463229 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 41 D0317 18:30:32.463419 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.464264 431499 usertrap_amd64.go:212] [ 25747(2833): 25750(2834)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.464512 431499 usertrap_amd64.go:122] [ 25747(2833): 25750(2834)] Allocate a new trap: 0xc0040ca660 42 D0317 18:30:32.464605 431499 usertrap_amd64.go:225] [ 25747(2833): 25750(2834)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.465123 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.465186 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 38 D0317 18:30:32.466146 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.468915 431499 usertrap_amd64.go:212] [ 25747(2833): 25747(2833)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.468991 431499 task_exit.go:204] [ 25746(1389): 25749(1390)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.468994 431499 usertrap_amd64.go:122] [ 25747(2833): 25747(2833)] Allocate a new trap: 0xc0040ca660 43 D0317 18:30:32.469048 431499 task_exit.go:204] [ 25746(1389): 25749(1390)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.469100 431499 usertrap_amd64.go:225] [ 25747(2833): 25747(2833)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.469173 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.470012 431499 task_exit.go:204] [ 25746(1389): 25746(1389)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 2: mount$9p_fd(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0) D0317 18:30:32.480456 431499 task_exit.go:204] [ 25747(2833): 25747(2833)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.480734 431499 task_signals.go:204] [ 25747(2833): 25750(2834)] Signal 9, PID: 25747, TID: 25750, fault addr: 0x0: terminating thread group D0317 18:30:32.481306 431499 task_exit.go:204] [ 25747(2833): 25747(2833)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.481440 431499 task_exit.go:204] [ 25747(2833): 25750(2834)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.481668 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.481852 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 39 D0317 18:30:32.482604 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.484094 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.484181 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 40 D0317 18:30:32.484301 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.485136 431499 usertrap_amd64.go:212] [ 25748( 113): 25751( 114)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.485183 431499 usertrap_amd64.go:122] [ 25748( 113): 25751( 114)] Allocate a new trap: 0xc0026c6690 41 D0317 18:30:32.485287 431499 usertrap_amd64.go:225] [ 25748( 113): 25751( 114)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.488151 431499 task_exit.go:204] [ 25747(2833): 25750(2834)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.488232 431499 task_exit.go:204] [ 25747(2833): 25750(2834)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.488393 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.488594 431499 task_exit.go:204] [ 25747(2833): 25747(2833)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 0: add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="d1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', 0x0) D0317 18:30:32.490247 431499 usertrap_amd64.go:212] [ 25748( 113): 25748( 113)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.490312 431499 usertrap_amd64.go:122] [ 25748( 113): 25748( 113)] Allocate a new trap: 0xc0026c6690 42 D0317 18:30:32.490424 431499 usertrap_amd64.go:225] [ 25748( 113): 25748( 113)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.494738 431499 task_exit.go:204] [ 25748( 113): 25748( 113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.495326 431499 task_exit.go:204] [ 25748( 113): 25748( 113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.495652 431499 task_signals.go:204] [ 25748( 113): 25751( 114)] Signal 9, PID: 25748, TID: 25751, fault addr: 0x0: terminating thread group D0317 18:30:32.495816 431499 task_exit.go:204] [ 25748( 113): 25751( 114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.505830 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.506116 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 37 D0317 18:30:32.506754 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.507647 431499 usertrap_amd64.go:212] [ 25709( 182): 25709( 182)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:32.507742 431499 usertrap_amd64.go:122] [ 25709( 182): 25709( 182)] Allocate a new trap: 0xc002780540 43 D0317 18:30:32.507832 431499 usertrap_amd64.go:225] [ 25709( 182): 25709( 182)] Apply the binary patch addr 5637f879ac93 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0317 18:30:32.510991 431499 task_exit.go:204] [ 25709( 182): 25709( 182)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.511113 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.511177 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 38 D0317 18:30:32.511241 431499 task_signals.go:204] [ 25709( 182): 25712( 183)] Signal 9, PID: 25709, TID: 25712, fault addr: 0x0: terminating thread group D0317 18:30:32.511300 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.511950 431499 task_exit.go:204] [ 25709( 182): 25709( 182)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.512146 431499 task_exit.go:204] [ 25709( 182): 25712( 183)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.513003 431499 task_exit.go:204] [ 25748( 113): 25751( 114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.513077 431499 task_exit.go:204] [ 25748( 113): 25751( 114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.513205 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.513477 431499 task_exit.go:204] [ 25748( 113): 25748( 113)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: clock_gettime(0xb, &(0x7f0000004700)) D0317 18:30:32.518792 431499 task_exit.go:204] [ 25709( 182): 25712( 183)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.518887 431499 task_exit.go:204] [ 25709( 182): 25712( 183)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.518991 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:32.519262 431499 task_exit.go:204] [ 25709( 182): 25709( 182)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89ff, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:32.526133 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.526252 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 39 D0317 18:30:32.526338 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.536734 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.536829 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 37 D0317 18:30:32.537192 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.537383 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 40 D0317 18:30:32.537545 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.537929 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.539701 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.539907 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 41 D0317 18:30:32.540380 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.540932 431499 usertrap_amd64.go:212] [ 25752(1391): 25755(1392)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.541001 431499 usertrap_amd64.go:122] [ 25752(1391): 25755(1392)] Allocate a new trap: 0xc003cb2540 42 D0317 18:30:32.541061 431499 usertrap_amd64.go:225] [ 25752(1391): 25755(1392)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.542458 431499 usertrap_amd64.go:212] [ 25752(1391): 25752(1391)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.542655 431499 usertrap_amd64.go:122] [ 25752(1391): 25752(1391)] Allocate a new trap: 0xc003cb2540 43 D0317 18:30:32.542822 431499 usertrap_amd64.go:225] [ 25752(1391): 25752(1391)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.549050 431499 task_exit.go:204] [ 25752(1391): 25752(1391)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.549608 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.549675 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 38 D0317 18:30:32.549732 431499 task_signals.go:204] [ 25752(1391): 25755(1392)] Signal 9, PID: 25752, TID: 25755, fault addr: 0x0: terminating thread group D0317 18:30:32.549743 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.549756 431499 task_exit.go:204] [ 25752(1391): 25752(1391)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.549839 431499 task_exit.go:204] [ 25752(1391): 25755(1392)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.558889 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.558970 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 36 D0317 18:30:32.560067 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.563691 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.563766 431499 task_exit.go:204] [ 25752(1391): 25755(1392)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.563814 431499 task_exit.go:204] [ 25752(1391): 25755(1392)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.563773 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 37 D0317 18:30:32.563881 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.563919 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.564096 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:32.564202 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 36 D0317 18:30:32.564146 431499 task_exit.go:204] [ 25752(1391): 25752(1391)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.565296 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.565353 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 39 D0317 18:30:32.565417 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000008080)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000013580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1) D0317 18:30:32.571935 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:32.578481 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:32.578557 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 37 D0317 18:30:32.578629 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:32.579600 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.579656 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.579699 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 40 D0317 18:30:32.579728 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 38 D0317 18:30:32.579763 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.579811 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.581649 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.581907 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 41 D0317 18:30:32.582032 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.582567 431499 usertrap_amd64.go:212] [ 25753(2835): 25757(2836)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.582740 431499 usertrap_amd64.go:122] [ 25753(2835): 25757(2836)] Allocate a new trap: 0xc006f9c1b0 42 D0317 18:30:32.582981 431499 usertrap_amd64.go:225] [ 25753(2835): 25757(2836)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:32.584986 431499 usertrap_amd64.go:212] [ 25753(2835): 25753(2835)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.585060 431499 usertrap_amd64.go:122] [ 25753(2835): 25753(2835)] Allocate a new trap: 0xc006f9c1b0 43 D0317 18:30:32.585131 431499 usertrap_amd64.go:225] [ 25753(2835): 25753(2835)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.595557 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:32.595690 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 38 D0317 18:30:32.595770 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:32.599094 431499 task_exit.go:204] [ 25753(2835): 25753(2835)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.600142 431499 task_signals.go:204] [ 25753(2835): 25757(2836)] Signal 9, PID: 25753, TID: 25757, fault addr: 0x0: terminating thread group D0317 18:30:32.600335 431499 task_exit.go:204] [ 25753(2835): 25753(2835)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.600631 431499 task_exit.go:204] [ 25753(2835): 25757(2836)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.606360 431499 task_exit.go:204] [ 25753(2835): 25757(2836)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.606455 431499 task_exit.go:204] [ 25753(2835): 25757(2836)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.606551 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.606707 431499 task_exit.go:204] [ 25753(2835): 25753(2835)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.609768 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:32.609933 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 39 D0317 18:30:32.610110 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:32.610366 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.610428 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 39 D0317 18:30:32.610493 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.612298 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:32.612344 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 40 D0317 18:30:32.612418 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:32.614212 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.614330 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 40 D0317 18:30:32.614523 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.615766 431499 usertrap_amd64.go:212] [ 25754( 115): 25760( 116)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.615866 431499 usertrap_amd64.go:122] [ 25754( 115): 25760( 116)] Allocate a new trap: 0xc006f9c1e0 41 D0317 18:30:32.616098 431499 usertrap_amd64.go:225] [ 25754( 115): 25760( 116)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) 18:30:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001740)=[{{&(0x7f00000001c0)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0xffffff00}}], 0x18}}], 0x1, 0x0) D0317 18:30:32.618019 431499 usertrap_amd64.go:212] [ 25754( 115): 25754( 115)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.618141 431499 usertrap_amd64.go:122] [ 25754( 115): 25754( 115)] Allocate a new trap: 0xc006f9c1e0 42 D0317 18:30:32.618287 431499 usertrap_amd64.go:225] [ 25754( 115): 25754( 115)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.620225 431499 usertrap_amd64.go:212] [ 25756( 184): 25759( 185)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:32.620436 431499 usertrap_amd64.go:122] [ 25756( 184): 25759( 185)] Allocate a new trap: 0xc0027805a0 41 D0317 18:30:32.620610 431499 usertrap_amd64.go:225] [ 25756( 184): 25759( 185)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:32.625395 431499 task_exit.go:204] [ 25754( 115): 25754( 115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.626135 431499 task_exit.go:204] [ 25754( 115): 25754( 115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.626165 431499 task_signals.go:204] [ 25754( 115): 25760( 116)] Signal 9, PID: 25754, TID: 25760, fault addr: 0x0: terminating thread group D0317 18:30:32.626392 431499 task_exit.go:204] [ 25754( 115): 25760( 116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.628312 431499 usertrap_amd64.go:212] [ 25756( 184): 25756( 184)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:32.628414 431499 usertrap_amd64.go:122] [ 25756( 184): 25756( 184)] Allocate a new trap: 0xc0027805a0 42 D0317 18:30:32.628500 431499 usertrap_amd64.go:225] [ 25756( 184): 25756( 184)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:32.630606 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.630702 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 37 D0317 18:30:32.631650 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.633404 431499 task_exit.go:204] [ 25754( 115): 25760( 116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.633711 431499 task_exit.go:204] [ 25754( 115): 25760( 116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.633914 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.634391 431499 task_exit.go:204] [ 25754( 115): 25754( 115)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8923, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:32.636762 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.636824 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 38 D0317 18:30:32.636916 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.640128 431499 task_signals.go:204] [ 25756( 184): 25759( 185)] Signal 9, PID: 25756, TID: 25759, fault addr: 0x0: terminating thread group D0317 18:30:32.640203 431499 task_exit.go:204] [ 25756( 184): 25759( 185)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.640839 431499 task_exit.go:204] [ 25756( 184): 25759( 185)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.640937 431499 task_exit.go:204] [ 25756( 184): 25759( 185)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.641069 431499 task_exit.go:204] [ 25756( 184): 25756( 184)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.652190 431499 task_exit.go:204] [ 25756( 184): 25756( 184)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.652397 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:32.656215 431499 task_exit.go:204] [ 25756( 184): 25756( 184)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 1: mount$9p_fd(0x0, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) D0317 18:30:32.662398 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.662503 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 39 D0317 18:30:32.662597 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.666499 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.666623 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 37 D0317 18:30:32.667718 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.675331 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.675453 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 38 D0317 18:30:32.675656 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.678852 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.678967 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 36 D0317 18:30:32.679731 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.680138 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.680233 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 40 D0317 18:30:32.680309 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.681671 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.681742 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 41 D0317 18:30:32.681878 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.683720 431499 usertrap_amd64.go:212] [ 25758(1393): 25763(1394)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.683810 431499 usertrap_amd64.go:122] [ 25758(1393): 25763(1394)] Allocate a new trap: 0xc0040ca6c0 42 D0317 18:30:32.685010 431499 usertrap_amd64.go:225] [ 25758(1393): 25763(1394)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.687906 431499 usertrap_amd64.go:212] [ 25758(1393): 25758(1393)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.688004 431499 usertrap_amd64.go:122] [ 25758(1393): 25758(1393)] Allocate a new trap: 0xc0040ca6c0 43 D0317 18:30:32.688092 431499 usertrap_amd64.go:225] [ 25758(1393): 25758(1393)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.690741 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.690805 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 39 D0317 18:30:32.690903 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.691756 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.691822 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 37 D0317 18:30:32.691888 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.698197 431499 task_exit.go:204] [ 25758(1393): 25758(1393)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.698898 431499 task_exit.go:204] [ 25758(1393): 25758(1393)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.699061 431499 task_signals.go:204] [ 25758(1393): 25763(1394)] Signal 9, PID: 25758, TID: 25763, fault addr: 0x0: terminating thread group D0317 18:30:32.699155 431499 task_exit.go:204] [ 25758(1393): 25763(1394)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.708400 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.708558 431499 task_exit.go:204] [ 25758(1393): 25763(1394)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.708580 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 40 D0317 18:30:32.708630 431499 task_exit.go:204] [ 25758(1393): 25763(1394)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.708738 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.708765 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.710839 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.710923 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 41 D0317 18:30:32.711156 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.711720 431499 task_exit.go:204] [ 25758(1393): 25758(1393)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.712047 431499 usertrap_amd64.go:212] [ 25761(2837): 25765(2838)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.712119 431499 usertrap_amd64.go:122] [ 25761(2837): 25765(2838)] Allocate a new trap: 0xc0027805d0 42 D0317 18:30:32.712303 431499 usertrap_amd64.go:225] [ 25761(2837): 25765(2838)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) 18:30:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000)=0xffffffd8, 0x4) D0317 18:30:32.719584 431499 usertrap_amd64.go:212] [ 25761(2837): 25761(2837)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.720252 431499 usertrap_amd64.go:122] [ 25761(2837): 25761(2837)] Allocate a new trap: 0xc0027805d0 43 D0317 18:30:32.720346 431499 usertrap_amd64.go:225] [ 25761(2837): 25761(2837)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.723322 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.723401 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 38 D0317 18:30:32.723499 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.728090 431499 task_exit.go:204] [ 25761(2837): 25761(2837)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.728482 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:32.728594 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 36 D0317 18:30:32.728725 431499 task_signals.go:204] [ 25761(2837): 25765(2838)] Signal 9, PID: 25761, TID: 25765, fault addr: 0x0: terminating thread group D0317 18:30:32.728779 431499 task_exit.go:204] [ 25761(2837): 25761(2837)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.728862 431499 task_exit.go:204] [ 25761(2837): 25765(2838)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.729569 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:32.734996 431499 task_exit.go:204] [ 25761(2837): 25765(2838)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.735069 431499 task_exit.go:204] [ 25761(2837): 25765(2838)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.735168 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.735813 431499 task_exit.go:204] [ 25761(2837): 25761(2837)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @private2}}) D0317 18:30:32.739162 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.739312 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 39 D0317 18:30:32.739482 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:32.739728 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 37 D0317 18:30:32.739838 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:32.739693 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.742109 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.742371 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 40 D0317 18:30:32.742509 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:32.744425 431499 usertrap_amd64.go:212] [ 25762( 117): 25766( 118)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:32.744587 431499 usertrap_amd64.go:122] [ 25762( 117): 25766( 118)] Allocate a new trap: 0xc0026c6720 41 D0317 18:30:32.744849 431499 usertrap_amd64.go:225] [ 25762( 117): 25766( 118)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:32.756157 431499 usertrap_amd64.go:212] [ 25762( 117): 25762( 117)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:32.756227 431499 usertrap_amd64.go:122] [ 25762( 117): 25762( 117)] Allocate a new trap: 0xc0026c6720 42 D0317 18:30:32.756282 431499 usertrap_amd64.go:225] [ 25762( 117): 25762( 117)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:32.763179 431499 task_exit.go:204] [ 25762( 117): 25762( 117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.763788 431499 task_exit.go:204] [ 25762( 117): 25762( 117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.763966 431499 task_signals.go:204] [ 25762( 117): 25766( 118)] Signal 9, PID: 25762, TID: 25766, fault addr: 0x0: terminating thread group D0317 18:30:32.764070 431499 task_exit.go:204] [ 25762( 117): 25766( 118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.773883 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:32.773970 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 37 D0317 18:30:32.774073 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:32.774168 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 38 D0317 18:30:32.774329 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:32.774787 431499 task_exit.go:204] [ 25762( 117): 25766( 118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.774852 431499 task_exit.go:204] [ 25762( 117): 25766( 118)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.774959 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:32.774717 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:32.775148 431499 task_exit.go:204] [ 25762( 117): 25762( 117)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 3: semctl$IPC_STAT(0x0, 0x0, 0x11, 0x0) D0317 18:30:32.862288 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:32.862567 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 39 D0317 18:30:32.862754 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:32.865739 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:32.865926 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 40 D0317 18:30:32.866062 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:32.872238 431499 usertrap_amd64.go:212] [ 25764( 186): 25768( 187)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:32.872313 431499 usertrap_amd64.go:122] [ 25764( 186): 25768( 187)] Allocate a new trap: 0xc002780600 41 D0317 18:30:32.872458 431499 usertrap_amd64.go:225] [ 25764( 186): 25768( 187)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:32.873936 431499 usertrap_amd64.go:212] [ 25764( 186): 25764( 186)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:32.874006 431499 usertrap_amd64.go:122] [ 25764( 186): 25764( 186)] Allocate a new trap: 0xc002780600 42 D0317 18:30:32.874073 431499 usertrap_amd64.go:225] [ 25764( 186): 25764( 186)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:32.878177 431499 task_exit.go:204] [ 25764( 186): 25764( 186)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.879128 431499 task_signals.go:204] [ 25764( 186): 25768( 187)] Signal 9, PID: 25764, TID: 25768, fault addr: 0x0: terminating thread group D0317 18:30:32.879252 431499 task_exit.go:204] [ 25764( 186): 25764( 186)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.880013 431499 task_exit.go:204] [ 25764( 186): 25768( 187)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.880463 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:32.880638 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 38 D0317 18:30:32.880746 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:32.891635 431499 task_exit.go:204] [ 25764( 186): 25768( 187)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.891813 431499 task_exit.go:204] [ 25764( 186): 25768( 187)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.891994 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:32.898121 431499 task_exit.go:204] [ 25764( 186): 25764( 186)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.898622 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:32.898761 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 37 18:30:32 executing program 1: chroot(&(0x7f0000000000)='./file0/file0\x00') D0317 18:30:32.904253 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:32.904372 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 39 D0317 18:30:32.904513 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:32.908549 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:32.914519 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:32.914644 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 38 D0317 18:30:32.914771 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:32.916662 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:32.916803 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 36 D0317 18:30:32.917676 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:32.917808 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:32.917905 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 40 D0317 18:30:32.918034 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:32.920036 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:32.920179 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 41 D0317 18:30:32.920277 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:32.920510 431499 usertrap_amd64.go:212] [ 25767(1395): 25771(1396)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:32.920580 431499 usertrap_amd64.go:122] [ 25767(1395): 25771(1396)] Allocate a new trap: 0xc0026c6750 42 D0317 18:30:32.920709 431499 usertrap_amd64.go:225] [ 25767(1395): 25771(1396)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:32.925466 431499 usertrap_amd64.go:212] [ 25767(1395): 25767(1395)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:32.925571 431499 usertrap_amd64.go:122] [ 25767(1395): 25767(1395)] Allocate a new trap: 0xc0026c6750 43 D0317 18:30:32.925730 431499 usertrap_amd64.go:225] [ 25767(1395): 25767(1395)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:32.927096 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:32.927153 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 37 D0317 18:30:32.927273 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:32.932819 431499 task_exit.go:204] [ 25767(1395): 25767(1395)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.933583 431499 task_exit.go:204] [ 25767(1395): 25767(1395)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.933585 431499 task_signals.go:204] [ 25767(1395): 25771(1396)] Signal 9, PID: 25767, TID: 25771, fault addr: 0x0: terminating thread group D0317 18:30:32.933964 431499 task_exit.go:204] [ 25767(1395): 25771(1396)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.939432 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:32.939671 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 39 D0317 18:30:32.939754 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:32.942147 431499 task_exit.go:204] [ 25767(1395): 25771(1396)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.942266 431499 task_exit.go:204] [ 25767(1395): 25771(1396)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.942354 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:32.947794 431499 task_exit.go:204] [ 25767(1395): 25767(1395)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.950659 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:32.950730 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 40 D0317 18:30:32.950865 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:32.952307 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:32.952495 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 41 D0317 18:30:32.952634 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:32.953256 431499 usertrap_amd64.go:212] [ 25769(2839): 25773(2840)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:32.953339 431499 usertrap_amd64.go:122] [ 25769(2839): 25773(2840)] Allocate a new trap: 0xc006f9c210 42 D0317 18:30:32.953427 431499 usertrap_amd64.go:225] [ 25769(2839): 25773(2840)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) 18:30:32 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000000c0)=' [255 36 37 64 43 6 0]) D0317 18:30:32.960849 431499 usertrap_amd64.go:212] [ 25769(2839): 25769(2839)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:32.960962 431499 usertrap_amd64.go:122] [ 25769(2839): 25769(2839)] Allocate a new trap: 0xc006f9c210 43 D0317 18:30:32.961078 431499 usertrap_amd64.go:225] [ 25769(2839): 25769(2839)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:32.965263 431499 task_exit.go:204] [ 25769(2839): 25769(2839)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.965832 431499 task_signals.go:204] [ 25769(2839): 25773(2840)] Signal 9, PID: 25769, TID: 25773, fault addr: 0x0: terminating thread group D0317 18:30:32.965928 431499 task_exit.go:204] [ 25769(2839): 25769(2839)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.966240 431499 task_exit.go:204] [ 25769(2839): 25773(2840)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:32.966745 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:32.966829 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 38 D0317 18:30:32.966949 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:32.968573 431499 usertrap_amd64.go:212] [ 25772( 188): 25772( 188)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:32.968759 431499 usertrap_amd64.go:122] [ 25772( 188): 25772( 188)] Allocate a new trap: 0xc0040ca720 37 D0317 18:30:32.968862 431499 usertrap_amd64.go:225] [ 25772( 188): 25772( 188)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:32.974017 431499 task_exit.go:204] [ 25769(2839): 25773(2840)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:32.974089 431499 task_exit.go:204] [ 25769(2839): 25773(2840)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:32.974176 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:32.974434 431499 task_exit.go:204] [ 25769(2839): 25769(2839)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006640)=[{{&(0x7f0000003b80)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, &(0x7f0000006840)=[{&(0x7f0000003bc0)="e6", 0x1}], 0x1}}], 0x1, 0x8014) D0317 18:30:32.990643 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:32.990733 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 39 D0317 18:30:32.990799 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:32.995762 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:32.995848 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 40 D0317 18:30:32.995965 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.003865 431499 usertrap_amd64.go:212] [ 25770( 119): 25774( 120)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.004592 431499 usertrap_amd64.go:122] [ 25770( 119): 25774( 120)] Allocate a new trap: 0xc0026c6780 41 D0317 18:30:33.004682 431499 usertrap_amd64.go:225] [ 25770( 119): 25774( 120)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.007037 431499 usertrap_amd64.go:212] [ 25770( 119): 25770( 119)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.008843 431499 usertrap_amd64.go:122] [ 25770( 119): 25770( 119)] Allocate a new trap: 0xc0026c6780 42 D0317 18:30:33.009001 431499 usertrap_amd64.go:225] [ 25770( 119): 25770( 119)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.012564 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.012630 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 37 D0317 18:30:33.013511 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.014568 431499 task_exit.go:204] [ 25770( 119): 25770( 119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.015196 431499 task_exit.go:204] [ 25770( 119): 25770( 119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.015350 431499 task_signals.go:204] [ 25770( 119): 25774( 120)] Signal 9, PID: 25770, TID: 25774, fault addr: 0x0: terminating thread group D0317 18:30:33.015662 431499 task_exit.go:204] [ 25770( 119): 25774( 120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.017593 431499 usertrap_amd64.go:212] [ 25772( 188): 25772( 188)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:33.017656 431499 usertrap_amd64.go:122] [ 25772( 188): 25772( 188)] Allocate a new trap: 0xc0040ca720 38 D0317 18:30:33.017728 431499 usertrap_amd64.go:225] [ 25772( 188): 25772( 188)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:33.020524 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.020619 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 38 D0317 18:30:33.020698 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.022870 431499 task_exit.go:204] [ 25770( 119): 25774( 120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.023018 431499 task_exit.go:204] [ 25770( 119): 25774( 120)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.023148 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.023448 431499 task_exit.go:204] [ 25770( 119): 25770( 119)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 3: socketpair(0x22, 0x0, 0x2, &(0x7f0000000800)) D0317 18:30:33.034358 431499 usertrap_amd64.go:212] [ 25772( 188): 25772( 188)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.034452 431499 usertrap_amd64.go:122] [ 25772( 188): 25772( 188)] Allocate a new trap: 0xc0040ca720 39 D0317 18:30:33.034529 431499 usertrap_amd64.go:225] [ 25772( 188): 25772( 188)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.035363 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.035467 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 37 D0317 18:30:33.036132 431499 usertrap_amd64.go:212] [ 25772( 188): 25772( 188)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.036257 431499 usertrap_amd64.go:122] [ 25772( 188): 25772( 188)] Allocate a new trap: 0xc0040ca720 40 D0317 18:30:33.036284 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:33.036324 431499 usertrap_amd64.go:225] [ 25772( 188): 25772( 188)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.036932 431499 usertrap_amd64.go:212] [ 25772( 188): 25777( 189)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.037006 431499 usertrap_amd64.go:122] [ 25772( 188): 25777( 189)] Allocate a new trap: 0xc0040ca720 41 D0317 18:30:33.037134 431499 usertrap_amd64.go:225] [ 25772( 188): 25777( 189)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.041779 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.041877 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 38 D0317 18:30:33.041967 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.042449 431499 usertrap_amd64.go:212] [ 25772( 188): 25772( 188)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.042512 431499 usertrap_amd64.go:122] [ 25772( 188): 25772( 188)] Allocate a new trap: 0xc0040ca720 42 D0317 18:30:33.042574 431499 usertrap_amd64.go:225] [ 25772( 188): 25772( 188)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.047772 431499 task_exit.go:204] [ 25772( 188): 25772( 188)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.047971 431499 task_signals.go:204] [ 25772( 188): 25777( 189)] Signal 9, PID: 25772, TID: 25777, fault addr: 0x0: terminating thread group D0317 18:30:33.048607 431499 task_exit.go:204] [ 25772( 188): 25772( 188)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.048929 431499 task_exit.go:204] [ 25772( 188): 25777( 189)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.050790 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.050873 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 39 D0317 18:30:33.050969 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.057653 431499 task_exit.go:204] [ 25772( 188): 25777( 189)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.057773 431499 task_exit.go:204] [ 25772( 188): 25777( 189)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.057881 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:33.058127 431499 task_exit.go:204] [ 25772( 188): 25772( 188)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.059707 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.059848 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 39 D0317 18:30:33.060143 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) 18:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0), 0x4) D0317 18:30:33.077516 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.077666 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 40 D0317 18:30:33.077830 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.079288 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.079351 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 41 D0317 18:30:33.079548 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.080320 431499 usertrap_amd64.go:212] [ 25775(2841): 25779(2842)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.080422 431499 usertrap_amd64.go:122] [ 25775(2841): 25779(2842)] Allocate a new trap: 0xc003cb25d0 42 D0317 18:30:33.080621 431499 usertrap_amd64.go:225] [ 25775(2841): 25779(2842)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.081350 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.081416 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 40 D0317 18:30:33.081500 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.083561 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.083630 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 41 D0317 18:30:33.084220 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.086302 431499 usertrap_amd64.go:212] [ 25775(2841): 25775(2841)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.086846 431499 usertrap_amd64.go:122] [ 25775(2841): 25775(2841)] Allocate a new trap: 0xc003cb25d0 43 D0317 18:30:33.087040 431499 usertrap_amd64.go:225] [ 25775(2841): 25775(2841)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.091807 431499 usertrap_amd64.go:212] [ 25776(1397): 25780(1398)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.091884 431499 usertrap_amd64.go:122] [ 25776(1397): 25780(1398)] Allocate a new trap: 0xc0067dc5d0 42 D0317 18:30:33.091959 431499 usertrap_amd64.go:225] [ 25776(1397): 25780(1398)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:33.093834 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.094021 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 36 D0317 18:30:33.094141 431499 usertrap_amd64.go:212] [ 25776(1397): 25776(1397)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.094205 431499 usertrap_amd64.go:122] [ 25776(1397): 25776(1397)] Allocate a new trap: 0xc0067dc5d0 43 D0317 18:30:33.094288 431499 usertrap_amd64.go:225] [ 25776(1397): 25776(1397)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.095006 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:33.096260 431499 task_exit.go:204] [ 25775(2841): 25775(2841)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.096502 431499 task_signals.go:204] [ 25775(2841): 25779(2842)] Signal 9, PID: 25775, TID: 25779, fault addr: 0x0: terminating thread group D0317 18:30:33.097084 431499 task_exit.go:204] [ 25775(2841): 25775(2841)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.097259 431499 task_exit.go:204] [ 25775(2841): 25779(2842)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.098624 431499 task_exit.go:204] [ 25776(1397): 25776(1397)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.098917 431499 task_signals.go:204] [ 25776(1397): 25780(1398)] Signal 9, PID: 25776, TID: 25780, fault addr: 0x0: terminating thread group D0317 18:30:33.099460 431499 task_exit.go:204] [ 25776(1397): 25776(1397)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.099671 431499 task_exit.go:204] [ 25776(1397): 25780(1398)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.102353 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:33.102453 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 37 D0317 18:30:33.102585 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.107033 431499 task_exit.go:204] [ 25776(1397): 25780(1398)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.107107 431499 task_exit.go:204] [ 25776(1397): 25780(1398)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.107204 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.107307 431499 task_exit.go:204] [ 25775(2841): 25779(2842)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.107375 431499 task_exit.go:204] [ 25775(2841): 25779(2842)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.107492 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.107795 431499 task_exit.go:204] [ 25775(2841): 25775(2841)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.110510 431499 task_exit.go:204] [ 25776(1397): 25776(1397)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f0000000cc0)={'ip_vti0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private}}}}) 18:30:33 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)) D0317 18:30:33.123740 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.123827 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 38 D0317 18:30:33.123917 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:33.124967 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:33.125065 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 36 D0317 18:30:33.125922 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:33.132329 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:33.132454 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 37 D0317 18:30:33.132542 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:33.147569 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.147700 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 37 D0317 18:30:33.148386 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.152407 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.152551 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 39 D0317 18:30:33.152649 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.155178 431499 usertrap_amd64.go:212] [ 25778( 121): 25784( 122)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.155319 431499 usertrap_amd64.go:122] [ 25778( 121): 25784( 122)] Allocate a new trap: 0xc0067dc600 40 D0317 18:30:33.155569 431499 usertrap_amd64.go:225] [ 25778( 121): 25784( 122)] Apply the binary patch addr 55a8b05c0320 trap addr 64c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.157728 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.157803 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 38 D0317 18:30:33.157888 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.159138 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.159263 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 41 D0317 18:30:33.159525 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b05c0c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.161911 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:33.162108 431499 usertrap_amd64.go:212] [ 25778( 121): 25778( 121)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.162192 431499 usertrap_amd64.go:122] [ 25778( 121): 25778( 121)] Allocate a new trap: 0xc0067dc600 42 D0317 18:30:33.162387 431499 usertrap_amd64.go:225] [ 25778( 121): 25778( 121)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.162088 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 38 D0317 18:30:33.162589 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:33.164170 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.164245 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 37 D0317 18:30:33.165039 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:33.168091 431499 task_exit.go:204] [ 25778( 121): 25778( 121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.168296 431499 task_signals.go:204] [ 25778( 121): 25784( 122)] Signal 9, PID: 25778, TID: 25784, fault addr: 0x0: terminating thread group D0317 18:30:33.168736 431499 task_exit.go:204] [ 25778( 121): 25778( 121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.168806 431499 task_exit.go:204] [ 25778( 121): 25784( 122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.174790 431499 task_exit.go:204] [ 25778( 121): 25784( 122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.174848 431499 task_exit.go:204] [ 25778( 121): 25784( 122)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.174930 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.175704 431499 task_exit.go:204] [ 25778( 121): 25778( 121)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 3: semget$private(0x0, 0xcf40a10ef7119c1, 0x0) D0317 18:30:33.179299 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.179474 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 38 D0317 18:30:33.179592 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.180700 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.180769 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 39 D0317 18:30:33.180865 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.182277 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.182400 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 39 D0317 18:30:33.182467 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.184587 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.184663 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 40 D0317 18:30:33.184937 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.185457 431499 usertrap_amd64.go:212] [ 25781( 190): 25785( 191)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.185561 431499 usertrap_amd64.go:122] [ 25781( 190): 25785( 191)] Allocate a new trap: 0xc002304510 41 D0317 18:30:33.185648 431499 usertrap_amd64.go:225] [ 25781( 190): 25785( 191)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.190603 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.190736 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 40 D0317 18:30:33.190860 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.192740 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.193218 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 41 D0317 18:30:33.193301 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.193819 431499 usertrap_amd64.go:212] [ 25782(2843): 25786(2844)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.193886 431499 usertrap_amd64.go:122] [ 25782(2843): 25786(2844)] Allocate a new trap: 0xc0023045a0 42 D0317 18:30:33.193974 431499 usertrap_amd64.go:225] [ 25782(2843): 25786(2844)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.198799 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.198884 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 39 D0317 18:30:33.198990 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:33.199397 431499 usertrap_amd64.go:212] [ 25782(2843): 25782(2843)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.199486 431499 usertrap_amd64.go:122] [ 25782(2843): 25782(2843)] Allocate a new trap: 0xc0023045a0 43 D0317 18:30:33.199651 431499 usertrap_amd64.go:225] [ 25782(2843): 25782(2843)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.204876 431499 task_exit.go:204] [ 25782(2843): 25782(2843)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.205096 431499 task_signals.go:204] [ 25782(2843): 25786(2844)] Signal 9, PID: 25782, TID: 25786, fault addr: 0x0: terminating thread group D0317 18:30:33.205640 431499 task_exit.go:204] [ 25782(2843): 25782(2843)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.205831 431499 task_exit.go:204] [ 25782(2843): 25786(2844)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.207849 431499 usertrap_amd64.go:212] [ 25781( 190): 25781( 190)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.207922 431499 usertrap_amd64.go:122] [ 25781( 190): 25781( 190)] Allocate a new trap: 0xc002304510 42 D0317 18:30:33.208022 431499 usertrap_amd64.go:225] [ 25781( 190): 25781( 190)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.209364 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.209479 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 36 D0317 18:30:33.210138 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:33.212147 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.212283 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 40 D0317 18:30:33.212459 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.214095 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.214191 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 41 D0317 18:30:33.214324 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.214503 431499 task_exit.go:204] [ 25782(2843): 25786(2844)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.214645 431499 task_exit.go:204] [ 25782(2843): 25786(2844)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.214805 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.214979 431499 task_exit.go:204] [ 25782(2843): 25782(2843)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.215462 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:33.215787 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 37 D0317 18:30:33.215851 431499 usertrap_amd64.go:212] [ 25783(1399): 25788(1400)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.215902 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.215928 431499 usertrap_amd64.go:122] [ 25783(1399): 25788(1400)] Allocate a new trap: 0xc0067dc660 42 D0317 18:30:33.216120 431499 usertrap_amd64.go:225] [ 25783(1399): 25788(1400)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) 18:30:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000cc0)={'ip_vti0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private}}}}) D0317 18:30:33.218871 431499 task_exit.go:204] [ 25781( 190): 25781( 190)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.219107 431499 task_signals.go:204] [ 25781( 190): 25785( 191)] Signal 9, PID: 25781, TID: 25785, fault addr: 0x0: terminating thread group D0317 18:30:33.219542 431499 task_exit.go:204] [ 25781( 190): 25781( 190)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.219762 431499 task_exit.go:204] [ 25781( 190): 25785( 191)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.220627 431499 usertrap_amd64.go:212] [ 25783(1399): 25783(1399)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.220744 431499 usertrap_amd64.go:122] [ 25783(1399): 25783(1399)] Allocate a new trap: 0xc0067dc660 43 D0317 18:30:33.220821 431499 usertrap_amd64.go:225] [ 25783(1399): 25783(1399)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.226158 431499 task_exit.go:204] [ 25783(1399): 25783(1399)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.226752 431499 task_signals.go:204] [ 25783(1399): 25788(1400)] Signal 9, PID: 25783, TID: 25788, fault addr: 0x0: terminating thread group D0317 18:30:33.226897 431499 task_exit.go:204] [ 25781( 190): 25785( 191)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.226954 431499 task_exit.go:204] [ 25781( 190): 25785( 191)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.227054 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:33.227142 431499 task_exit.go:204] [ 25781( 190): 25781( 190)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.227341 431499 task_exit.go:204] [ 25783(1399): 25788(1400)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.227988 431499 task_exit.go:204] [ 25783(1399): 25783(1399)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 18:30:33 executing program 1: clock_gettime(0x9, &(0x7f00000030c0)) D0317 18:30:33.241862 431499 task_exit.go:204] [ 25783(1399): 25788(1400)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.241937 431499 task_exit.go:204] [ 25783(1399): 25788(1400)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.242181 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.242576 431499 task_exit.go:204] [ 25783(1399): 25783(1399)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 2: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)=';', 0x1, 0xfffffffffffffffe) D0317 18:30:33.250182 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.250314 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 37 D0317 18:30:33.251098 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.252229 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.252359 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 38 D0317 18:30:33.252454 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:33.264881 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.265009 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 38 D0317 18:30:33.265100 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.279729 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:33.279851 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 36 D0317 18:30:33.280290 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.280416 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 39 D0317 18:30:33.280496 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.280729 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:33.284770 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.284881 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 39 D0317 18:30:33.284965 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.285397 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:33.285470 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 37 D0317 18:30:33.285601 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:33.287090 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.287184 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 40 D0317 18:30:33.287302 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.287553 431499 usertrap_amd64.go:212] [ 25787( 123): 25792( 124)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.287653 431499 usertrap_amd64.go:122] [ 25787( 123): 25792( 124)] Allocate a new trap: 0xc006dc8570 41 D0317 18:30:33.287733 431499 usertrap_amd64.go:225] [ 25787( 123): 25792( 124)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.290761 431499 usertrap_amd64.go:212] [ 25787( 123): 25787( 123)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.290902 431499 usertrap_amd64.go:122] [ 25787( 123): 25787( 123)] Allocate a new trap: 0xc006dc8570 42 D0317 18:30:33.291059 431499 usertrap_amd64.go:225] [ 25787( 123): 25787( 123)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.295549 431499 task_exit.go:204] [ 25787( 123): 25787( 123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.296302 431499 task_signals.go:204] [ 25787( 123): 25792( 124)] Signal 9, PID: 25787, TID: 25792, fault addr: 0x0: terminating thread group D0317 18:30:33.296338 431499 task_exit.go:204] [ 25787( 123): 25787( 123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.296777 431499 task_exit.go:204] [ 25787( 123): 25792( 124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.301682 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.301755 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 40 D0317 18:30:33.301847 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.303496 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.303573 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 41 D0317 18:30:33.303699 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.305291 431499 usertrap_amd64.go:212] [ 25789(2845): 25793(2846)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.305374 431499 usertrap_amd64.go:122] [ 25789(2845): 25793(2846)] Allocate a new trap: 0xc0040fc7b0 42 D0317 18:30:33.305443 431499 usertrap_amd64.go:225] [ 25789(2845): 25793(2846)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.305926 431499 task_exit.go:204] [ 25787( 123): 25792( 124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.305987 431499 task_exit.go:204] [ 25787( 123): 25792( 124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.306135 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.307464 431499 task_exit.go:204] [ 25787( 123): 25787( 123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.308516 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f8770ca2:sysno 14 18:30:33 executing program 3: socketpair(0x22, 0x0, 0x10, &(0x7f0000000140)) D0317 18:30:33.308591 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 38 D0317 18:30:33.309289 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:33.309842 431499 usertrap_amd64.go:212] [ 25789(2845): 25789(2845)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.309910 431499 usertrap_amd64.go:122] [ 25789(2845): 25789(2845)] Allocate a new trap: 0xc0040fc7b0 43 D0317 18:30:33.309988 431499 usertrap_amd64.go:225] [ 25789(2845): 25789(2845)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.310758 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.310894 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 37 D0317 18:30:33.316071 431499 task_exit.go:204] [ 25789(2845): 25789(2845)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.316676 431499 task_exit.go:204] [ 25789(2845): 25789(2845)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.317154 431499 task_signals.go:204] [ 25789(2845): 25793(2846)] Signal 9, PID: 25789, TID: 25793, fault addr: 0x0: terminating thread group D0317 18:30:33.317309 431499 task_exit.go:204] [ 25789(2845): 25793(2846)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.322979 431499 task_exit.go:204] [ 25789(2845): 25793(2846)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.323482 431499 task_exit.go:204] [ 25789(2845): 25793(2846)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.323723 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.323896 431499 task_exit.go:204] [ 25789(2845): 25789(2845)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.324420 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) 18:30:33 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) D0317 18:30:33.333275 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.333381 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 38 D0317 18:30:33.333485 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.347820 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.347999 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 39 D0317 18:30:33.348244 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.354218 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.354307 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 40 D0317 18:30:33.354376 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.356359 431499 usertrap_amd64.go:212] [ 25790( 192): 25795( 193)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.358792 431499 usertrap_amd64.go:122] [ 25790( 192): 25795( 193)] Allocate a new trap: 0xc006f9c360 41 D0317 18:30:33.359066 431499 usertrap_amd64.go:225] [ 25790( 192): 25795( 193)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.361795 431499 usertrap_amd64.go:212] [ 25790( 192): 25790( 192)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.361905 431499 usertrap_amd64.go:122] [ 25790( 192): 25790( 192)] Allocate a new trap: 0xc006f9c360 42 D0317 18:30:33.361992 431499 usertrap_amd64.go:225] [ 25790( 192): 25790( 192)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.363363 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.363580 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 37 D0317 18:30:33.364441 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.364505 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 39 D0317 18:30:33.364578 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:33.364611 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.369398 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.369489 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 38 D0317 18:30:33.369581 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.388887 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.388997 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 40 D0317 18:30:33.389116 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.389319 431499 task_exit.go:204] [ 25790( 192): 25790( 192)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.390697 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.390759 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 41 D0317 18:30:33.390851 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.390960 431499 task_signals.go:204] [ 25790( 192): 25795( 193)] Signal 9, PID: 25790, TID: 25795, fault addr: 0x0: terminating thread group D0317 18:30:33.391077 431499 task_exit.go:204] [ 25790( 192): 25795( 193)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.391765 431499 task_exit.go:204] [ 25790( 192): 25790( 192)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.396075 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.396286 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 36 D0317 18:30:33.397236 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:33.399985 431499 usertrap_amd64.go:212] [ 25791(1401): 25797(1402)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.400173 431499 usertrap_amd64.go:122] [ 25791(1401): 25797(1402)] Allocate a new trap: 0xc003cb2750 42 D0317 18:30:33.400359 431499 usertrap_amd64.go:225] [ 25791(1401): 25797(1402)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:33.400678 431499 task_exit.go:204] [ 25790( 192): 25795( 193)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.400797 431499 task_exit.go:204] [ 25790( 192): 25795( 193)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.401526 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:33.401641 431499 task_exit.go:204] [ 25790( 192): 25790( 192)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.402840 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.402939 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 39 D0317 18:30:33.403037 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:33 executing program 1: request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffe) D0317 18:30:33.406037 431499 usertrap_amd64.go:212] [ 25791(1401): 25791(1401)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.406123 431499 usertrap_amd64.go:122] [ 25791(1401): 25791(1401)] Allocate a new trap: 0xc003cb2750 43 D0317 18:30:33.406235 431499 usertrap_amd64.go:225] [ 25791(1401): 25791(1401)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.408684 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:33.408759 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 37 D0317 18:30:33.408833 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.416944 431499 task_exit.go:204] [ 25791(1401): 25791(1401)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.417518 431499 task_exit.go:204] [ 25791(1401): 25791(1401)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.417701 431499 task_signals.go:204] [ 25791(1401): 25797(1402)] Signal 9, PID: 25791, TID: 25797, fault addr: 0x0: terminating thread group D0317 18:30:33.417803 431499 task_exit.go:204] [ 25791(1401): 25797(1402)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.418524 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.418605 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 40 D0317 18:30:33.420397 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.423933 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.424020 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 41 D0317 18:30:33.424125 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.425586 431499 usertrap_amd64.go:212] [ 25794(2847): 25798(2848)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.425695 431499 usertrap_amd64.go:122] [ 25794(2847): 25798(2848)] Allocate a new trap: 0xc0067dc6f0 42 D0317 18:30:33.425781 431499 usertrap_amd64.go:225] [ 25794(2847): 25798(2848)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.427771 431499 task_exit.go:204] [ 25791(1401): 25797(1402)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.427987 431499 task_exit.go:204] [ 25791(1401): 25797(1402)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.428246 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.428744 431499 usertrap_amd64.go:212] [ 25794(2847): 25794(2847)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.428884 431499 usertrap_amd64.go:122] [ 25794(2847): 25794(2847)] Allocate a new trap: 0xc0067dc6f0 43 D0317 18:30:33.428797 431499 task_exit.go:204] [ 25791(1401): 25791(1401)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.429077 431499 usertrap_amd64.go:225] [ 25794(2847): 25794(2847)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) 18:30:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000740)) D0317 18:30:33.446538 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.446638 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 38 D0317 18:30:33.446799 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:33.457308 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.457423 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 39 D0317 18:30:33.457496 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.459440 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.472171 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 40 D0317 18:30:33.472416 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.471901 431499 task_exit.go:204] [ 25794(2847): 25794(2847)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.472989 431499 task_signals.go:204] [ 25794(2847): 25798(2848)] Signal 9, PID: 25794, TID: 25798, fault addr: 0x0: terminating thread group D0317 18:30:33.473846 431499 task_exit.go:204] [ 25794(2847): 25794(2847)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.474025 431499 task_exit.go:204] [ 25794(2847): 25798(2848)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.476457 431499 usertrap_amd64.go:212] [ 25796( 125): 25800( 126)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.476531 431499 usertrap_amd64.go:122] [ 25796( 125): 25800( 126)] Allocate a new trap: 0xc002780630 41 D0317 18:30:33.476619 431499 usertrap_amd64.go:225] [ 25796( 125): 25800( 126)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.481887 431499 task_exit.go:204] [ 25794(2847): 25798(2848)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.482029 431499 task_exit.go:204] [ 25794(2847): 25798(2848)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.482147 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.483728 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:33.483984 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 36 D0317 18:30:33.485600 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:33.487922 431499 task_exit.go:204] [ 25794(2847): 25794(2847)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000100)) D0317 18:30:33.492979 431499 usertrap_amd64.go:212] [ 25796( 125): 25796( 125)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.493144 431499 usertrap_amd64.go:122] [ 25796( 125): 25796( 125)] Allocate a new trap: 0xc002780630 42 D0317 18:30:33.493679 431499 usertrap_amd64.go:225] [ 25796( 125): 25796( 125)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.503362 431499 task_exit.go:204] [ 25796( 125): 25796( 125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.504020 431499 task_exit.go:204] [ 25796( 125): 25796( 125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.504192 431499 task_signals.go:204] [ 25796( 125): 25800( 126)] Signal 9, PID: 25796, TID: 25800, fault addr: 0x0: terminating thread group D0317 18:30:33.504309 431499 task_exit.go:204] [ 25796( 125): 25800( 126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.512060 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:33.512238 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 37 D0317 18:30:33.512377 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:33.516823 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.516987 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 37 D0317 18:30:33.517347 431499 task_exit.go:204] [ 25796( 125): 25800( 126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.517434 431499 task_exit.go:204] [ 25796( 125): 25800( 126)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.517604 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.519208 431499 task_exit.go:204] [ 25796( 125): 25796( 125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.519962 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) 18:30:33 executing program 3: request_key(&(0x7f00000001c0)='rxrpc\x00', 0x0, 0x0, 0x0) D0317 18:30:33.534578 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.534721 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 38 D0317 18:30:33.534831 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.547135 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.547298 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 37 D0317 18:30:33.549593 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:33.549809 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 38 D0317 18:30:33.550037 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:33.559997 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.562904 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.563006 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 39 D0317 18:30:33.563428 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.566126 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.566257 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 38 D0317 18:30:33.566404 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.566702 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.566802 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 40 D0317 18:30:33.566872 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.568560 431499 usertrap_amd64.go:212] [ 25799( 194): 25804( 195)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.568631 431499 usertrap_amd64.go:122] [ 25799( 194): 25804( 195)] Allocate a new trap: 0xc006dc85d0 41 D0317 18:30:33.568740 431499 usertrap_amd64.go:225] [ 25799( 194): 25804( 195)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.569530 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.569695 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 39 D0317 18:30:33.569825 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:33.571781 431499 usertrap_amd64.go:212] [ 25799( 194): 25799( 194)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.571851 431499 usertrap_amd64.go:122] [ 25799( 194): 25799( 194)] Allocate a new trap: 0xc006dc85d0 42 D0317 18:30:33.571954 431499 usertrap_amd64.go:225] [ 25799( 194): 25799( 194)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.583196 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.583395 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 39 D0317 18:30:33.583734 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.586851 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.586924 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 40 D0317 18:30:33.587029 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.588794 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.588881 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 41 D0317 18:30:33.588988 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.590173 431499 task_exit.go:204] [ 25799( 194): 25799( 194)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.590375 431499 task_signals.go:204] [ 25799( 194): 25804( 195)] Signal 9, PID: 25799, TID: 25804, fault addr: 0x0: terminating thread group D0317 18:30:33.590585 431499 task_exit.go:204] [ 25799( 194): 25804( 195)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.591197 431499 task_exit.go:204] [ 25799( 194): 25799( 194)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.592285 431499 usertrap_amd64.go:212] [ 25801(1403): 25805(1404)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.592429 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.592487 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 40 D0317 18:30:33.592610 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.592354 431499 usertrap_amd64.go:122] [ 25801(1403): 25805(1404)] Allocate a new trap: 0xc002304600 42 D0317 18:30:33.592965 431499 usertrap_amd64.go:225] [ 25801(1403): 25805(1404)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:33.594846 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.595049 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 41 D0317 18:30:33.595252 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.596383 431499 usertrap_amd64.go:212] [ 25801(1403): 25801(1403)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.596455 431499 usertrap_amd64.go:122] [ 25801(1403): 25801(1403)] Allocate a new trap: 0xc002304600 43 D0317 18:30:33.596566 431499 usertrap_amd64.go:225] [ 25801(1403): 25801(1403)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.596565 431499 usertrap_amd64.go:212] [ 25802(2849): 25806(2850)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.597007 431499 usertrap_amd64.go:122] [ 25802(2849): 25806(2850)] Allocate a new trap: 0xc000046090 42 D0317 18:30:33.597188 431499 usertrap_amd64.go:225] [ 25802(2849): 25806(2850)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.599591 431499 usertrap_amd64.go:212] [ 25802(2849): 25802(2849)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.599721 431499 usertrap_amd64.go:122] [ 25802(2849): 25802(2849)] Allocate a new trap: 0xc000046090 43 D0317 18:30:33.599799 431499 usertrap_amd64.go:225] [ 25802(2849): 25802(2849)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.600108 431499 task_exit.go:204] [ 25799( 194): 25804( 195)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.600162 431499 task_exit.go:204] [ 25799( 194): 25804( 195)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.600267 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:33.601343 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.601633 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 36 D0317 18:30:33.602047 431499 task_exit.go:204] [ 25799( 194): 25799( 194)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.602495 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) 18:30:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) D0317 18:30:33.607219 431499 task_exit.go:204] [ 25802(2849): 25802(2849)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.607519 431499 task_signals.go:204] [ 25802(2849): 25806(2850)] Signal 9, PID: 25802, TID: 25806, fault addr: 0x0: terminating thread group D0317 18:30:33.607716 431499 task_exit.go:204] [ 25802(2849): 25806(2850)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.608772 431499 task_exit.go:204] [ 25802(2849): 25802(2849)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.609473 431499 task_exit.go:204] [ 25801(1403): 25801(1403)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.609638 431499 task_signals.go:204] [ 25801(1403): 25805(1404)] Signal 9, PID: 25801, TID: 25805, fault addr: 0x0: terminating thread group D0317 18:30:33.609754 431499 task_exit.go:204] [ 25801(1403): 25805(1404)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.610401 431499 task_exit.go:204] [ 25801(1403): 25805(1404)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.610488 431499 task_exit.go:204] [ 25801(1403): 25805(1404)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.612542 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:33.612658 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 37 D0317 18:30:33.612739 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.614482 431499 task_exit.go:204] [ 25802(2849): 25806(2850)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.614572 431499 task_exit.go:204] [ 25802(2849): 25806(2850)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.614681 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.615252 431499 task_exit.go:204] [ 25802(2849): 25802(2849)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) D0317 18:30:33.618257 431499 task_exit.go:204] [ 25801(1403): 25801(1403)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.618345 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.618521 431499 task_exit.go:204] [ 25801(1403): 25801(1403)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 2: add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)=')', 0x1, 0xfffffffffffffffc) D0317 18:30:33.631781 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.631955 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 38 D0317 18:30:33.632247 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:33.659360 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:33.659471 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 36 D0317 18:30:33.660984 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.662124 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 37 D0317 18:30:33.662420 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:33.663083 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.664973 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.665045 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 39 D0317 18:30:33.665149 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.666388 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:33.666486 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 37 D0317 18:30:33.666561 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:33.666883 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.666991 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 40 D0317 18:30:33.667077 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.668578 431499 usertrap_amd64.go:212] [ 25803( 127): 25810( 128)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.668642 431499 usertrap_amd64.go:122] [ 25803( 127): 25810( 128)] Allocate a new trap: 0xc0026c6000 41 D0317 18:30:33.667374 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.668704 431499 usertrap_amd64.go:225] [ 25803( 127): 25810( 128)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.668727 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 38 D0317 18:30:33.668793 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.670341 431499 usertrap_amd64.go:212] [ 25803( 127): 25803( 127)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.670410 431499 usertrap_amd64.go:122] [ 25803( 127): 25803( 127)] Allocate a new trap: 0xc0026c6000 42 D0317 18:30:33.670493 431499 usertrap_amd64.go:225] [ 25803( 127): 25803( 127)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.673888 431499 task_exit.go:204] [ 25803( 127): 25803( 127)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.674565 431499 task_exit.go:204] [ 25803( 127): 25803( 127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.674571 431499 task_signals.go:204] [ 25803( 127): 25810( 128)] Signal 9, PID: 25803, TID: 25810, fault addr: 0x0: terminating thread group D0317 18:30:33.674687 431499 task_exit.go:204] [ 25803( 127): 25810( 128)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.682234 431499 task_exit.go:204] [ 25803( 127): 25810( 128)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.682386 431499 task_exit.go:204] [ 25803( 127): 25810( 128)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.682572 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.684533 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.684620 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 39 D0317 18:30:33.684698 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.684777 431499 task_exit.go:204] [ 25803( 127): 25803( 127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.686082 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:33.686159 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 38 D0317 18:30:33.686285 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) 18:30:33 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)) D0317 18:30:33.688801 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.688974 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 37 D0317 18:30:33.689913 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:33.693854 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.694035 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 40 D0317 18:30:33.694260 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.696185 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.696299 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 38 D0317 18:30:33.696262 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.696416 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.696564 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 41 D0317 18:30:33.696947 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.697194 431499 usertrap_amd64.go:212] [ 25808(2851): 25811(2852)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.697273 431499 usertrap_amd64.go:122] [ 25808(2851): 25811(2852)] Allocate a new trap: 0xc0040ca120 42 D0317 18:30:33.697377 431499 usertrap_amd64.go:225] [ 25808(2851): 25811(2852)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.700199 431499 usertrap_amd64.go:212] [ 25808(2851): 25808(2851)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.700264 431499 usertrap_amd64.go:122] [ 25808(2851): 25808(2851)] Allocate a new trap: 0xc0040ca120 43 D0317 18:30:33.700330 431499 usertrap_amd64.go:225] [ 25808(2851): 25808(2851)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.711150 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.711260 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 39 D0317 18:30:33.711337 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.713857 431499 usertrap_amd64.go:212] [ 25807( 196): 25813( 197)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.713957 431499 usertrap_amd64.go:122] [ 25807( 196): 25813( 197)] Allocate a new trap: 0xc006dc8120 40 D0317 18:30:33.714037 431499 usertrap_amd64.go:225] [ 25807( 196): 25813( 197)] Apply the binary patch addr 5637f8770320 trap addr 62c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.714601 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.714674 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 41 D0317 18:30:33.714706 431499 task_exit.go:204] [ 25808(2851): 25808(2851)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.714746 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f8770c10 trap addr 62cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.714902 431499 task_signals.go:204] [ 25808(2851): 25811(2852)] Signal 9, PID: 25808, TID: 25811, fault addr: 0x0: terminating thread group D0317 18:30:33.715379 431499 task_exit.go:204] [ 25808(2851): 25808(2851)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.715548 431499 task_exit.go:204] [ 25808(2851): 25811(2852)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.721786 431499 usertrap_amd64.go:212] [ 25807( 196): 25807( 196)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.721878 431499 usertrap_amd64.go:122] [ 25807( 196): 25807( 196)] Allocate a new trap: 0xc006dc8120 42 D0317 18:30:33.721985 431499 usertrap_amd64.go:225] [ 25807( 196): 25807( 196)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.722561 431499 task_exit.go:204] [ 25808(2851): 25811(2852)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.722651 431499 task_exit.go:204] [ 25808(2851): 25811(2852)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.722777 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.723066 431499 task_exit.go:204] [ 25808(2851): 25808(2851)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 0: request_key(0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0) D0317 18:30:33.729522 431499 task_exit.go:204] [ 25807( 196): 25807( 196)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.730122 431499 task_signals.go:204] [ 25807( 196): 25813( 197)] Signal 9, PID: 25807, TID: 25813, fault addr: 0x0: terminating thread group D0317 18:30:33.730235 431499 task_exit.go:204] [ 25807( 196): 25807( 196)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.730508 431499 task_exit.go:204] [ 25807( 196): 25813( 197)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.732463 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.732587 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 36 D0317 18:30:33.733515 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:33.735054 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.735136 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 39 D0317 18:30:33.735228 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:33.737860 431499 task_exit.go:204] [ 25807( 196): 25813( 197)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.737980 431499 task_exit.go:204] [ 25807( 196): 25813( 197)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.738109 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:33.741057 431499 task_exit.go:204] [ 25807( 196): 25807( 196)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.742758 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b05eb520:sysno 266 18:30:33 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="0ff36aa8f540e5ed9e26cb382ca9beddeeca101ad4074565631cc7982202b87cd7e0e1883d3ada8e6e7ce53a5b6cf2bfe8e5bc64d79a60d027bee46c095bbe64733d68217bd21e9bfbba8a9ebb5f9dc2eaae53a9499f840497432cf984acff0740da27dec5523972e5cc449d052648e506185888cad53aa5499c78303c4e4fecac64f7a50ab684cee14e2a63388b14d1ff61bde80c441c6f6c4c5a274a0af468f0b034a72f7e321b8acc5f510237ca119cb38817fb8da2c6025e141e406e6c780e88b2c2c6ea4eefbb3888f73e0c8a4e37d37c1008e5f7db7c8e4ccc1d53bbcdc86a84234251f45f69ddcf1b45ca95537b4a3042000446ad9efee7c305bfec49bfa6c1cecc9a86d93a9d0d4f2b890283eb3c5b45acd427cd917921aaf57a1dae9a1c9b6da9bcbd8c90b3352aaa381c305954b9e366795c49f4db5dac08903af55b17a5dbfdf32bab0cf2e79f41f25f100c7d20c66fc1fdf668f9818215695849008292f05e49e285e69f67d99583bba9dc5870fdae0b318d033b7962cd1f54d5a5f3060fd12e1aaafa6a237bdca6fd0080330a1701d64a7a43cf5297c96cac09b46101e3ce868ec9a38915d1881948f4941a71c957d6ec923f0a49c58dac118f4bfcb08b708c3630f381994f18fcf37f6654cdf1a469844c994445dddb11fafb8491fd274f87722960e6b7b0c0dbba4cc4572d383425b36cae92b1c3d5d622f4a4cddf9db8b416a9016a7664e0264affe22d68e158089d20d17c310757b8b4423872d98a5882a8fd070a1c43ff775466d3b94ee018b8fa2447e0025a5bf40b097a4795771ed927acd67cc3908a59ca583c82947d9f87449bf0cf20837205ca6e047625150654ae9b1d3332ad2cd4464614119d67f7a3af46a1ae378adc4e00928abde0ae37899a9f09e875d4cec0de3dbb6257dea931ff4169ded72cd79a0b713ee85586e91f724634cd6e0ef7672f97b8080a4a83528b260cd0829a7e872188cfbcf9371c9048d15e84a74fecd69117a8a4857a61aa3180cc6bb1d59e67e99fe35efad7a82837659bc4a87e69f0e2f95d41790a6c6bf6df75bb0d02bab544aafdf8fe5cb767413d380de4b3fba0e7bfa72ce4db2b5a7a18071589b7d34d9f598795ef2fcca6f859585a737013e107eb15b583e26f4f5e248b54d63996bb451dd057dd91310d18640117fb4725f1488654aa89967b6587c5aabd40c94f76a389fffe50611725617f39fe1f4c0d7489b5ab60bcd2e92e2240143fde27284983e063af7e4623b53040fad7d9e2c3f97f59e743a1472794d28f7b67947d6409b53a54613d55d1d4dd0b34507e181e37ab17ee5eafc448e715db3fb65083774fb12f1a4af8689466d872c674a9181e3931fde140b9a7434e1e4b0cd8e7746e40ac360baeb356a97c552cebf0e78e7b9c686ad3ee75fbaef2a37a35ed5b72eb15fa975a5e254890fa349a688b8d961b03aad8c56fc25633a3f9814782d371600c2f33bc58b85467628b6d99a164a1b4c6cc06ad5487939850f3929e9e374f810edd8b7c13dcd369e279bf0b4204971451080974fd9011b7e579c7f6b2dbd11e48e5ec533448414a910f8830212220ef9a7586b668e0a869b54533fb6b057604c1b6c22885ea1455922b2a4a3182de9f7daf569ab19097ff1ed97720fc3234d7ce02f9a07cbac0204f40a80c3ff71ed72f62f2bce9dedddc1670cdda55d4f01ee9a6af8e1474b618f682330e71647c58be96c541b7b2f00c44ac7a20fdff86661eccbbbbc2eef030ddee283482acb5354c7e6798638d5c87a8bebe0bc21dbf28860ea65228745f1a2038d848a3fb52d91aacb39f65a9a89b1c21416beb260b1e3d8c7995bea6dee77c745806eed1bf47f124d7d741d31aff99e258d94b7703099d65b064a82c2fbcd0b68f56461da04064083acdf61d483f60c1ef7a1845bf4d58fc0502735a4778f922b1d4da66d67105078d19370f739cc5aa179dbad8f56d8ff3fd1ba697ac4f610f9e8d6fdc19580badcc77ab675a64b3b7b77e216a1999e49a80ad7842c2a51882da8f1c4457261f5456a42a123526a815ea664c0847957ab861f10c4bf6023e95aacbfaa1e164a89e510f4ae75de43b379772ed998dc6db9ef975c0fed5a53c84a751fae0c27fe578b3ff5d091684036c698fc80011bfea87d3c8d6b85f3165b3f20f89db3bf6d39efc0402ecbc4630fb778e982772a18b4ac6fe97ce3e0e738ee7b6150444444f3b6db94e66ea2c06c78130ed633f00f3282f868a977c9655c6ce48c0daf29f7107389ed9a3da21604beb7cb1b908b63afb6398f23fae4374fa297b07ae61c2f731c175c4ca8dea727b6a33a74bc6e3a138c3e5d28c77d6283344b8025b8dbc3a95a152a23a30fd43f3ad3dc5be5d2835962adf547fd13cde72c2f982b87f6aa1ed0e7d3e89faa71edf788d6aed62a00b0ca88bec6c5dc73530450b886df7e20a016fc9d1b5b4ab48719116d171a5a31b6ac7d7fa5f3cf00f6581c9f5cb380a763139aa0657fef37eb4a5a4832fb79081df182fba1e2a65c5ab78a887e7d84021dd43bda7b49475a2328e48e479fa259c832c1178b805b3c9640ae9f3157f3137518b7eb088da82bbedafe5b59b6a63110bf62fa73f97c71a2efc04dda2998c7e5bc19213e71f245413d19065800279ad175a611338befb5938938f7803922263ed9ac9429adaca64b56615a113cd9e4e70c6801ca2b1095fca8159056793b808780f04b9ec8c11b8800c902f05652a21eafa497ed1f700b4d249f35a66fec1306f6321fd9dbe31fdceedda3f4105d866a7f082d78502f3cad0b452f3415f68a79925e09a600822714dcdffe37edb87d5081c16617e0416bae6fe00f2ebc9b151e7e2733e54c4efa7c6e3a2330e651ca5f6dfb1edc8fc16755943c1e8db55d7e5d8834242ef44d27aaf12c5b1ce7d52f983cf4f089db6d30a4cfe88e9c5dda2c3ee9277f8d69d40ea61d7f88380dc5bd030c64b7d852d1707623fa9c5771a50dbc40b5439bec49a3484bdc504ef6283135224984b721984d747235a6ca176d618aa1c5d4ecf7feef7d1c72cb6eba51e6c2aeb319780a94e584c6c7b19e5581cd9bb2915e706cfb8d1e0fb6ebc446787e138ff9a9c3582e1d787c9cd6a22a5d6325a89d4ed59f3574c9f4efbad621c39bc94085660abe1322c2749f589a003fc0a281cb44c656f746e34045b9eba2400a06b7ff86c12363155b605d05b713a151d775abf50927b470a6823c3bf5013fe477cc737f20f91a26269c0655bb378070ab3741d3be76f1bf5ede6adaf4b7c61e38d6370af9fb77a02c0ba9a32a8b18754694da104bd49ff449b62cff98f69f90d8bc68dd635c6ada56c2accc4bb8a528c09dbcca37b79accbac07c3d97d089c30f4f4c57263238946ad2d45acdc308361560fcb4ce0e8bbb7668f07d366c6135944bb94155383485202bbba41361cdd6ff8a89cba7202653c0831221684496928d0ebd1547eceeae6cde4d81155d1e6e3a2cb1282bb59d7f5a8182e4d6d9c52ee8dbc9c0cab554c90df2fc7ff40857f27575d4af13b7546e8923cea08563e526dd0a83857fe6ecf3eef8d09c332732c79b07038e4f923efb1624734d6c09c5c0017c1d8914793301a545c7e29bd12446eab9dc4d4b0418e705044ffa7618bdfaffa364ca33ddb39eca940daee0eb324fa096dfed1b8c129c7d0c09e190e308690717fae1f09d304e5429b55bac340bbe1f0ff04e29b246d73890e5dda2ad72f496cbbc894a092ee050e6eef9f2e54ee75b43736b5b7369e385973de142a2f290631a6176803b3f208b5ee78cdb1088a02ebbbb46bb3946ea929fa3e3a1d91ec0d36432621e78909c87bb2f79931d5242d3325248f1919026fa392e9c873d9e538073b16859b40311e180284d0c443b4fc0bea0a6c8b994c1e570be6b2a45ef2aa1289f5ca9b89ce92540e55d06073180d96e68f3f26b640af3a5e4a4e2bb95464784b0c6d67dafb767a2fb1577b97ceb78aecae32849fdfcf694f09e146f7cfd87601fd70b6e36db5ba45cda0ab5d9507ccae82b112b14a6df005de94130f548f7a01da1107e917dfcda11b0f53234efeea30d0419b51de6c09065aa5cec18837a827f114733d87d734ef6a105331e2e3bd8af6b004bb88dcecbc1d3b1b90387bd924e6d66c32395ff3f3a587c5b1839253d2abd5b102f78e6b85e80837aa1616c87992e9316039dad3f5bff9c5701ef6e802e7a29a9354b6cf3f8b74a2cd051822f89788b3a260b09de83fc6f8f73b3c48d288f66e57f797ad20d6ea97d79cf9b89f005defd4ec4ed9114d1ccf81cdea52af4367cd00c6d6c47624da19c99be9f8683b0e0d119c0d94136fa020129cf72f8bcdc8c73ed0a38ea97d1ef3cd865c7327f85987d12fbfff304e4966c61e2635c1f239e5fccb00f1a44e24defdcb66b005068020e2f03afafac91108408804ffb2e5d334f79a79260277dcabaf2466bfc3c217d4cb6b32c8883018b7122f33d46dfca25601aed71b3496cb9c32e0dc1a092d348c3ea7321cc7ab2cef3f8b41e9d7f59e9895f90a1f920db4b84b41f41202f1b4a8b5e83a2ac040ac48f28b0615cd5b2d0e9fd4c3e830d0e9d1f5ba8bb1b197873489996324bfdebac99042ba4f59ad4fbe52dbb9237cfd69f522fe6ce2603a8ba9605fad8626ed87f321da88b46d0ab3f15d7d1649184c6baebb8f032e79d02af0d7c94189bb1056af3ef7ce0e1df754281080409f7edbe279054aa33346116908f85ce9a613794161a8ca91467d9384f3d3f086cbe5e3f3a7597031af2a8c8ec2b48f200e4775af97f70a614c3f442c3760912b984449f4ca5ca5014f0b1f4cae306e15a8d859f2747a66af526df547b7b49bd481d169761086eba635d2ddb285c4b7681de9d44228323aad8b9cbb40e6d6ab9837fb5bbf3c43cf0543c4e8fd87af75c7ab3ba160d706492c25e2438d068622f24085660e6dd029342d06e2ce6b967608b35341241ab3d97715a8629c42bc65862042fbfa4a010c1bde352f1981f7b1cfadc904c21b79b5523e8e35ec8ea0efcb336f2e24320937a20147573c142b38500c081111dcccb17806151b6bbe458d9981142fb323b55619c7a6a5abf789c11d29df44d4dab5419376bb3c7fc0008f0a097cfd1019fea1823146db8359e022ca981802b2747544c3e0f292598f888a539733228f7933e003ca874e513ed36d263e07e569066754d58c1dd4e68b7ed4fcbe25f74dc0fbd6dad64bc77c19e6739a05d01bd03c2ead2168280bc3af51c4a90d6c0db33ff398eab2911ddb22d710a692010c64ffc448ceb729971df422289bc923174d10fc6c09efe8fa") syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f0000001140)) D0317 18:30:33.742848 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 37 D0317 18:30:33.742947 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.755455 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.755529 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 40 D0317 18:30:33.755628 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.757156 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.757291 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 41 D0317 18:30:33.757408 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.757847 431499 usertrap_amd64.go:212] [ 25809(1405): 25815(1406)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.757912 431499 usertrap_amd64.go:122] [ 25809(1405): 25815(1406)] Allocate a new trap: 0xc006f9c0f0 42 D0317 18:30:33.757977 431499 usertrap_amd64.go:225] [ 25809(1405): 25815(1406)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:33.759784 431499 usertrap_amd64.go:212] [ 25809(1405): 25809(1405)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.759890 431499 usertrap_amd64.go:122] [ 25809(1405): 25809(1405)] Allocate a new trap: 0xc006f9c0f0 43 D0317 18:30:33.759973 431499 usertrap_amd64.go:225] [ 25809(1405): 25809(1405)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.762913 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.762980 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 38 D0317 18:30:33.763091 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:33.770418 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.770525 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 37 D0317 18:30:33.771728 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.775288 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.775358 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 39 D0317 18:30:33.775442 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.775794 431499 task_exit.go:204] [ 25809(1405): 25809(1405)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.776473 431499 task_signals.go:204] [ 25809(1405): 25815(1406)] Signal 9, PID: 25809, TID: 25815, fault addr: 0x0: terminating thread group D0317 18:30:33.776613 431499 task_exit.go:204] [ 25809(1405): 25815(1406)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.776835 431499 task_exit.go:204] [ 25809(1405): 25809(1405)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.777948 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.778026 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 38 D0317 18:30:33.778101 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.778559 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.778649 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 40 D0317 18:30:33.778847 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.779295 431499 usertrap_amd64.go:212] [ 25812( 129): 25817( 130)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.779508 431499 usertrap_amd64.go:122] [ 25812( 129): 25817( 130)] Allocate a new trap: 0xc0037c0090 41 D0317 18:30:33.779794 431499 usertrap_amd64.go:225] [ 25812( 129): 25817( 130)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.783589 431499 usertrap_amd64.go:212] [ 25812( 129): 25812( 129)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.783740 431499 usertrap_amd64.go:122] [ 25812( 129): 25812( 129)] Allocate a new trap: 0xc0037c0090 42 D0317 18:30:33.783821 431499 usertrap_amd64.go:225] [ 25812( 129): 25812( 129)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.786841 431499 task_exit.go:204] [ 25809(1405): 25815(1406)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.786914 431499 task_exit.go:204] [ 25809(1405): 25815(1406)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.787021 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.787886 431499 task_exit.go:204] [ 25809(1405): 25809(1405)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f00000002c0)) D0317 18:30:33.790542 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:33.790637 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 36 D0317 18:30:33.791413 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:33.794092 431499 task_exit.go:204] [ 25812( 129): 25812( 129)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.794335 431499 task_signals.go:204] [ 25812( 129): 25817( 130)] Signal 9, PID: 25812, TID: 25817, fault addr: 0x0: terminating thread group D0317 18:30:33.795011 431499 task_exit.go:204] [ 25812( 129): 25817( 130)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.795559 431499 task_exit.go:204] [ 25812( 129): 25812( 129)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.801116 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:33.801221 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 37 D0317 18:30:33.801305 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:33.802133 431499 task_exit.go:204] [ 25812( 129): 25817( 130)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.803006 431499 task_exit.go:204] [ 25812( 129): 25817( 130)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.803165 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.805509 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.805589 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 39 D0317 18:30:33.805653 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.806603 431499 task_exit.go:204] [ 25812( 129): 25812( 129)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @rand_addr, {[@ssrr={0x89, 0xf, 0x0, [@empty, @empty, @multicast1]}, @lsrr={0x83, 0xf, 0x0, [@rand_addr, @broadcast, @loopback]}, @rr={0x7, 0x7, 0x0, [@rand_addr]}, @cipso={0x86, 0x17, 0x0, [{0x0, 0x8, "ed96b6d433ef"}, {0x0, 0x5, 'y\x00.'}, {0x0, 0x4, "ead8"}]}, @ssrr={0x89, 0x1b, 0x0, [@broadcast, @broadcast, @multicast1, @multicast2, @rand_addr, @broadcast]}, @ssrr={0x89, 0xb, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1b, 0x0, [@multicast2, @broadcast, @loopback, @remote, @local, @private]}]}}}}}) D0317 18:30:33.831179 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:33.831277 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 38 D0317 18:30:33.831382 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:33.836198 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.836366 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 37 D0317 18:30:33.837536 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:33.841253 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:33.841351 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 40 D0317 18:30:33.841476 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:33.843124 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:33.843211 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 41 D0317 18:30:33.843300 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:33.843678 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:33.843751 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 39 D0317 18:30:33.843829 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:33.844301 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.844394 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 38 D0317 18:30:33.844475 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:33.845173 431499 usertrap_amd64.go:212] [ 25814(2853): 25820(2854)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:33.845303 431499 usertrap_amd64.go:122] [ 25814(2853): 25820(2854)] Allocate a new trap: 0xc0067dc270 42 D0317 18:30:33.845460 431499 usertrap_amd64.go:225] [ 25814(2853): 25820(2854)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:33.845622 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:33.845719 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 40 D0317 18:30:33.846455 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:33.846696 431499 usertrap_amd64.go:212] [ 25816( 198): 25821( 199)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:33.846757 431499 usertrap_amd64.go:122] [ 25816( 198): 25821( 199)] Allocate a new trap: 0xc00628a2a0 41 D0317 18:30:33.846824 431499 usertrap_amd64.go:225] [ 25816( 198): 25821( 199)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:33.848435 431499 usertrap_amd64.go:212] [ 25814(2853): 25814(2853)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:33.848542 431499 usertrap_amd64.go:122] [ 25814(2853): 25814(2853)] Allocate a new trap: 0xc0067dc270 43 D0317 18:30:33.848612 431499 usertrap_amd64.go:225] [ 25814(2853): 25814(2853)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:33.853826 431499 task_exit.go:204] [ 25814(2853): 25814(2853)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.854329 431499 task_signals.go:204] [ 25814(2853): 25820(2854)] Signal 9, PID: 25814, TID: 25820, fault addr: 0x0: terminating thread group D0317 18:30:33.854491 431499 task_exit.go:204] [ 25814(2853): 25820(2854)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.855203 431499 task_exit.go:204] [ 25814(2853): 25820(2854)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.855275 431499 task_exit.go:204] [ 25814(2853): 25820(2854)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.865028 431499 task_exit.go:204] [ 25814(2853): 25814(2853)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.865151 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:33.865279 431499 task_exit.go:204] [ 25814(2853): 25814(2853)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.867500 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:33.867652 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 36 18:30:33 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffff9) D0317 18:30:33.868343 431499 usertrap_amd64.go:212] [ 25822( 200): 25822( 200)] Found the pattern at ip 5637f87c71ae:sysno 230 D0317 18:30:33.868455 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:33.868697 431499 usertrap_amd64.go:122] [ 25822( 200): 25822( 200)] Allocate a new trap: 0xc0037c00f0 42 D0317 18:30:33.870120 431499 usertrap_amd64.go:225] [ 25822( 200): 25822( 200)] Apply the binary patch addr 5637f87c71ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.873654 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:33.873724 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 37 D0317 18:30:33.873814 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:33.876712 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.876769 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 39 D0317 18:30:33.876875 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:33.886526 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:33.886630 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 40 D0317 18:30:33.886701 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:33.888350 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:33.888436 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 41 D0317 18:30:33.888542 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:33.889129 431499 usertrap_amd64.go:212] [ 25818(1407): 25823(1408)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:33.889300 431499 usertrap_amd64.go:122] [ 25818(1407): 25823(1408)] Allocate a new trap: 0xc0067dc2d0 42 D0317 18:30:33.889583 431499 usertrap_amd64.go:225] [ 25818(1407): 25823(1408)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:33.893401 431499 usertrap_amd64.go:212] [ 25818(1407): 25818(1407)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:33.893541 431499 usertrap_amd64.go:122] [ 25818(1407): 25818(1407)] Allocate a new trap: 0xc0067dc2d0 43 D0317 18:30:33.893666 431499 usertrap_amd64.go:225] [ 25818(1407): 25818(1407)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:33.897858 431499 task_exit.go:204] [ 25818(1407): 25818(1407)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.898066 431499 task_signals.go:204] [ 25818(1407): 25823(1408)] Signal 9, PID: 25818, TID: 25823, fault addr: 0x0: terminating thread group D0317 18:30:33.898565 431499 task_exit.go:204] [ 25818(1407): 25823(1408)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.898967 431499 task_exit.go:204] [ 25818(1407): 25818(1407)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.908371 431499 task_exit.go:204] [ 25818(1407): 25823(1408)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.908462 431499 task_exit.go:204] [ 25818(1407): 25823(1408)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.908608 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:33.910336 431499 task_exit.go:204] [ 25818(1407): 25818(1407)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.910825 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:33.910983 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 38 D0317 18:30:33.911184 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) 18:30:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @mcast1, 0x3}, 0x1c, 0x0}}], 0x1, 0x0) D0317 18:30:33.927063 431499 usertrap_amd64.go:212] [ 25825( 201): 25825( 201)] Found the pattern at ip 5637f87c71ae:sysno 230 D0317 18:30:33.927194 431499 usertrap_amd64.go:122] [ 25825( 201): 25825( 201)] Allocate a new trap: 0xc006dc82d0 42 D0317 18:30:33.930820 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:33.931106 431499 usertrap_amd64.go:225] [ 25825( 201): 25825( 201)] Apply the binary patch addr 5637f87c71ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.931139 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 37 D0317 18:30:33.936218 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:33.946553 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:33.946636 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 38 D0317 18:30:33.946745 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:33.951890 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:33.951993 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 39 D0317 18:30:33.952101 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:33.954128 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:33.954209 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 40 D0317 18:30:33.954336 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:33.954654 431499 usertrap_amd64.go:212] [ 25819( 131): 25828( 132)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:33.954814 431499 usertrap_amd64.go:122] [ 25819( 131): 25828( 132)] Allocate a new trap: 0xc0067dc3f0 41 D0317 18:30:33.954985 431499 usertrap_amd64.go:225] [ 25819( 131): 25828( 132)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:33.958997 431499 usertrap_amd64.go:212] [ 25826( 202): 25826( 202)] Found the pattern at ip 5637f87c71ae:sysno 230 D0317 18:30:33.959104 431499 usertrap_amd64.go:122] [ 25826( 202): 25826( 202)] Allocate a new trap: 0xc004fc61e0 42 D0317 18:30:33.959638 431499 usertrap_amd64.go:212] [ 25819( 131): 25819( 131)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:33.959745 431499 usertrap_amd64.go:122] [ 25819( 131): 25819( 131)] Allocate a new trap: 0xc0067dc3f0 42 D0317 18:30:33.959833 431499 usertrap_amd64.go:225] [ 25819( 131): 25819( 131)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:33.960207 431499 usertrap_amd64.go:225] [ 25826( 202): 25826( 202)] Apply the binary patch addr 5637f87c71ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.962648 431499 task_exit.go:204] [ 25819( 131): 25819( 131)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.963396 431499 task_exit.go:204] [ 25819( 131): 25819( 131)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.963366 431499 task_signals.go:204] [ 25819( 131): 25828( 132)] Signal 9, PID: 25819, TID: 25828, fault addr: 0x0: terminating thread group D0317 18:30:33.963894 431499 task_exit.go:204] [ 25819( 131): 25828( 132)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:33.965837 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:33.965973 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 37 D0317 18:30:33.966949 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:33.970726 431499 task_exit.go:204] [ 25819( 131): 25828( 132)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:33.970801 431499 task_exit.go:204] [ 25819( 131): 25828( 132)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.970971 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:33.971274 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:33.971357 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 38 D0317 18:30:33.971349 431499 task_exit.go:204] [ 25819( 131): 25819( 131)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:33.971436 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) 18:30:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x894a, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:33.978222 431499 usertrap_amd64.go:212] [ 25816( 198): 25816( 198)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:33.978290 431499 usertrap_amd64.go:122] [ 25816( 198): 25816( 198)] Allocate a new trap: 0xc00628a2a0 42 D0317 18:30:33.978604 431499 usertrap_amd64.go:225] [ 25816( 198): 25816( 198)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:33.983313 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:33.983386 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 39 D0317 18:30:33.983485 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:33.989175 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:33.989278 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 39 D0317 18:30:33.989368 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.007011 431499 task_exit.go:204] [ 25816( 198): 25816( 198)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.007653 431499 task_signals.go:204] [ 25816( 198): 25821( 199)] Signal 9, PID: 25816, TID: 25821, fault addr: 0x0: terminating thread group D0317 18:30:34.007782 431499 task_exit.go:204] [ 25816( 198): 25816( 198)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.008012 431499 task_exit.go:204] [ 25816( 198): 25821( 199)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.010685 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.010765 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 40 D0317 18:30:34.010827 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.012044 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.013016 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 41 D0317 18:30:34.013212 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.013456 431499 usertrap_amd64.go:212] [ 25824(2855): 25830(2856)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.013502 431499 usertrap_amd64.go:122] [ 25824(2855): 25830(2856)] Allocate a new trap: 0xc004fc60f0 42 D0317 18:30:34.013566 431499 usertrap_amd64.go:225] [ 25824(2855): 25830(2856)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.016538 431499 usertrap_amd64.go:212] [ 25824(2855): 25824(2855)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.016723 431499 usertrap_amd64.go:122] [ 25824(2855): 25824(2855)] Allocate a new trap: 0xc004fc60f0 43 D0317 18:30:34.016989 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.017248 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 40 D0317 18:30:34.017212 431499 usertrap_amd64.go:225] [ 25824(2855): 25824(2855)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.017345 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.019655 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.019750 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 36 D0317 18:30:34.020132 431499 task_exit.go:204] [ 25816( 198): 25821( 199)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.020557 431499 task_exit.go:204] [ 25816( 198): 25821( 199)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.020716 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.020930 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.021043 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 41 D0317 18:30:34.021153 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.021412 431499 usertrap_amd64.go:212] [ 25827(1409): 25831(1410)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.021499 431499 usertrap_amd64.go:122] [ 25827(1409): 25831(1410)] Allocate a new trap: 0xc004fc62a0 42 D0317 18:30:34.021659 431499 usertrap_amd64.go:225] [ 25827(1409): 25831(1410)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.022108 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.024077 431499 task_exit.go:204] [ 25816( 198): 25816( 198)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.025534 431499 task_exit.go:204] [ 25824(2855): 25824(2855)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89a1, &(0x7f0000000400)) D0317 18:30:34.026097 431499 task_signals.go:204] [ 25824(2855): 25830(2856)] Signal 9, PID: 25824, TID: 25830, fault addr: 0x0: terminating thread group D0317 18:30:34.026647 431499 task_exit.go:204] [ 25824(2855): 25824(2855)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.026930 431499 task_exit.go:204] [ 25824(2855): 25830(2856)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.027334 431499 usertrap_amd64.go:212] [ 25827(1409): 25827(1409)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.027499 431499 usertrap_amd64.go:122] [ 25827(1409): 25827(1409)] Allocate a new trap: 0xc004fc62a0 43 D0317 18:30:34.027710 431499 usertrap_amd64.go:225] [ 25827(1409): 25827(1409)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.028826 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.028914 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 37 D0317 18:30:34.029002 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.033664 431499 task_exit.go:204] [ 25824(2855): 25830(2856)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.033740 431499 task_exit.go:204] [ 25824(2855): 25830(2856)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.033835 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.033999 431499 task_exit.go:204] [ 25824(2855): 25824(2855)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.034300 431499 task_exit.go:204] [ 25827(1409): 25827(1409)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.034862 431499 task_signals.go:204] [ 25827(1409): 25831(1410)] Signal 9, PID: 25827, TID: 25831, fault addr: 0x0: terminating thread group D0317 18:30:34.034953 431499 task_exit.go:204] [ 25827(1409): 25827(1409)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.035025 431499 task_exit.go:204] [ 25827(1409): 25831(1410)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:34 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x83000008) D0317 18:30:34.036340 431499 task_exit.go:204] [ 25822( 200): 25822( 200)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.043290 431499 task_exit.go:204] [ 25827(1409): 25831(1410)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.043397 431499 task_exit.go:204] [ 25827(1409): 25831(1410)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.043653 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.044520 431499 task_exit.go:204] [ 25822( 200): 25822( 200)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.044605 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.044886 431499 task_exit.go:204] [ 25827(1409): 25827(1409)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 2: request_key(&(0x7f0000000680)='dns_resolver\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0) D0317 18:30:34.080062 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.080166 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 38 D0317 18:30:34.080257 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.083712 431499 task_exit.go:204] [ 25822( 200): 25822( 200)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.089619 431499 task_exit.go:204] [ 25825( 201): 25825( 201)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.094804 431499 task_exit.go:204] [ 25825( 201): 25825( 201)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.094977 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.096805 431499 task_exit.go:204] [ 25825( 201): 25825( 201)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.101258 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.101512 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 37 D0317 18:30:34.102296 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.106569 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.106728 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 39 D0317 18:30:34.106925 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:34.107430 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.107545 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 36 D0317 18:30:34.108383 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:34.111762 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.111838 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 40 D0317 18:30:34.111947 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:34.112774 431499 usertrap_amd64.go:212] [ 25829( 133): 25835( 134)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.112837 431499 usertrap_amd64.go:122] [ 25829( 133): 25835( 134)] Allocate a new trap: 0xc0000460f0 41 D0317 18:30:34.112971 431499 usertrap_amd64.go:225] [ 25829( 133): 25835( 134)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.113359 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.113425 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 38 D0317 18:30:34.113518 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.113613 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.113685 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 37 D0317 18:30:34.113790 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.116029 431499 usertrap_amd64.go:212] [ 25829( 133): 25829( 133)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.116108 431499 usertrap_amd64.go:122] [ 25829( 133): 25829( 133)] Allocate a new trap: 0xc0000460f0 42 D0317 18:30:34.116267 431499 usertrap_amd64.go:225] [ 25829( 133): 25829( 133)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.117489 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.117774 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 37 D0317 18:30:34.118639 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.120942 431499 task_exit.go:204] [ 25826( 202): 25826( 202)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.123027 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.123113 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 38 D0317 18:30:34.123187 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.123852 431499 task_exit.go:204] [ 25829( 133): 25829( 133)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.125426 431499 task_signals.go:204] [ 25829( 133): 25835( 134)] Signal 9, PID: 25829, TID: 25835, fault addr: 0x0: terminating thread group D0317 18:30:34.125633 431499 task_exit.go:204] [ 25829( 133): 25835( 134)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.127256 431499 task_exit.go:204] [ 25826( 202): 25826( 202)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.127379 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.127581 431499 task_exit.go:204] [ 25826( 202): 25826( 202)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.127875 431499 task_exit.go:204] [ 25829( 133): 25829( 133)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.135216 431499 task_exit.go:204] [ 25829( 133): 25835( 134)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.135420 431499 task_exit.go:204] [ 25829( 133): 25835( 134)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.135767 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.136822 431499 task_exit.go:204] [ 25829( 133): 25829( 133)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}, {{&(0x7f0000000ac0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001e80)=ANY=[], 0x38}}], 0x2, 0x0) D0317 18:30:34.142829 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.142921 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 39 D0317 18:30:34.142987 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.153116 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.153338 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 38 D0317 18:30:34.153565 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.160293 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.160388 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 39 D0317 18:30:34.160462 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:34.162591 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.162661 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 40 D0317 18:30:34.162716 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.164209 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.164310 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 41 D0317 18:30:34.164374 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.164957 431499 usertrap_amd64.go:212] [ 25834(1411): 25836(1412)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.165069 431499 usertrap_amd64.go:122] [ 25834(1411): 25836(1412)] Allocate a new trap: 0xc00628a330 42 D0317 18:30:34.165165 431499 usertrap_amd64.go:225] [ 25834(1411): 25836(1412)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.176417 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.176563 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 40 D0317 18:30:34.176733 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.177214 431499 usertrap_amd64.go:212] [ 25834(1411): 25834(1411)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.177313 431499 usertrap_amd64.go:122] [ 25834(1411): 25834(1411)] Allocate a new trap: 0xc00628a330 43 D0317 18:30:34.177392 431499 usertrap_amd64.go:225] [ 25834(1411): 25834(1411)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.180462 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.180556 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 41 D0317 18:30:34.180679 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.182532 431499 usertrap_amd64.go:212] [ 25833(2857): 25838(2858)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.182599 431499 usertrap_amd64.go:122] [ 25833(2857): 25838(2858)] Allocate a new trap: 0xc0040fc2a0 42 D0317 18:30:34.182685 431499 usertrap_amd64.go:225] [ 25833(2857): 25838(2858)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.182849 431499 task_exit.go:204] [ 25834(1411): 25834(1411)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.183125 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.183223 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 39 D0317 18:30:34.183293 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.183471 431499 task_exit.go:204] [ 25834(1411): 25834(1411)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.183830 431499 task_signals.go:204] [ 25834(1411): 25836(1412)] Signal 9, PID: 25834, TID: 25836, fault addr: 0x0: terminating thread group D0317 18:30:34.185195 431499 task_exit.go:204] [ 25834(1411): 25836(1412)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.185240 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.185468 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 40 D0317 18:30:34.185558 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.185858 431499 usertrap_amd64.go:212] [ 25832( 203): 25839( 204)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.185932 431499 usertrap_amd64.go:122] [ 25832( 203): 25839( 204)] Allocate a new trap: 0xc0067dc480 41 D0317 18:30:34.186045 431499 usertrap_amd64.go:225] [ 25832( 203): 25839( 204)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.191186 431499 task_exit.go:204] [ 25834(1411): 25836(1412)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.191238 431499 task_exit.go:204] [ 25834(1411): 25836(1412)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.191306 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.193494 431499 task_exit.go:204] [ 25834(1411): 25834(1411)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.194718 431499 usertrap_amd64.go:212] [ 25832( 203): 25832( 203)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:34.194942 431499 usertrap_amd64.go:122] [ 25832( 203): 25832( 203)] Allocate a new trap: 0xc0067dc480 42 D0317 18:30:34.195064 431499 usertrap_amd64.go:225] [ 25832( 203): 25832( 203)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 18:30:34 executing program 2: request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) D0317 18:30:34.196759 431499 usertrap_amd64.go:212] [ 25833(2857): 25833(2857)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.196882 431499 usertrap_amd64.go:122] [ 25833(2857): 25833(2857)] Allocate a new trap: 0xc0040fc2a0 43 D0317 18:30:34.196971 431499 usertrap_amd64.go:225] [ 25833(2857): 25833(2857)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.209624 431499 task_exit.go:204] [ 25832( 203): 25832( 203)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.209771 431499 task_exit.go:204] [ 25833(2857): 25833(2857)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.209978 431499 task_signals.go:204] [ 25832( 203): 25839( 204)] Signal 9, PID: 25832, TID: 25839, fault addr: 0x0: terminating thread group D0317 18:30:34.210048 431499 task_signals.go:204] [ 25833(2857): 25838(2858)] Signal 9, PID: 25833, TID: 25838, fault addr: 0x0: terminating thread group D0317 18:30:34.210564 431499 task_exit.go:204] [ 25833(2857): 25833(2857)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.210665 431499 task_exit.go:204] [ 25832( 203): 25839( 204)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.211642 431499 task_exit.go:204] [ 25832( 203): 25832( 203)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.211817 431499 task_exit.go:204] [ 25833(2857): 25838(2858)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.213546 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.213679 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 36 D0317 18:30:34.214664 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.218445 431499 task_exit.go:204] [ 25832( 203): 25839( 204)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.218549 431499 task_exit.go:204] [ 25832( 203): 25839( 204)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.218735 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.219405 431499 task_exit.go:204] [ 25833(2857): 25838(2858)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.219481 431499 task_exit.go:204] [ 25833(2857): 25838(2858)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.219595 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.219854 431499 task_exit.go:204] [ 25832( 203): 25832( 203)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.221248 431499 task_exit.go:204] [ 25833(2857): 25833(2857)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 1: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000340)) 18:30:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}, {{&(0x7f0000000ac0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00)'], 0x38}}], 0x2, 0x0) D0317 18:30:34.223296 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.223377 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 37 D0317 18:30:34.223446 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.239597 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.239770 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 38 D0317 18:30:34.239969 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.250174 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.250305 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 39 D0317 18:30:34.250798 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:34.252442 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.255637 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 40 D0317 18:30:34.255742 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:34.255890 431499 usertrap_amd64.go:212] [ 25837( 135): 25842( 136)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.256013 431499 usertrap_amd64.go:122] [ 25837( 135): 25842( 136)] Allocate a new trap: 0xc006dc8450 41 D0317 18:30:34.256116 431499 usertrap_amd64.go:225] [ 25837( 135): 25842( 136)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.264550 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.264674 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 37 D0317 18:30:34.265822 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.266985 431499 usertrap_amd64.go:212] [ 25837( 135): 25837( 135)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.267092 431499 usertrap_amd64.go:122] [ 25837( 135): 25837( 135)] Allocate a new trap: 0xc006dc8450 42 D0317 18:30:34.267240 431499 usertrap_amd64.go:225] [ 25837( 135): 25837( 135)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.273918 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.274097 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 38 D0317 18:30:34.274207 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.275843 431499 task_exit.go:204] [ 25837( 135): 25837( 135)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.276128 431499 task_signals.go:204] [ 25837( 135): 25842( 136)] Signal 9, PID: 25837, TID: 25842, fault addr: 0x0: terminating thread group D0317 18:30:34.276627 431499 task_exit.go:204] [ 25837( 135): 25837( 135)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.277043 431499 task_exit.go:204] [ 25837( 135): 25842( 136)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.277868 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.277986 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 37 D0317 18:30:34.279061 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.283775 431499 task_exit.go:204] [ 25837( 135): 25842( 136)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.283857 431499 task_exit.go:204] [ 25837( 135): 25842( 136)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.284006 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.284252 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.284349 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 38 D0317 18:30:34.284447 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.284499 431499 task_exit.go:204] [ 25837( 135): 25837( 135)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006640)=[{{&(0x7f0000003b80)={0xa, 0x4e22, 0x0, @mcast2, 0xe20}, 0x1c, 0x0}}], 0x1, 0x0) D0317 18:30:34.294721 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.294802 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 39 D0317 18:30:34.294907 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.301996 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.302253 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 36 D0317 18:30:34.303845 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:34.307490 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.307629 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 40 D0317 18:30:34.307811 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.309456 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.309527 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 41 D0317 18:30:34.309605 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.309426 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.310278 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 37 D0317 18:30:34.310462 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.310262 431499 usertrap_amd64.go:212] [ 25840(1413): 25844(1414)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.311653 431499 usertrap_amd64.go:122] [ 25840(1413): 25844(1414)] Allocate a new trap: 0xc0067dc510 42 D0317 18:30:34.311748 431499 usertrap_amd64.go:225] [ 25840(1413): 25844(1414)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.325796 431499 usertrap_amd64.go:212] [ 25840(1413): 25840(1413)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.325858 431499 usertrap_amd64.go:122] [ 25840(1413): 25840(1413)] Allocate a new trap: 0xc0067dc510 43 D0317 18:30:34.325929 431499 usertrap_amd64.go:225] [ 25840(1413): 25840(1413)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.332424 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.332685 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 38 D0317 18:30:34.332847 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.334725 431499 task_exit.go:204] [ 25840(1413): 25840(1413)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.335912 431499 task_exit.go:204] [ 25840(1413): 25840(1413)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.335878 431499 task_signals.go:204] [ 25840(1413): 25844(1414)] Signal 9, PID: 25840, TID: 25844, fault addr: 0x0: terminating thread group D0317 18:30:34.336107 431499 task_exit.go:204] [ 25840(1413): 25844(1414)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.345229 431499 task_exit.go:204] [ 25840(1413): 25844(1414)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.345336 431499 task_exit.go:204] [ 25840(1413): 25844(1414)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.345424 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.345619 431499 task_exit.go:204] [ 25840(1413): 25840(1413)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 2: socket$inet6(0xa, 0x3, 0x5) D0317 18:30:34.350553 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.350734 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 39 D0317 18:30:34.350878 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:34.355733 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.355820 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 39 D0317 18:30:34.355959 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.356650 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.356730 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 36 D0317 18:30:34.357462 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.361398 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.361460 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 40 D0317 18:30:34.361542 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.361625 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.361884 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 37 D0317 18:30:34.362109 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.363073 431499 usertrap_amd64.go:212] [ 25843( 205): 25846( 206)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.363197 431499 usertrap_amd64.go:122] [ 25843( 205): 25846( 206)] Allocate a new trap: 0xc00628a360 41 D0317 18:30:34.363347 431499 usertrap_amd64.go:225] [ 25843( 205): 25846( 206)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.368647 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.368753 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 40 D0317 18:30:34.368845 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.370082 431499 usertrap_amd64.go:212] [ 25843( 205): 25843( 205)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:34.370212 431499 usertrap_amd64.go:122] [ 25843( 205): 25843( 205)] Allocate a new trap: 0xc00628a360 42 D0317 18:30:34.370462 431499 usertrap_amd64.go:225] [ 25843( 205): 25843( 205)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:34.370573 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.370701 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 41 D0317 18:30:34.370862 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.371303 431499 usertrap_amd64.go:212] [ 25841(2859): 25847(2860)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.371414 431499 usertrap_amd64.go:122] [ 25841(2859): 25847(2860)] Allocate a new trap: 0xc006dc8480 42 D0317 18:30:34.371507 431499 usertrap_amd64.go:225] [ 25841(2859): 25847(2860)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.377686 431499 task_exit.go:204] [ 25843( 205): 25843( 205)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.378388 431499 task_exit.go:204] [ 25843( 205): 25843( 205)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.378555 431499 task_signals.go:204] [ 25843( 205): 25846( 206)] Signal 9, PID: 25843, TID: 25846, fault addr: 0x0: terminating thread group D0317 18:30:34.378685 431499 task_exit.go:204] [ 25843( 205): 25846( 206)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.379155 431499 usertrap_amd64.go:212] [ 25841(2859): 25841(2859)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.379244 431499 usertrap_amd64.go:122] [ 25841(2859): 25841(2859)] Allocate a new trap: 0xc006dc8480 43 D0317 18:30:34.379367 431499 usertrap_amd64.go:225] [ 25841(2859): 25841(2859)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.381034 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.381105 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 38 D0317 18:30:34.381269 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.386118 431499 task_exit.go:204] [ 25843( 205): 25846( 206)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.386229 431499 task_exit.go:204] [ 25843( 205): 25846( 206)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.386329 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.386652 431499 task_exit.go:204] [ 25841(2859): 25841(2859)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.386904 431499 task_signals.go:204] [ 25841(2859): 25847(2860)] Signal 9, PID: 25841, TID: 25847, fault addr: 0x0: terminating thread group D0317 18:30:34.387525 431499 task_exit.go:204] [ 25841(2859): 25841(2859)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.387780 431499 task_exit.go:204] [ 25841(2859): 25847(2860)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.388071 431499 task_exit.go:204] [ 25843( 205): 25843( 205)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x3, [@multicast, @link_local, @empty]}) D0317 18:30:34.398002 431499 task_exit.go:204] [ 25841(2859): 25847(2860)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.398143 431499 task_exit.go:204] [ 25841(2859): 25847(2860)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.398339 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.398724 431499 task_exit.go:204] [ 25841(2859): 25841(2859)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.400581 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.400652 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.400708 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 39 D0317 18:30:34.400819 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 37 D0317 18:30:34.400975 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) 18:30:34 executing program 0: pipe2$watch_queue(&(0x7f0000000700)={0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000740)={0x2, 0x0, [{}, {0x0, 0x0, 0x41}]}) D0317 18:30:34.401685 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.403599 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.403711 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 40 D0317 18:30:34.403796 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:34.404357 431499 usertrap_amd64.go:212] [ 25845( 137): 25849( 138)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.404410 431499 usertrap_amd64.go:122] [ 25845( 137): 25849( 138)] Allocate a new trap: 0xc006f9c210 41 D0317 18:30:34.404503 431499 usertrap_amd64.go:225] [ 25845( 137): 25849( 138)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.409005 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.409165 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 38 D0317 18:30:34.409344 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.409958 431499 usertrap_amd64.go:212] [ 25845( 137): 25845( 137)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.410029 431499 usertrap_amd64.go:122] [ 25845( 137): 25845( 137)] Allocate a new trap: 0xc006f9c210 42 D0317 18:30:34.410105 431499 usertrap_amd64.go:225] [ 25845( 137): 25845( 137)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.420293 431499 task_exit.go:204] [ 25845( 137): 25845( 137)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.421009 431499 task_signals.go:204] [ 25845( 137): 25849( 138)] Signal 9, PID: 25845, TID: 25849, fault addr: 0x0: terminating thread group D0317 18:30:34.421135 431499 task_exit.go:204] [ 25845( 137): 25845( 137)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.421357 431499 task_exit.go:204] [ 25845( 137): 25849( 138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.429065 431499 task_exit.go:204] [ 25845( 137): 25849( 138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.429248 431499 task_exit.go:204] [ 25845( 137): 25849( 138)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.429425 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.430544 431499 task_exit.go:204] [ 25845( 137): 25845( 137)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f40)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @private}}, 0x1c, 0x0, 0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1400000000000000290000000b000000000000000000000014000000000000002900000008000000090000000000000020000000000000002900000036000000730000000000000000010000000000001408"], 0x108}}], 0x1, 0x0) D0317 18:30:34.432727 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.432844 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 39 D0317 18:30:34.433097 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.442953 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.443080 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 36 D0317 18:30:34.443989 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:34.446932 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.447036 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 37 D0317 18:30:34.447871 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.450839 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.450908 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 40 D0317 18:30:34.451023 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.451842 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.451935 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 37 D0317 18:30:34.452000 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.453007 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.453092 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 41 D0317 18:30:34.453164 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.453418 431499 usertrap_amd64.go:212] [ 25848(1415): 25852(1416)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.453474 431499 usertrap_amd64.go:122] [ 25848(1415): 25852(1416)] Allocate a new trap: 0xc0040ca1b0 42 D0317 18:30:34.453545 431499 usertrap_amd64.go:225] [ 25848(1415): 25852(1416)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.454765 431499 usertrap_amd64.go:212] [ 25848(1415): 25848(1415)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.454867 431499 usertrap_amd64.go:122] [ 25848(1415): 25848(1415)] Allocate a new trap: 0xc0040ca1b0 43 D0317 18:30:34.454964 431499 usertrap_amd64.go:225] [ 25848(1415): 25848(1415)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.457234 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.457290 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 38 D0317 18:30:34.457361 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.461139 431499 task_exit.go:204] [ 25848(1415): 25848(1415)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.462192 431499 task_signals.go:204] [ 25848(1415): 25852(1416)] Signal 9, PID: 25848, TID: 25852, fault addr: 0x0: terminating thread group D0317 18:30:34.462516 431499 task_exit.go:204] [ 25848(1415): 25848(1415)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.462925 431499 task_exit.go:204] [ 25848(1415): 25852(1416)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.474663 431499 task_exit.go:204] [ 25848(1415): 25852(1416)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.474735 431499 task_exit.go:204] [ 25848(1415): 25852(1416)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.474820 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.479435 431499 task_exit.go:204] [ 25848(1415): 25848(1415)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.480473 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.480602 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 39 D0317 18:30:34.480726 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:34 executing program 2: add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000080)='6', 0x1, 0xfffffffffffffffe) D0317 18:30:34.483201 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.483309 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 38 D0317 18:30:34.483407 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.505826 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.505979 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 40 D0317 18:30:34.506076 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.509658 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.509790 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 41 D0317 18:30:34.509870 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.510649 431499 usertrap_amd64.go:212] [ 25851(2861): 25854(2862)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.510649 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.510717 431499 usertrap_amd64.go:122] [ 25851(2861): 25854(2862)] Allocate a new trap: 0xc004fc65a0 42 D0317 18:30:34.510750 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 39 D0317 18:30:34.510781 431499 usertrap_amd64.go:225] [ 25851(2861): 25854(2862)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.510823 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.513632 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.513731 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 40 D0317 18:30:34.513811 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.517304 431499 usertrap_amd64.go:212] [ 25850( 207): 25856( 208)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.517410 431499 usertrap_amd64.go:122] [ 25850( 207): 25856( 208)] Allocate a new trap: 0xc004fc6570 41 D0317 18:30:34.517485 431499 usertrap_amd64.go:225] [ 25850( 207): 25856( 208)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.519286 431499 usertrap_amd64.go:212] [ 25851(2861): 25851(2861)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.519373 431499 usertrap_amd64.go:122] [ 25851(2861): 25851(2861)] Allocate a new trap: 0xc004fc65a0 43 D0317 18:30:34.519450 431499 usertrap_amd64.go:225] [ 25851(2861): 25851(2861)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.519883 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.519987 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 36 D0317 18:30:34.520786 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.526091 431499 usertrap_amd64.go:212] [ 25850( 207): 25850( 207)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:34.526175 431499 usertrap_amd64.go:122] [ 25850( 207): 25850( 207)] Allocate a new trap: 0xc004fc6570 42 D0317 18:30:34.526292 431499 usertrap_amd64.go:225] [ 25850( 207): 25850( 207)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:34.528523 431499 task_exit.go:204] [ 25851(2861): 25851(2861)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.528798 431499 task_signals.go:204] [ 25851(2861): 25854(2862)] Signal 9, PID: 25851, TID: 25854, fault addr: 0x0: terminating thread group D0317 18:30:34.529228 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.529325 431499 task_exit.go:204] [ 25851(2861): 25851(2861)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.529369 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 37 D0317 18:30:34.529461 431499 task_exit.go:204] [ 25851(2861): 25854(2862)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.529497 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.531561 431499 task_exit.go:204] [ 25850( 207): 25850( 207)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.531930 431499 task_signals.go:204] [ 25850( 207): 25856( 208)] Signal 9, PID: 25850, TID: 25856, fault addr: 0x0: terminating thread group D0317 18:30:34.532551 431499 task_exit.go:204] [ 25850( 207): 25850( 207)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.532698 431499 task_exit.go:204] [ 25850( 207): 25856( 208)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.537388 431499 task_exit.go:204] [ 25851(2861): 25854(2862)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.537569 431499 task_exit.go:204] [ 25851(2861): 25854(2862)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.537740 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.538219 431499 task_exit.go:204] [ 25851(2861): 25851(2861)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 0: semget(0x3, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, 0x0, 0x1}) D0317 18:30:34.540470 431499 task_exit.go:204] [ 25850( 207): 25856( 208)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.540575 431499 task_exit.go:204] [ 25850( 207): 25856( 208)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.540751 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.540981 431499 task_exit.go:204] [ 25850( 207): 25850( 207)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.542084 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.542303 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 37 18:30:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001740)=[{{&(0x7f00000001c0)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) D0317 18:30:34.543239 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.546904 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.546976 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 38 D0317 18:30:34.547045 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.553784 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.553855 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 38 D0317 18:30:34.554001 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.561393 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.561468 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 39 D0317 18:30:34.561551 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:34.569730 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.569895 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 40 D0317 18:30:34.570163 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:34.570565 431499 usertrap_amd64.go:212] [ 25853( 139): 25858( 140)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.570763 431499 usertrap_amd64.go:122] [ 25853( 139): 25858( 140)] Allocate a new trap: 0xc0026c61e0 41 D0317 18:30:34.570834 431499 usertrap_amd64.go:225] [ 25853( 139): 25858( 140)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.574688 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.574852 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 39 D0317 18:30:34.574973 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.577962 431499 usertrap_amd64.go:212] [ 25853( 139): 25853( 139)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.578009 431499 usertrap_amd64.go:122] [ 25853( 139): 25853( 139)] Allocate a new trap: 0xc0026c61e0 42 D0317 18:30:34.578079 431499 usertrap_amd64.go:225] [ 25853( 139): 25853( 139)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.583870 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.584057 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 37 D0317 18:30:34.584687 431499 task_exit.go:204] [ 25853( 139): 25853( 139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.585106 431499 task_signals.go:204] [ 25853( 139): 25858( 140)] Signal 9, PID: 25853, TID: 25858, fault addr: 0x0: terminating thread group D0317 18:30:34.585249 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.585625 431499 task_exit.go:204] [ 25853( 139): 25853( 139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.586309 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.586423 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 40 D0317 18:30:34.586513 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.586598 431499 task_exit.go:204] [ 25853( 139): 25858( 140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.588381 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.588628 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 41 D0317 18:30:34.589032 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.591831 431499 usertrap_amd64.go:212] [ 25855(1417): 25859(1418)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.591938 431499 usertrap_amd64.go:122] [ 25855(1417): 25859(1418)] Allocate a new trap: 0xc003cb2030 42 D0317 18:30:34.592130 431499 usertrap_amd64.go:225] [ 25855(1417): 25859(1418)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.593237 431499 task_exit.go:204] [ 25853( 139): 25858( 140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.593344 431499 task_exit.go:204] [ 25853( 139): 25858( 140)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.593491 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.593801 431499 task_exit.go:204] [ 25853( 139): 25853( 139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.594289 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.594375 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 38 D0317 18:30:34.594394 431499 usertrap_amd64.go:212] [ 25855(1417): 25855(1417)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.594547 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.594562 431499 usertrap_amd64.go:122] [ 25855(1417): 25855(1417)] Allocate a new trap: 0xc003cb2030 43 D0317 18:30:34.594804 431499 usertrap_amd64.go:225] [ 25855(1417): 25855(1417)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) 18:30:34 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000023c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000002540)={0xc, 0x0, &(0x7f0000002400)=[@enter_looper, @release], 0x0, 0x0, 0x0}) D0317 18:30:34.606890 431499 task_exit.go:204] [ 25855(1417): 25855(1417)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.607516 431499 task_signals.go:204] [ 25855(1417): 25859(1418)] Signal 9, PID: 25855, TID: 25859, fault addr: 0x0: terminating thread group D0317 18:30:34.607588 431499 task_exit.go:204] [ 25855(1417): 25855(1417)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.607849 431499 task_exit.go:204] [ 25855(1417): 25859(1418)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.614995 431499 task_exit.go:204] [ 25855(1417): 25859(1418)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.615126 431499 task_exit.go:204] [ 25855(1417): 25859(1418)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.615229 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.617510 431499 task_exit.go:204] [ 25855(1417): 25855(1417)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.617566 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.617767 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 36 D0317 18:30:34.618933 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 18:30:34 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x3f, 0x1000}, {0x0, 0x6, 0x1800}, {0x2, 0x7}, {0x2, 0x7}], 0x4, &(0x7f0000000040)={0x0, 0x989680}) D0317 18:30:34.622624 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.622703 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 37 D0317 18:30:34.622778 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.635491 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.635657 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 38 D0317 18:30:34.635739 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.636811 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.637009 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 39 D0317 18:30:34.637226 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:34.638038 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.638151 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 36 D0317 18:30:34.638898 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.644696 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.644793 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 37 D0317 18:30:34.644862 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.646015 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.646103 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 39 D0317 18:30:34.646175 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.648563 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.648642 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 40 D0317 18:30:34.648754 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.649073 431499 usertrap_amd64.go:212] [ 25860( 209): 25862( 210)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.649169 431499 usertrap_amd64.go:122] [ 25860( 209): 25862( 210)] Allocate a new trap: 0xc0040fc3f0 41 D0317 18:30:34.649161 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.649244 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 40 D0317 18:30:34.649341 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.649431 431499 usertrap_amd64.go:225] [ 25860( 209): 25862( 210)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.651179 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.651249 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 41 D0317 18:30:34.651388 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.652067 431499 usertrap_amd64.go:212] [ 25857(2863): 25863(2864)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.652141 431499 usertrap_amd64.go:122] [ 25857(2863): 25863(2864)] Allocate a new trap: 0xc006e640c0 42 D0317 18:30:34.652230 431499 usertrap_amd64.go:225] [ 25857(2863): 25863(2864)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.668938 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.669087 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 37 D0317 18:30:34.669923 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.675777 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.675702 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.675863 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 38 D0317 18:30:34.675889 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 38 D0317 18:30:34.675958 431499 usertrap_amd64.go:212] [ 25860( 209): 25860( 209)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:34.676008 431499 usertrap_amd64.go:122] [ 25860( 209): 25860( 209)] Allocate a new trap: 0xc0040fc3f0 42 D0317 18:30:34.675947 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.676002 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.676118 431499 usertrap_amd64.go:225] [ 25860( 209): 25860( 209)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:34.676733 431499 usertrap_amd64.go:212] [ 25857(2863): 25857(2863)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.676878 431499 usertrap_amd64.go:122] [ 25857(2863): 25857(2863)] Allocate a new trap: 0xc006e640c0 43 D0317 18:30:34.677084 431499 usertrap_amd64.go:225] [ 25857(2863): 25857(2863)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.689493 431499 task_exit.go:204] [ 25857(2863): 25857(2863)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.689979 431499 task_signals.go:204] [ 25857(2863): 25863(2864)] Signal 9, PID: 25857, TID: 25863, fault addr: 0x0: terminating thread group D0317 18:30:34.690223 431499 task_exit.go:204] [ 25857(2863): 25863(2864)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.691027 431499 task_exit.go:204] [ 25857(2863): 25863(2864)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.691104 431499 task_exit.go:204] [ 25857(2863): 25863(2864)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.698482 431499 task_exit.go:204] [ 25857(2863): 25857(2863)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.698612 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.699028 431499 task_exit.go:204] [ 25857(2863): 25857(2863)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.699694 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.699792 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 39 D0317 18:30:34.699974 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:34.702046 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.702135 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 40 D0317 18:30:34.702368 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) 18:30:34 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, 0x0) D0317 18:30:34.702961 431499 usertrap_amd64.go:212] [ 25861( 141): 25865( 142)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.703036 431499 usertrap_amd64.go:122] [ 25861( 141): 25865( 142)] Allocate a new trap: 0xc0026c6270 41 D0317 18:30:34.703114 431499 usertrap_amd64.go:225] [ 25861( 141): 25865( 142)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.703664 431499 task_exit.go:204] [ 25860( 209): 25860( 209)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.704119 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.704246 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 39 D0317 18:30:34.704403 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.704832 431499 task_exit.go:204] [ 25860( 209): 25860( 209)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.704818 431499 task_signals.go:204] [ 25860( 209): 25862( 210)] Signal 9, PID: 25860, TID: 25862, fault addr: 0x0: terminating thread group D0317 18:30:34.705027 431499 task_exit.go:204] [ 25860( 209): 25862( 210)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.711328 431499 task_exit.go:204] [ 25860( 209): 25862( 210)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.711706 431499 task_exit.go:204] [ 25860( 209): 25862( 210)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.711920 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.712123 431499 task_exit.go:204] [ 25860( 209): 25860( 209)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x1, [@multicast]}) D0317 18:30:34.719068 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.719148 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 40 D0317 18:30:34.719213 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.721705 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.721811 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 41 D0317 18:30:34.721899 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.722314 431499 usertrap_amd64.go:212] [ 25864(1419): 25866(1420)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.722402 431499 usertrap_amd64.go:122] [ 25864(1419): 25866(1420)] Allocate a new trap: 0xc000046150 42 D0317 18:30:34.722480 431499 usertrap_amd64.go:225] [ 25864(1419): 25866(1420)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:34.727118 431499 usertrap_amd64.go:212] [ 25864(1419): 25864(1419)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.727223 431499 usertrap_amd64.go:122] [ 25864(1419): 25864(1419)] Allocate a new trap: 0xc000046150 43 D0317 18:30:34.727300 431499 usertrap_amd64.go:225] [ 25864(1419): 25864(1419)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.738183 431499 task_exit.go:204] [ 25864(1419): 25864(1419)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.738816 431499 task_signals.go:204] [ 25864(1419): 25866(1420)] Signal 9, PID: 25864, TID: 25866, fault addr: 0x0: terminating thread group D0317 18:30:34.738975 431499 task_exit.go:204] [ 25864(1419): 25864(1419)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.739508 431499 task_exit.go:204] [ 25864(1419): 25866(1420)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.740078 431499 usertrap_amd64.go:212] [ 25861( 141): 25861( 141)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.740185 431499 usertrap_amd64.go:122] [ 25861( 141): 25861( 141)] Allocate a new trap: 0xc0026c6270 42 D0317 18:30:34.740268 431499 usertrap_amd64.go:225] [ 25861( 141): 25861( 141)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.746851 431499 task_exit.go:204] [ 25864(1419): 25866(1420)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.747045 431499 task_exit.go:204] [ 25864(1419): 25866(1420)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.747261 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.747701 431499 task_exit.go:204] [ 25864(1419): 25864(1419)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.749509 431499 task_exit.go:204] [ 25861( 141): 25861( 141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.749850 431499 task_signals.go:204] [ 25861( 141): 25865( 142)] Signal 9, PID: 25861, TID: 25865, fault addr: 0x0: terminating thread group D0317 18:30:34.750212 431499 task_exit.go:204] [ 25861( 141): 25861( 141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.750344 431499 task_exit.go:204] [ 25861( 141): 25865( 142)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:34 executing program 2: socket(0x29, 0x2, 0x400) D0317 18:30:34.757071 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.757269 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 37 D0317 18:30:34.758099 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.758965 431499 task_exit.go:204] [ 25861( 141): 25865( 142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.759043 431499 task_exit.go:204] [ 25861( 141): 25865( 142)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.759227 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.759559 431499 task_exit.go:204] [ 25861( 141): 25861( 141)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x40010002, 0x0, 0x0) D0317 18:30:34.763009 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.763107 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 38 D0317 18:30:34.763177 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.779305 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.779420 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 36 D0317 18:30:34.780293 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:34.786070 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.786167 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 37 D0317 18:30:34.786344 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.791026 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.791091 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 39 D0317 18:30:34.791161 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:34.799441 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.799664 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 37 D0317 18:30:34.800584 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.802031 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.802158 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 38 D0317 18:30:34.802254 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.806676 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.806756 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 38 D0317 18:30:34.806845 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.809355 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.809541 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 36 D0317 18:30:34.809882 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.810067 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 40 D0317 18:30:34.810258 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.810387 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.812094 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.812164 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 41 D0317 18:30:34.812242 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.812632 431499 usertrap_amd64.go:212] [ 25867(2865): 25871(2866)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.812742 431499 usertrap_amd64.go:122] [ 25867(2865): 25871(2866)] Allocate a new trap: 0xc003cb20f0 42 D0317 18:30:34.812938 431499 usertrap_amd64.go:225] [ 25867(2865): 25871(2866)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.813983 431499 usertrap_amd64.go:212] [ 25867(2865): 25871(2866)] Found the pattern at ip 55ef2c836999:sysno 257 D0317 18:30:34.814054 431499 usertrap_amd64.go:122] [ 25867(2865): 25871(2866)] Allocate a new trap: 0xc003cb20f0 43 D0317 18:30:34.814234 431499 usertrap_amd64.go:225] [ 25867(2865): 25871(2866)] Apply the binary patch addr 55ef2c836999 trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.815117 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.815214 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 37 D0317 18:30:34.815416 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.818728 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.818798 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 39 D0317 18:30:34.818889 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.820517 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.821034 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 40 D0317 18:30:34.821445 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.821643 431499 usertrap_amd64.go:212] [ 25868( 211): 25872( 212)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.821745 431499 usertrap_amd64.go:122] [ 25868( 211): 25872( 212)] Allocate a new trap: 0xc0040fc450 41 D0317 18:30:34.821810 431499 usertrap_amd64.go:225] [ 25868( 211): 25872( 212)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.822001 431499 usertrap_amd64.go:212] [ 25867(2865): 25867(2865)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.822654 431499 usertrap_amd64.go:122] [ 25867(2865): 25867(2865)] Allocate a new trap: 0xc003cb20f0 44 D0317 18:30:34.822803 431499 usertrap_amd64.go:225] [ 25867(2865): 25867(2865)] Apply the binary patch addr 55ef2c836c93 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0317 18:30:34.825878 431499 task_exit.go:204] [ 25867(2865): 25867(2865)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.826652 431499 task_signals.go:204] [ 25867(2865): 25871(2866)] Signal 9, PID: 25867, TID: 25871, fault addr: 0x0: terminating thread group D0317 18:30:34.826801 431499 task_exit.go:204] [ 25867(2865): 25867(2865)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.827025 431499 task_exit.go:204] [ 25867(2865): 25871(2866)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.828798 431499 usertrap_amd64.go:212] [ 25868( 211): 25868( 211)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:34.828958 431499 usertrap_amd64.go:122] [ 25868( 211): 25868( 211)] Allocate a new trap: 0xc0040fc450 42 D0317 18:30:34.829179 431499 usertrap_amd64.go:225] [ 25868( 211): 25868( 211)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:34.833975 431499 task_exit.go:204] [ 25867(2865): 25871(2866)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.834134 431499 task_exit.go:204] [ 25867(2865): 25871(2866)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.834387 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:34.835708 431499 task_exit.go:204] [ 25867(2865): 25867(2865)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.839085 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.839206 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 39 D0317 18:30:34.839317 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) 18:30:34 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)) D0317 18:30:34.844396 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.844484 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 38 D0317 18:30:34.844537 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.852503 431499 task_exit.go:204] [ 25868( 211): 25868( 211)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.853658 431499 task_exit.go:204] [ 25868( 211): 25868( 211)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.853824 431499 task_signals.go:204] [ 25868( 211): 25872( 212)] Signal 9, PID: 25868, TID: 25872, fault addr: 0x0: terminating thread group D0317 18:30:34.853962 431499 task_exit.go:204] [ 25868( 211): 25872( 212)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.860066 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.860163 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 40 D0317 18:30:34.860260 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:34.860928 431499 task_exit.go:204] [ 25868( 211): 25872( 212)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.861150 431499 task_exit.go:204] [ 25868( 211): 25872( 212)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.861384 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:34.862897 431499 task_exit.go:204] [ 25868( 211): 25868( 211)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.863089 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:34.863220 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 41 D0317 18:30:34.863326 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:34.863936 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:34.864004 431499 usertrap_amd64.go:212] [ 25869(1421): 25873(1422)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:34.864297 431499 usertrap_amd64.go:122] [ 25869(1421): 25873(1422)] Allocate a new trap: 0xc003cb2120 42 D0317 18:30:34.864485 431499 usertrap_amd64.go:225] [ 25869(1421): 25873(1422)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) 18:30:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @rand_addr=0x64010102, {[@ssrr={0x89, 0xf, 0x0, [@empty, @empty, @multicast1]}, @lsrr={0x83, 0xf, 0x0, [@rand_addr, @broadcast, @loopback]}, @rr={0x7, 0x7, 0x0, [@rand_addr]}, @cipso={0x86, 0x17, 0x0, [{0x0, 0x8, "ed96b6d433ef"}, {0x0, 0x5, 'y\x00.'}, {0x0, 0x4, "ead8"}]}, @ssrr={0x89, 0x1b, 0x0, [@broadcast, @broadcast, @multicast1, @multicast2, @rand_addr, @broadcast]}, @ssrr={0x89, 0xb, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1b, 0x0, [@multicast2, @broadcast, @loopback, @remote, @local, @private]}]}}}}}) D0317 18:30:34.865137 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 39 D0317 18:30:34.865346 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:34.866405 431499 usertrap_amd64.go:212] [ 25869(1421): 25869(1421)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:34.866471 431499 usertrap_amd64.go:122] [ 25869(1421): 25869(1421)] Allocate a new trap: 0xc003cb2120 43 D0317 18:30:34.866537 431499 usertrap_amd64.go:225] [ 25869(1421): 25869(1421)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:34.867320 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:34.869979 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 40 D0317 18:30:34.870171 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:34.870401 431499 usertrap_amd64.go:212] [ 25870( 143): 25874( 144)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:34.870660 431499 usertrap_amd64.go:122] [ 25870( 143): 25874( 144)] Allocate a new trap: 0xc0000462a0 41 D0317 18:30:34.870828 431499 usertrap_amd64.go:225] [ 25870( 143): 25874( 144)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:34.880317 431499 usertrap_amd64.go:212] [ 25870( 143): 25870( 143)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:34.880416 431499 usertrap_amd64.go:122] [ 25870( 143): 25870( 143)] Allocate a new trap: 0xc0000462a0 42 D0317 18:30:34.880514 431499 usertrap_amd64.go:225] [ 25870( 143): 25870( 143)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:34.881401 431499 task_exit.go:204] [ 25869(1421): 25869(1421)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.882367 431499 task_exit.go:204] [ 25869(1421): 25869(1421)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.882555 431499 task_signals.go:204] [ 25869(1421): 25873(1422)] Signal 9, PID: 25869, TID: 25873, fault addr: 0x0: terminating thread group D0317 18:30:34.882707 431499 task_exit.go:204] [ 25869(1421): 25873(1422)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.890354 431499 task_exit.go:204] [ 25869(1421): 25873(1422)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.890415 431499 task_exit.go:204] [ 25869(1421): 25873(1422)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.890494 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:34.890683 431499 task_exit.go:204] [ 25869(1421): 25869(1421)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.891871 431499 task_exit.go:204] [ 25870( 143): 25870( 143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:34.892155 431499 task_signals.go:204] [ 25870( 143): 25874( 144)] Signal 9, PID: 25870, TID: 25874, fault addr: 0x0: terminating thread group D0317 18:30:34.892290 431499 task_exit.go:204] [ 25870( 143): 25874( 144)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000700)=@abs, 0x6e, 0x0}}], 0x2, 0x0) D0317 18:30:34.893654 431499 task_exit.go:204] [ 25870( 143): 25874( 144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.893795 431499 task_exit.go:204] [ 25870( 143): 25874( 144)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:34.904273 431499 task_exit.go:204] [ 25870( 143): 25870( 143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:34.904427 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:34.904714 431499 task_exit.go:204] [ 25870( 143): 25870( 143)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @private}}}}) D0317 18:30:34.916044 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:34.916173 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 37 D0317 18:30:34.917437 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:34.919826 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:34.919935 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 36 D0317 18:30:34.920699 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:34.928113 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:34.928188 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 37 D0317 18:30:34.928314 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:34.929459 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:34.929667 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 38 D0317 18:30:34.929759 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:34.942266 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:34.942410 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 37 D0317 18:30:34.945126 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:34.950226 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:34.950301 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 38 D0317 18:30:34.950424 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:34.952584 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:34.952761 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 38 D0317 18:30:34.953049 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:34.965476 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:34.965623 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 36 D0317 18:30:34.966898 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:34.967349 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:34.967513 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 39 D0317 18:30:34.967675 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:34.972324 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:34.972432 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 39 D0317 18:30:34.972525 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:34.975293 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:34.975472 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 37 D0317 18:30:34.975720 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:34.980971 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:34.981219 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 39 D0317 18:30:34.981425 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:34.983313 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:34.983460 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 40 D0317 18:30:34.983643 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:34.984772 431499 usertrap_amd64.go:212] [ 25876( 213): 25879( 214)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:34.984844 431499 usertrap_amd64.go:122] [ 25876( 213): 25879( 214)] Allocate a new trap: 0xc006dc8570 41 D0317 18:30:34.985080 431499 usertrap_amd64.go:225] [ 25876( 213): 25879( 214)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:34.986098 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:34.986180 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 40 D0317 18:30:34.986282 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:34.989786 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:34.989930 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 41 D0317 18:30:34.990061 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:34.990250 431499 usertrap_amd64.go:212] [ 25875(2867): 25880(2868)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:34.990357 431499 usertrap_amd64.go:122] [ 25875(2867): 25880(2868)] Allocate a new trap: 0xc004fc6660 42 D0317 18:30:34.990446 431499 usertrap_amd64.go:225] [ 25875(2867): 25880(2868)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:34.993126 431499 usertrap_amd64.go:212] [ 25875(2867): 25875(2867)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:34.993284 431499 usertrap_amd64.go:122] [ 25875(2867): 25875(2867)] Allocate a new trap: 0xc004fc6660 43 D0317 18:30:34.993410 431499 usertrap_amd64.go:225] [ 25875(2867): 25875(2867)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:34.994557 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:34.994642 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 38 D0317 18:30:34.994754 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:34.999811 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:34.999973 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 40 D0317 18:30:35.000066 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.003235 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.003333 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 41 D0317 18:30:35.003426 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.004223 431499 usertrap_amd64.go:212] [ 25876( 213): 25876( 213)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.004319 431499 usertrap_amd64.go:122] [ 25876( 213): 25876( 213)] Allocate a new trap: 0xc006dc8570 42 D0317 18:30:35.004399 431499 usertrap_amd64.go:225] [ 25876( 213): 25876( 213)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.004609 431499 task_exit.go:204] [ 25875(2867): 25875(2867)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.005249 431499 task_exit.go:204] [ 25875(2867): 25875(2867)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.005404 431499 usertrap_amd64.go:212] [ 25877(1423): 25881(1424)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.005424 431499 task_signals.go:204] [ 25875(2867): 25880(2868)] Signal 9, PID: 25875, TID: 25880, fault addr: 0x0: terminating thread group D0317 18:30:35.005488 431499 usertrap_amd64.go:122] [ 25877(1423): 25881(1424)] Allocate a new trap: 0xc0094ba0c0 42 D0317 18:30:35.005524 431499 task_exit.go:204] [ 25875(2867): 25880(2868)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.005568 431499 usertrap_amd64.go:225] [ 25877(1423): 25881(1424)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.012701 431499 usertrap_amd64.go:212] [ 25877(1423): 25877(1423)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.012812 431499 usertrap_amd64.go:122] [ 25877(1423): 25877(1423)] Allocate a new trap: 0xc0094ba0c0 43 D0317 18:30:35.012892 431499 usertrap_amd64.go:225] [ 25877(1423): 25877(1423)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.012888 431499 task_exit.go:204] [ 25875(2867): 25880(2868)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.013534 431499 task_exit.go:204] [ 25875(2867): 25880(2868)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.013706 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.014149 431499 task_exit.go:204] [ 25875(2867): 25875(2867)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, r1) D0317 18:30:35.021199 431499 task_exit.go:204] [ 25877(1423): 25877(1423)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.021913 431499 task_exit.go:204] [ 25877(1423): 25877(1423)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.021882 431499 task_signals.go:204] [ 25877(1423): 25881(1424)] Signal 9, PID: 25877, TID: 25881, fault addr: 0x0: terminating thread group D0317 18:30:35.022085 431499 task_exit.go:204] [ 25877(1423): 25881(1424)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.022947 431499 task_exit.go:204] [ 25876( 213): 25876( 213)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.023228 431499 task_signals.go:204] [ 25876( 213): 25879( 214)] Signal 9, PID: 25876, TID: 25879, fault addr: 0x0: terminating thread group D0317 18:30:35.023369 431499 task_exit.go:204] [ 25876( 213): 25879( 214)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.024052 431499 task_exit.go:204] [ 25876( 213): 25876( 213)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.024271 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.024377 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 39 D0317 18:30:35.024455 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.026831 431499 usertrap_amd64.go:212] [ 25878( 145): 25882( 146)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.026936 431499 usertrap_amd64.go:122] [ 25878( 145): 25882( 146)] Allocate a new trap: 0xc0026c6390 40 D0317 18:30:35.027072 431499 usertrap_amd64.go:225] [ 25878( 145): 25882( 146)] Apply the binary patch addr 55a8b05c0320 trap addr 64c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.027700 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.027763 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 41 D0317 18:30:35.027856 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b05c0c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.030318 431499 task_exit.go:204] [ 25876( 213): 25879( 214)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.030387 431499 task_exit.go:204] [ 25876( 213): 25879( 214)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.030474 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.030689 431499 task_exit.go:204] [ 25876( 213): 25876( 213)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xc, 0x0, &(0x7f0000000380)=[@free_buffer], 0x0, 0x0, 0x0}) D0317 18:30:35.034236 431499 task_exit.go:204] [ 25877(1423): 25881(1424)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.034293 431499 task_exit.go:204] [ 25877(1423): 25881(1424)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.034359 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.039704 431499 task_exit.go:204] [ 25877(1423): 25877(1423)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.040050 431499 usertrap_amd64.go:212] [ 25878( 145): 25878( 145)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.040135 431499 usertrap_amd64.go:122] [ 25878( 145): 25878( 145)] Allocate a new trap: 0xc0026c6390 42 D0317 18:30:35.040251 431499 usertrap_amd64.go:225] [ 25878( 145): 25878( 145)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) 18:30:35 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="db"}) D0317 18:30:35.052030 431499 task_exit.go:204] [ 25878( 145): 25878( 145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.052806 431499 task_signals.go:204] [ 25878( 145): 25882( 146)] Signal 9, PID: 25878, TID: 25882, fault addr: 0x0: terminating thread group D0317 18:30:35.052895 431499 task_exit.go:204] [ 25878( 145): 25878( 145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.053271 431499 task_exit.go:204] [ 25878( 145): 25882( 146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.062729 431499 task_exit.go:204] [ 25878( 145): 25882( 146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.062874 431499 task_exit.go:204] [ 25878( 145): 25882( 146)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.063032 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.063954 431499 task_exit.go:204] [ 25878( 145): 25878( 145)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8932, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:35.078453 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.078793 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 37 D0317 18:30:35.079812 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.088145 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.088301 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 38 D0317 18:30:35.088440 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.099118 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.099340 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 36 D0317 18:30:35.100549 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.105957 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.106146 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 37 D0317 18:30:35.107448 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.117007 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.117150 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 39 D0317 18:30:35.117339 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.118282 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.118418 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 37 D0317 18:30:35.118665 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.123901 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.123999 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 38 D0317 18:30:35.124103 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.136893 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.137037 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 36 D0317 18:30:35.139675 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.140444 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.140517 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 40 D0317 18:30:35.140598 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.142128 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.142356 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 41 D0317 18:30:35.142555 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.143882 431499 usertrap_amd64.go:212] [ 25883(2869): 25887(2870)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.143952 431499 usertrap_amd64.go:122] [ 25883(2869): 25887(2870)] Allocate a new trap: 0xc004fc66f0 42 D0317 18:30:35.144074 431499 usertrap_amd64.go:225] [ 25883(2869): 25887(2870)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.146223 431499 usertrap_amd64.go:212] [ 25883(2869): 25883(2869)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.146362 431499 usertrap_amd64.go:122] [ 25883(2869): 25883(2869)] Allocate a new trap: 0xc004fc66f0 43 D0317 18:30:35.146537 431499 usertrap_amd64.go:225] [ 25883(2869): 25883(2869)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.146888 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.146989 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 38 D0317 18:30:35.147062 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.147369 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.147464 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 39 D0317 18:30:35.147547 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.149243 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.149312 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 37 D0317 18:30:35.149430 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.154617 431499 task_exit.go:204] [ 25883(2869): 25883(2869)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.155285 431499 task_exit.go:204] [ 25883(2869): 25883(2869)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.155656 431499 task_signals.go:204] [ 25883(2869): 25887(2870)] Signal 9, PID: 25883, TID: 25887, fault addr: 0x0: terminating thread group D0317 18:30:35.156063 431499 task_exit.go:204] [ 25883(2869): 25887(2870)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.158652 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.158750 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 39 D0317 18:30:35.158849 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.159988 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.160062 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 40 D0317 18:30:35.160151 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.161141 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:35.161539 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 40 D0317 18:30:35.161692 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.162192 431499 usertrap_amd64.go:212] [ 25884( 215): 25888( 216)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.162299 431499 usertrap_amd64.go:122] [ 25884( 215): 25888( 216)] Allocate a new trap: 0xc0040fc5d0 41 D0317 18:30:35.162502 431499 usertrap_amd64.go:225] [ 25884( 215): 25888( 216)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.162927 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.163065 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 41 D0317 18:30:35.163279 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.164095 431499 task_exit.go:204] [ 25883(2869): 25887(2870)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.164185 431499 task_exit.go:204] [ 25883(2869): 25887(2870)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.164314 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.164774 431499 task_exit.go:204] [ 25883(2869): 25883(2869)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1}}}}) D0317 18:30:35.169368 431499 usertrap_amd64.go:212] [ 25885(1425): 25889(1426)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.169420 431499 usertrap_amd64.go:122] [ 25885(1425): 25889(1426)] Allocate a new trap: 0xc0040ca450 42 D0317 18:30:35.169691 431499 usertrap_amd64.go:225] [ 25885(1425): 25889(1426)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.169778 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.169872 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 38 D0317 18:30:35.170230 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.170632 431499 usertrap_amd64.go:212] [ 25884( 215): 25884( 215)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.170703 431499 usertrap_amd64.go:122] [ 25884( 215): 25884( 215)] Allocate a new trap: 0xc0040fc5d0 42 D0317 18:30:35.170821 431499 usertrap_amd64.go:225] [ 25884( 215): 25884( 215)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.173110 431499 usertrap_amd64.go:212] [ 25885(1425): 25885(1425)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.173202 431499 usertrap_amd64.go:122] [ 25885(1425): 25885(1425)] Allocate a new trap: 0xc0040ca450 43 D0317 18:30:35.173283 431499 usertrap_amd64.go:225] [ 25885(1425): 25885(1425)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.178696 431499 task_exit.go:204] [ 25885(1425): 25885(1425)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.178807 431499 task_signals.go:204] [ 25885(1425): 25889(1426)] Signal 9, PID: 25885, TID: 25889, fault addr: 0x0: terminating thread group D0317 18:30:35.179314 431499 task_exit.go:204] [ 25885(1425): 25885(1425)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.179437 431499 task_exit.go:204] [ 25885(1425): 25889(1426)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.181757 431499 task_exit.go:204] [ 25884( 215): 25884( 215)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.182329 431499 task_exit.go:204] [ 25884( 215): 25884( 215)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.182558 431499 task_signals.go:204] [ 25884( 215): 25888( 216)] Signal 9, PID: 25884, TID: 25888, fault addr: 0x0: terminating thread group D0317 18:30:35.182656 431499 task_exit.go:204] [ 25884( 215): 25888( 216)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.184959 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.185075 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 39 D0317 18:30:35.185224 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.187055 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.187142 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 40 D0317 18:30:35.187215 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.187632 431499 task_exit.go:204] [ 25885(1425): 25889(1426)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.187744 431499 task_exit.go:204] [ 25885(1425): 25889(1426)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.187749 431499 usertrap_amd64.go:212] [ 25886( 147): 25890( 148)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.187837 431499 usertrap_amd64.go:122] [ 25886( 147): 25890( 148)] Allocate a new trap: 0xc006f9c2a0 41 D0317 18:30:35.187866 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.187947 431499 usertrap_amd64.go:225] [ 25886( 147): 25890( 148)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.189007 431499 task_exit.go:204] [ 25885(1425): 25885(1425)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.190295 431499 task_exit.go:204] [ 25884( 215): 25888( 216)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.190457 431499 task_exit.go:204] [ 25884( 215): 25888( 216)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 2: clock_gettime(0x4, &(0x7f0000001940)) D0317 18:30:35.190638 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.191591 431499 task_exit.go:204] [ 25884( 215): 25884( 215)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 1: setxattr$smack_xattr_label(&(0x7f0000000100)='.\x00', &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000180)={'\'#-(.'}, 0x6, 0x0) D0317 18:30:35.193433 431499 usertrap_amd64.go:212] [ 25886( 147): 25886( 147)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.193590 431499 usertrap_amd64.go:122] [ 25886( 147): 25886( 147)] Allocate a new trap: 0xc006f9c2a0 42 D0317 18:30:35.193797 431499 usertrap_amd64.go:225] [ 25886( 147): 25886( 147)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:35.205688 431499 task_exit.go:204] [ 25886( 147): 25886( 147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.206121 431499 task_signals.go:204] [ 25886( 147): 25890( 148)] Signal 9, PID: 25886, TID: 25890, fault addr: 0x0: terminating thread group D0317 18:30:35.206793 431499 task_exit.go:204] [ 25886( 147): 25890( 148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.207172 431499 task_exit.go:204] [ 25886( 147): 25886( 147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.213154 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.213266 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 37 D0317 18:30:35.214113 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.217432 431499 task_exit.go:204] [ 25886( 147): 25890( 148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.217546 431499 task_exit.go:204] [ 25886( 147): 25890( 148)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.217726 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.218028 431499 task_exit.go:204] [ 25886( 147): 25886( 147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.219036 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.219179 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 38 D0317 18:30:35.219392 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) 18:30:35 executing program 3: add_key(&(0x7f0000000100)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) D0317 18:30:35.241369 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.241610 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 39 D0317 18:30:35.241771 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.259811 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.260049 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 37 D0317 18:30:35.260279 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.260380 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 36 D0317 18:30:35.261098 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.261453 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.265364 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.265468 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 40 D0317 18:30:35.265554 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.266697 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.266954 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 38 D0317 18:30:35.267070 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.267127 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.267208 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 37 D0317 18:30:35.267275 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.267282 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.267352 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 41 D0317 18:30:35.267338 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.267416 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.267452 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 36 D0317 18:30:35.267899 431499 usertrap_amd64.go:212] [ 25891(2871): 25895(2872)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.267969 431499 usertrap_amd64.go:122] [ 25891(2871): 25895(2872)] Allocate a new trap: 0xc002780270 42 D0317 18:30:35.268050 431499 usertrap_amd64.go:225] [ 25891(2871): 25895(2872)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.268293 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.271802 431499 usertrap_amd64.go:212] [ 25891(2871): 25891(2871)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.271874 431499 usertrap_amd64.go:122] [ 25891(2871): 25891(2871)] Allocate a new trap: 0xc002780270 43 D0317 18:30:35.271943 431499 usertrap_amd64.go:225] [ 25891(2871): 25891(2871)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.273177 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.273354 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 37 D0317 18:30:35.273545 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.281927 431499 task_exit.go:204] [ 25891(2871): 25891(2871)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.282732 431499 task_signals.go:204] [ 25891(2871): 25895(2872)] Signal 9, PID: 25891, TID: 25895, fault addr: 0x0: terminating thread group D0317 18:30:35.282843 431499 task_exit.go:204] [ 25891(2871): 25895(2872)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.283116 431499 task_exit.go:204] [ 25891(2871): 25891(2871)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.291682 431499 task_exit.go:204] [ 25891(2871): 25895(2872)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.291768 431499 task_exit.go:204] [ 25891(2871): 25895(2872)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.291898 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.292205 431499 task_exit.go:204] [ 25891(2871): 25891(2871)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000002c40)=[{{&(0x7f00000003c0)=@isdn, 0x80, 0x0}}], 0x1, 0x0) D0317 18:30:35.293612 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.293809 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 38 D0317 18:30:35.293884 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.307293 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.307353 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 38 D0317 18:30:35.307425 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.309616 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.309688 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 39 D0317 18:30:35.309777 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.312355 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.312502 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 39 D0317 18:30:35.312619 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.314479 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:35.314558 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 40 D0317 18:30:35.314633 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.315284 431499 usertrap_amd64.go:212] [ 25893( 217): 25896( 218)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.315349 431499 usertrap_amd64.go:122] [ 25893( 217): 25896( 218)] Allocate a new trap: 0xc003cb2150 41 D0317 18:30:35.315413 431499 usertrap_amd64.go:225] [ 25893( 217): 25896( 218)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.318986 431499 usertrap_amd64.go:212] [ 25893( 217): 25893( 217)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.319079 431499 usertrap_amd64.go:122] [ 25893( 217): 25893( 217)] Allocate a new trap: 0xc003cb2150 42 D0317 18:30:35.319163 431499 usertrap_amd64.go:225] [ 25893( 217): 25893( 217)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.320518 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.320584 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 40 D0317 18:30:35.320653 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.322466 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.322568 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 39 D0317 18:30:35.322659 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.322827 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.322982 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 41 D0317 18:30:35.323068 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.323330 431499 usertrap_amd64.go:212] [ 25892(1427): 25898(1428)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.323490 431499 usertrap_amd64.go:122] [ 25892(1427): 25898(1428)] Allocate a new trap: 0xc006dc8600 42 D0317 18:30:35.323640 431499 usertrap_amd64.go:225] [ 25892(1427): 25898(1428)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.324782 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.324911 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 40 D0317 18:30:35.325078 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.325206 431499 usertrap_amd64.go:212] [ 25894( 149): 25899( 150)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.325306 431499 usertrap_amd64.go:122] [ 25894( 149): 25899( 150)] Allocate a new trap: 0xc006dc8630 41 D0317 18:30:35.325432 431499 usertrap_amd64.go:225] [ 25894( 149): 25899( 150)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.326756 431499 usertrap_amd64.go:212] [ 25892(1427): 25892(1427)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.326827 431499 usertrap_amd64.go:122] [ 25892(1427): 25892(1427)] Allocate a new trap: 0xc006dc8600 43 D0317 18:30:35.326929 431499 usertrap_amd64.go:225] [ 25892(1427): 25892(1427)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.329032 431499 usertrap_amd64.go:212] [ 25894( 149): 25894( 149)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.329167 431499 usertrap_amd64.go:122] [ 25894( 149): 25894( 149)] Allocate a new trap: 0xc006dc8630 42 D0317 18:30:35.329270 431499 usertrap_amd64.go:225] [ 25894( 149): 25894( 149)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:35.335682 431499 task_exit.go:204] [ 25894( 149): 25894( 149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.335890 431499 task_exit.go:204] [ 25892(1427): 25892(1427)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.336036 431499 task_signals.go:204] [ 25894( 149): 25899( 150)] Signal 9, PID: 25894, TID: 25899, fault addr: 0x0: terminating thread group D0317 18:30:35.336625 431499 task_signals.go:204] [ 25893( 217): 25896( 218)] Signal 9, PID: 25893, TID: 25896, fault addr: 0x0: terminating thread group D0317 18:30:35.336687 431499 task_signals.go:204] [ 25892(1427): 25898(1428)] Signal 9, PID: 25892, TID: 25898, fault addr: 0x0: terminating thread group D0317 18:30:35.336726 431499 task_exit.go:204] [ 25892(1427): 25892(1427)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.337235 431499 task_exit.go:204] [ 25894( 149): 25899( 150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.337857 431499 task_exit.go:204] [ 25894( 149): 25894( 149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.338387 431499 task_exit.go:204] [ 25893( 217): 25893( 217)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.339008 431499 task_exit.go:204] [ 25893( 217): 25896( 218)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.339397 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.339492 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 37 D0317 18:30:35.339866 431499 task_exit.go:204] [ 25892(1427): 25898(1428)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.340208 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.343307 431499 task_exit.go:204] [ 25893( 217): 25893( 217)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.344606 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.344694 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 38 D0317 18:30:35.344777 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.348669 431499 task_exit.go:204] [ 25892(1427): 25898(1428)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.348738 431499 task_exit.go:204] [ 25892(1427): 25898(1428)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.348886 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.349118 431499 task_exit.go:204] [ 25892(1427): 25892(1427)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.350179 431499 task_exit.go:204] [ 25894( 149): 25899( 150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.350257 431499 task_exit.go:204] [ 25894( 149): 25899( 150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.350377 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.350602 431499 task_exit.go:204] [ 25894( 149): 25894( 149)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.352617 431499 task_exit.go:204] [ 25893( 217): 25896( 218)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 18:30:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890b, 0x0) 18:30:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB="01000403"]) D0317 18:30:35.354966 431499 task_exit.go:204] [ 25893( 217): 25896( 218)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.355186 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.355422 431499 task_exit.go:204] [ 25893( 217): 25893( 217)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0x40049409, 0x0) D0317 18:30:35.379380 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.379514 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 39 D0317 18:30:35.379631 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.391658 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.391873 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 40 D0317 18:30:35.392129 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.394080 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.394179 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 41 D0317 18:30:35.394545 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.395665 431499 usertrap_amd64.go:212] [ 25897(2873): 25902(2874)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.395984 431499 usertrap_amd64.go:122] [ 25897(2873): 25902(2874)] Allocate a new trap: 0xc0040ca510 42 D0317 18:30:35.396644 431499 usertrap_amd64.go:225] [ 25897(2873): 25902(2874)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.402452 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.402567 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 37 D0317 18:30:35.403399 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.415252 431499 usertrap_amd64.go:212] [ 25897(2873): 25897(2873)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.415369 431499 usertrap_amd64.go:122] [ 25897(2873): 25897(2873)] Allocate a new trap: 0xc0040ca510 43 D0317 18:30:35.415451 431499 usertrap_amd64.go:225] [ 25897(2873): 25897(2873)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.423827 431499 task_exit.go:204] [ 25897(2873): 25897(2873)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.424577 431499 task_signals.go:204] [ 25897(2873): 25902(2874)] Signal 9, PID: 25897, TID: 25902, fault addr: 0x0: terminating thread group D0317 18:30:35.424697 431499 task_exit.go:204] [ 25897(2873): 25902(2874)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.425071 431499 task_exit.go:204] [ 25897(2873): 25897(2873)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.427681 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.427836 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 36 D0317 18:30:35.428770 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.431368 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.431472 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 38 D0317 18:30:35.431586 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.431674 431499 task_exit.go:204] [ 25897(2873): 25902(2874)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.431968 431499 task_exit.go:204] [ 25897(2873): 25902(2874)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.432130 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.433197 431499 task_exit.go:204] [ 25897(2873): 25897(2873)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: truncate(&(0x7f0000001580)='./file0\x00', 0x0) D0317 18:30:35.440012 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.440151 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 36 D0317 18:30:35.452058 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.454383 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.454452 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.454469 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 37 D0317 18:30:35.454516 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 39 D0317 18:30:35.454649 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.454551 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.456821 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.456908 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 37 D0317 18:30:35.457043 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.470887 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.470981 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 40 D0317 18:30:35.471070 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.472973 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.473070 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 38 D0317 18:30:35.473140 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.473229 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.473281 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 41 D0317 18:30:35.473347 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.473767 431499 usertrap_amd64.go:212] [ 25901(1429): 25905(1430)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.473840 431499 usertrap_amd64.go:122] [ 25901(1429): 25905(1430)] Allocate a new trap: 0xc003cb22a0 42 D0317 18:30:35.473922 431499 usertrap_amd64.go:225] [ 25901(1429): 25905(1430)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.478024 431499 usertrap_amd64.go:212] [ 25901(1429): 25901(1429)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.478250 431499 usertrap_amd64.go:122] [ 25901(1429): 25901(1429)] Allocate a new trap: 0xc003cb22a0 43 D0317 18:30:35.478369 431499 usertrap_amd64.go:225] [ 25901(1429): 25901(1429)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.479939 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.480034 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 37 D0317 18:30:35.480776 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.481876 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.481990 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 38 D0317 18:30:35.482075 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.486508 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.486574 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 38 D0317 18:30:35.486603 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.486654 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.486691 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 39 D0317 18:30:35.486785 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.488266 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:35.488904 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 40 D0317 18:30:35.489188 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.489271 431499 task_exit.go:204] [ 25901(1429): 25901(1429)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.489462 431499 usertrap_amd64.go:212] [ 25903( 219): 25906( 220)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.489565 431499 usertrap_amd64.go:122] [ 25903( 219): 25906( 220)] Allocate a new trap: 0xc006dc8690 41 D0317 18:30:35.489544 431499 task_signals.go:204] [ 25901(1429): 25905(1430)] Signal 9, PID: 25901, TID: 25905, fault addr: 0x0: terminating thread group D0317 18:30:35.489646 431499 usertrap_amd64.go:225] [ 25903( 219): 25906( 220)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.490023 431499 task_exit.go:204] [ 25901(1429): 25901(1429)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.490161 431499 task_exit.go:204] [ 25901(1429): 25905(1430)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.491221 431499 usertrap_amd64.go:212] [ 25903( 219): 25906( 220)] Found the pattern at ip 5637f879a999:sysno 257 D0317 18:30:35.491292 431499 usertrap_amd64.go:122] [ 25903( 219): 25906( 220)] Allocate a new trap: 0xc006dc8690 42 D0317 18:30:35.491417 431499 usertrap_amd64.go:225] [ 25903( 219): 25906( 220)] Apply the binary patch addr 5637f879a999 trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.497472 431499 task_exit.go:204] [ 25901(1429): 25905(1430)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.497547 431499 task_exit.go:204] [ 25901(1429): 25905(1430)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.497734 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.498317 431499 task_exit.go:204] [ 25901(1429): 25901(1429)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003a00)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003980)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x8, @remote, 0x6}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000003780)=[{&(0x7f0000000380)="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", 0xff0}, {&(0x7f0000001380)="d4806fcea373d51fcca9b39ac0c1fdbeb9ba3c27618b773d2cd398df2aed32426a341d7b9cc2c5dacb8dbfc0647ae8d2dc5e6011bf8708e830d6b3e33aee5a20a87b62b079b1767068f613aecb019e3ef9652903f2515f4bdbcccebfc945a7375e037e901e8890684fff26bc58f1cea3570e7725661e3017c9d033f66e3d59697015771c75d199a2d417615991a596de4f1bfc120c9e5f7d2a9916b4e0b994a016d048c78d1d848db3c5186f6e77bb08e59fa788ec69155dcfd8187cf968cf4384508332e3", 0xc5}, {&(0x7f0000001480)="0b5106666331134ce0e1bbf7065956102c8936eab4eba26624d681eb753cb469bbd507a8aad2b2", 0x27}, {&(0x7f00000014c0)="9b22a6dbd0e932aa13f31bfff0f6813dbe78c98940d755cfc58813cf9ccd6596c50f9f7d03741e703f3f33888ca4c3c8b8bff09f19bcac1c6682481c67e77db866b3faf06eaf96ab95a9c00dcc2fffe16a049d23ccc0aa55f50c68a36181532008e03318dd3d4e0558eeed143b6381f8e452733cb40ef42c6ec03bf04e5fd2446945be7410d67591e6c9b5a8bc036903515911f6d1e53a3d0bf87292d9b7dc40915ea44dad770637ca6e9194db", 0xad}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000002580)="d9223c1b031546b0c3e56a15861509347cf29a5dc5d03438a3eeb850ca938cd09481a2b1f28b5fea1fd21374ed07bff97564cf7cefb99f85d1b993031bc8cc5fc0d0530f942b4cc8", 0x48}, {&(0x7f0000002600)="75b0ecba30ef1b78a2c768b81e174785a967e660cb6113317d70c41babc82e2038de9513831b581c26647224b5c92f39ff6fc2d7a7401728d3aec2b420be601ab3d2a0ca7755b19a4b22779d6eddc44a8df934a5011ec995ead76728a5ff5d02d83e40109b", 0x65}, {&(0x7f0000002680)="78b264b6826b61ca355fc1fde29df248d8e8b4b7d5ed7042ef8a60afa61f9b0002722bd8e3e250c491893e7873f88c630cdc515611b90367a968704e1809ebaca56d7b30ba1a3d5cb0ac3da9ad16c8eff61a560164adfb2e27d71f07ec25631e19f1a51dcb", 0x65}, {&(0x7f0000002780)="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", 0xff8}], 0x9, &(0x7f0000003840)=[@tclass={{0x14, 0x29, 0x43, 0xf9}}, @hopopts={{0x80, 0x29, 0x36, {0x3b, 0xc, '\x00', [@calipso={0x7, 0x38, {0x0, 0xc, 0x3, 0x7, [0xbb1, 0x0, 0x2bd, 0x5, 0x2, 0xff]}}, @pad1, @ra={0x5, 0x2, 0x8000}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0x4, [0x1, 0x8, 0x200]}}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x1, 0xa, 0x2, 0x9, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, @empty]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}], 0x118}}], 0x2, 0x0) D0317 18:30:35.504443 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.504705 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 39 D0317 18:30:35.504822 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.506467 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.506700 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 40 D0317 18:30:35.506855 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.507243 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.507312 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 39 D0317 18:30:35.507386 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.508198 431499 usertrap_amd64.go:212] [ 25903( 219): 25903( 219)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.508295 431499 usertrap_amd64.go:122] [ 25903( 219): 25903( 219)] Allocate a new trap: 0xc006dc8690 43 D0317 18:30:35.508376 431499 usertrap_amd64.go:225] [ 25903( 219): 25903( 219)] Apply the binary patch addr 5637f879ac93 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0317 18:30:35.508581 431499 usertrap_amd64.go:212] [ 25900( 151): 25907( 152)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.508664 431499 usertrap_amd64.go:122] [ 25900( 151): 25907( 152)] Allocate a new trap: 0xc0094ba1e0 41 D0317 18:30:35.508767 431499 usertrap_amd64.go:225] [ 25900( 151): 25907( 152)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.514994 431499 usertrap_amd64.go:212] [ 25900( 151): 25900( 151)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.515139 431499 usertrap_amd64.go:122] [ 25900( 151): 25900( 151)] Allocate a new trap: 0xc0094ba1e0 42 D0317 18:30:35.515284 431499 usertrap_amd64.go:225] [ 25900( 151): 25900( 151)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:35.515551 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.515723 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 40 D0317 18:30:35.515853 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.517695 431499 task_exit.go:204] [ 25903( 219): 25903( 219)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.517746 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.517825 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 41 D0317 18:30:35.517865 431499 task_signals.go:204] [ 25903( 219): 25906( 220)] Signal 9, PID: 25903, TID: 25906, fault addr: 0x0: terminating thread group D0317 18:30:35.517911 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.518507 431499 task_exit.go:204] [ 25903( 219): 25906( 220)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.518533 431499 usertrap_amd64.go:212] [ 25904(2875): 25908(2876)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.518596 431499 usertrap_amd64.go:122] [ 25904(2875): 25908(2876)] Allocate a new trap: 0xc004fc6780 42 D0317 18:30:35.518679 431499 usertrap_amd64.go:225] [ 25904(2875): 25908(2876)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.518928 431499 task_exit.go:204] [ 25903( 219): 25903( 219)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.520717 431499 usertrap_amd64.go:212] [ 25904(2875): 25904(2875)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.520790 431499 usertrap_amd64.go:122] [ 25904(2875): 25904(2875)] Allocate a new trap: 0xc004fc6780 43 D0317 18:30:35.520915 431499 usertrap_amd64.go:225] [ 25904(2875): 25904(2875)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.526677 431499 task_exit.go:204] [ 25903( 219): 25906( 220)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.526747 431499 task_exit.go:204] [ 25903( 219): 25906( 220)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.526831 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.527692 431499 task_exit.go:204] [ 25903( 219): 25903( 219)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.528598 431499 task_exit.go:204] [ 25900( 151): 25900( 151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.529375 431499 task_exit.go:204] [ 25900( 151): 25900( 151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 18:30:35 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x8}, {0x0, 0x44, 0x800}, {0x0, 0x80c4}, {}], 0x4, 0x0) D0317 18:30:35.529939 431499 task_signals.go:204] [ 25900( 151): 25907( 152)] Signal 9, PID: 25900, TID: 25907, fault addr: 0x0: terminating thread group D0317 18:30:35.530101 431499 task_exit.go:204] [ 25900( 151): 25907( 152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.536513 431499 task_exit.go:204] [ 25900( 151): 25907( 152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.536711 431499 task_exit.go:204] [ 25900( 151): 25907( 152)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.536837 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.537002 431499 task_exit.go:204] [ 25900( 151): 25900( 151)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.539009 431499 task_exit.go:204] [ 25904(2875): 25904(2875)] Transitioning from exit state TaskExitNone to TaskExitInitiated 18:30:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{&(0x7f0000000340)={0xa, 0x4e21, 0x0, @empty, 0x9}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000380)='\n', 0x1}], 0x1, &(0x7f00000005c0)=[@dstopts_2292={{0x18}}, @hopopts={{0x18}}], 0x30}}], 0x1, 0x8810) D0317 18:30:35.539304 431499 task_signals.go:204] [ 25904(2875): 25908(2876)] Signal 9, PID: 25904, TID: 25908, fault addr: 0x0: terminating thread group D0317 18:30:35.539757 431499 task_exit.go:204] [ 25904(2875): 25908(2876)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.540802 431499 task_exit.go:204] [ 25904(2875): 25904(2875)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.545570 431499 task_exit.go:204] [ 25904(2875): 25908(2876)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.545631 431499 task_exit.go:204] [ 25904(2875): 25908(2876)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.545699 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.546241 431499 task_exit.go:204] [ 25904(2875): 25904(2875)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1d}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@dstopts_2292={{0x18}}, @rthdr={{0x18}}], 0x30}}], 0x1, 0x0) D0317 18:30:35.564698 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.564827 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 37 D0317 18:30:35.565992 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.584344 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.584416 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 38 D0317 18:30:35.584500 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.599967 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.600081 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 36 D0317 18:30:35.601085 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.607191 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.607278 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 37 D0317 18:30:35.607353 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.609871 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.609999 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 36 D0317 18:30:35.610972 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.612278 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.612407 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 37 D0317 18:30:35.614114 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.615935 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.615992 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 39 D0317 18:30:35.616074 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.618522 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.618612 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 38 D0317 18:30:35.618684 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.621817 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.621887 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 37 D0317 18:30:35.621959 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.627116 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.627195 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 40 D0317 18:30:35.627263 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.629101 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.629278 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 41 D0317 18:30:35.629419 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.629626 431499 usertrap_amd64.go:212] [ 25909(1431): 25913(1432)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.629706 431499 usertrap_amd64.go:122] [ 25909(1431): 25913(1432)] Allocate a new trap: 0xc006f9c420 42 D0317 18:30:35.629835 431499 usertrap_amd64.go:225] [ 25909(1431): 25913(1432)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.633614 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.633685 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 38 D0317 18:30:35.633885 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.636379 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.636453 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 39 D0317 18:30:35.636597 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.638094 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.638170 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 38 D0317 18:30:35.638277 431499 usertrap_amd64.go:212] [ 25909(1431): 25909(1431)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.638247 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.638330 431499 usertrap_amd64.go:122] [ 25909(1431): 25909(1431)] Allocate a new trap: 0xc006f9c420 43 D0317 18:30:35.638392 431499 usertrap_amd64.go:225] [ 25909(1431): 25909(1431)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.646115 431499 task_exit.go:204] [ 25909(1431): 25909(1431)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.646418 431499 task_signals.go:204] [ 25909(1431): 25913(1432)] Signal 9, PID: 25909, TID: 25913, fault addr: 0x0: terminating thread group D0317 18:30:35.646645 431499 task_exit.go:204] [ 25909(1431): 25913(1432)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.647232 431499 task_exit.go:204] [ 25909(1431): 25909(1431)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.652140 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.652356 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 40 D0317 18:30:35.652481 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.654428 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.654500 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 41 D0317 18:30:35.654671 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.654858 431499 usertrap_amd64.go:212] [ 25912(2877): 25914(2878)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.654838 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.654966 431499 usertrap_amd64.go:122] [ 25912(2877): 25914(2878)] Allocate a new trap: 0xc004fc67e0 42 D0317 18:30:35.654976 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 39 D0317 18:30:35.655038 431499 usertrap_amd64.go:225] [ 25912(2877): 25914(2878)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.655081 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.655389 431499 task_exit.go:204] [ 25909(1431): 25913(1432)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.655473 431499 task_exit.go:204] [ 25909(1431): 25913(1432)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.655591 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.655749 431499 task_exit.go:204] [ 25909(1431): 25909(1431)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 2: mount$9p_fd(0xfffffffff020, 0x0, 0x0, 0x0, 0x0) D0317 18:30:35.657543 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:35.657643 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 40 D0317 18:30:35.657777 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.658121 431499 usertrap_amd64.go:212] [ 25910( 221): 25915( 222)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.658247 431499 usertrap_amd64.go:122] [ 25910( 221): 25915( 222)] Allocate a new trap: 0xc0027803f0 41 D0317 18:30:35.658374 431499 usertrap_amd64.go:225] [ 25910( 221): 25915( 222)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.659420 431499 usertrap_amd64.go:212] [ 25912(2877): 25912(2877)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.659522 431499 usertrap_amd64.go:122] [ 25912(2877): 25912(2877)] Allocate a new trap: 0xc004fc67e0 43 D0317 18:30:35.659666 431499 usertrap_amd64.go:225] [ 25912(2877): 25912(2877)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.660570 431499 usertrap_amd64.go:212] [ 25910( 221): 25910( 221)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.660674 431499 usertrap_amd64.go:122] [ 25910( 221): 25910( 221)] Allocate a new trap: 0xc0027803f0 42 D0317 18:30:35.660793 431499 usertrap_amd64.go:225] [ 25910( 221): 25910( 221)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.664132 431499 task_exit.go:204] [ 25912(2877): 25912(2877)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.664886 431499 task_signals.go:204] [ 25912(2877): 25914(2878)] Signal 9, PID: 25912, TID: 25914, fault addr: 0x0: terminating thread group D0317 18:30:35.664940 431499 task_exit.go:204] [ 25912(2877): 25912(2877)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.665255 431499 task_exit.go:204] [ 25912(2877): 25914(2878)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.670948 431499 task_exit.go:204] [ 25910( 221): 25910( 221)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.671776 431499 task_signals.go:204] [ 25910( 221): 25915( 222)] Signal 9, PID: 25910, TID: 25915, fault addr: 0x0: terminating thread group D0317 18:30:35.671885 431499 task_exit.go:204] [ 25910( 221): 25910( 221)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.672660 431499 task_exit.go:204] [ 25912(2877): 25914(2878)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.672750 431499 task_exit.go:204] [ 25912(2877): 25914(2878)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.672830 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.672988 431499 task_exit.go:204] [ 25910( 221): 25915( 222)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.673448 431499 task_exit.go:204] [ 25912(2877): 25912(2877)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003980)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x6}, 0x1c, 0x0}}], 0x1, 0x0) D0317 18:30:35.675511 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.675650 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 39 D0317 18:30:35.675744 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.677833 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.678186 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 40 D0317 18:30:35.678410 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.678864 431499 usertrap_amd64.go:212] [ 25911( 153): 25916( 154)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.678962 431499 usertrap_amd64.go:122] [ 25911( 153): 25916( 154)] Allocate a new trap: 0xc006e641b0 41 D0317 18:30:35.679039 431499 usertrap_amd64.go:225] [ 25911( 153): 25916( 154)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.682575 431499 task_exit.go:204] [ 25910( 221): 25915( 222)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.682653 431499 task_exit.go:204] [ 25910( 221): 25915( 222)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.682754 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.682848 431499 task_exit.go:204] [ 25910( 221): 25910( 221)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.684659 431499 usertrap_amd64.go:212] [ 25911( 153): 25911( 153)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.684758 431499 usertrap_amd64.go:122] [ 25911( 153): 25911( 153)] Allocate a new trap: 0xc006e641b0 42 D0317 18:30:35.684836 431499 usertrap_amd64.go:225] [ 25911( 153): 25911( 153)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) 18:30:35 executing program 1: socketpair(0x34, 0x0, 0x0, &(0x7f0000000000)) D0317 18:30:35.697382 431499 task_exit.go:204] [ 25911( 153): 25911( 153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.697676 431499 task_signals.go:204] [ 25911( 153): 25916( 154)] Signal 9, PID: 25911, TID: 25916, fault addr: 0x0: terminating thread group D0317 18:30:35.698249 431499 task_exit.go:204] [ 25911( 153): 25916( 154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.698647 431499 task_exit.go:204] [ 25911( 153): 25911( 153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.705186 431499 task_exit.go:204] [ 25911( 153): 25916( 154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.705297 431499 task_exit.go:204] [ 25911( 153): 25916( 154)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.705417 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.706069 431499 task_exit.go:204] [ 25911( 153): 25911( 153)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) D0317 18:30:35.719727 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.719944 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 37 D0317 18:30:35.720750 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.720839 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.720878 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 37 D0317 18:30:35.721919 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.726793 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.726894 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 38 D0317 18:30:35.726973 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.730666 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.730887 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 38 D0317 18:30:35.731056 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.753991 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.754133 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 39 D0317 18:30:35.754230 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.757922 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.758021 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 36 D0317 18:30:35.758791 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.763763 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.763850 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 37 D0317 18:30:35.763972 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.767965 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.768064 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 36 D0317 18:30:35.769138 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.772673 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.772872 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 39 D0317 18:30:35.773000 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.773739 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.773824 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 40 D0317 18:30:35.773905 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.774372 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.774619 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 37 D0317 18:30:35.774847 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.776174 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.776264 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 41 D0317 18:30:35.776358 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.776968 431499 usertrap_amd64.go:212] [ 25917(1433): 25921(1434)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.777194 431499 usertrap_amd64.go:122] [ 25917(1433): 25921(1434)] Allocate a new trap: 0xc0023041e0 42 D0317 18:30:35.777430 431499 usertrap_amd64.go:225] [ 25917(1433): 25921(1434)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.779364 431499 usertrap_amd64.go:212] [ 25917(1433): 25917(1433)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.779461 431499 usertrap_amd64.go:122] [ 25917(1433): 25917(1433)] Allocate a new trap: 0xc0023041e0 43 D0317 18:30:35.779552 431499 usertrap_amd64.go:225] [ 25917(1433): 25917(1433)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.782146 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.782273 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 38 D0317 18:30:35.782611 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.789264 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.789368 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 40 D0317 18:30:35.789580 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.791279 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.791386 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 41 D0317 18:30:35.791517 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.791920 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.791993 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 38 D0317 18:30:35.792091 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.792154 431499 usertrap_amd64.go:212] [ 25918(2879): 25922(2880)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.792246 431499 usertrap_amd64.go:122] [ 25918(2879): 25922(2880)] Allocate a new trap: 0xc004fc6870 42 D0317 18:30:35.792323 431499 usertrap_amd64.go:225] [ 25918(2879): 25922(2880)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.796040 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.796141 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 39 D0317 18:30:35.796230 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.796380 431499 usertrap_amd64.go:212] [ 25918(2879): 25918(2879)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.796449 431499 usertrap_amd64.go:122] [ 25918(2879): 25918(2879)] Allocate a new trap: 0xc004fc6870 43 D0317 18:30:35.796672 431499 usertrap_amd64.go:225] [ 25918(2879): 25918(2879)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.797857 431499 task_exit.go:204] [ 25917(1433): 25917(1433)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.798284 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:35.798383 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 40 D0317 18:30:35.798461 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.798469 431499 task_signals.go:204] [ 25917(1433): 25921(1434)] Signal 9, PID: 25917, TID: 25921, fault addr: 0x0: terminating thread group D0317 18:30:35.798568 431499 task_exit.go:204] [ 25917(1433): 25917(1433)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.798673 431499 usertrap_amd64.go:212] [ 25919( 223): 25923( 224)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.798674 431499 task_exit.go:204] [ 25917(1433): 25921(1434)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.798780 431499 usertrap_amd64.go:122] [ 25919( 223): 25923( 224)] Allocate a new trap: 0xc003cb2360 41 D0317 18:30:35.799265 431499 usertrap_amd64.go:225] [ 25919( 223): 25923( 224)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.802098 431499 usertrap_amd64.go:212] [ 25919( 223): 25919( 223)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:35.802254 431499 usertrap_amd64.go:122] [ 25919( 223): 25919( 223)] Allocate a new trap: 0xc003cb2360 42 D0317 18:30:35.802333 431499 usertrap_amd64.go:225] [ 25919( 223): 25919( 223)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:35.802974 431499 task_exit.go:204] [ 25918(2879): 25918(2879)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.803661 431499 task_exit.go:204] [ 25918(2879): 25918(2879)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.803656 431499 task_signals.go:204] [ 25918(2879): 25922(2880)] Signal 9, PID: 25918, TID: 25922, fault addr: 0x0: terminating thread group D0317 18:30:35.804426 431499 task_exit.go:204] [ 25918(2879): 25922(2880)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.808626 431499 task_exit.go:204] [ 25917(1433): 25921(1434)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.808703 431499 task_exit.go:204] [ 25917(1433): 25921(1434)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.808832 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.809123 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.809243 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 39 D0317 18:30:35.809323 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.809323 431499 task_exit.go:204] [ 25917(1433): 25917(1433)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 2: socketpair(0xf, 0x3, 0x0, &(0x7f0000000940)) D0317 18:30:35.811829 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.811910 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 40 D0317 18:30:35.812021 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.812012 431499 task_exit.go:204] [ 25918(2879): 25922(2880)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.812102 431499 task_exit.go:204] [ 25918(2879): 25922(2880)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.812256 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.812349 431499 task_exit.go:204] [ 25918(2879): 25918(2879)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: add_key(&(0x7f0000000000)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) D0317 18:30:35.814741 431499 usertrap_amd64.go:212] [ 25920( 155): 25924( 156)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.814854 431499 usertrap_amd64.go:122] [ 25920( 155): 25924( 156)] Allocate a new trap: 0xc002304270 41 D0317 18:30:35.814886 431499 task_exit.go:204] [ 25919( 223): 25919( 223)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.814956 431499 usertrap_amd64.go:225] [ 25920( 155): 25924( 156)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.815115 431499 task_signals.go:204] [ 25919( 223): 25923( 224)] Signal 9, PID: 25919, TID: 25923, fault addr: 0x0: terminating thread group D0317 18:30:35.815988 431499 task_exit.go:204] [ 25919( 223): 25923( 224)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.816336 431499 task_exit.go:204] [ 25919( 223): 25919( 223)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.818931 431499 usertrap_amd64.go:212] [ 25920( 155): 25920( 155)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.819036 431499 usertrap_amd64.go:122] [ 25920( 155): 25920( 155)] Allocate a new trap: 0xc002304270 42 D0317 18:30:35.819101 431499 usertrap_amd64.go:225] [ 25920( 155): 25920( 155)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:35.825699 431499 task_exit.go:204] [ 25919( 223): 25923( 224)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.825771 431499 task_exit.go:204] [ 25919( 223): 25923( 224)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.825869 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:35.826207 431499 task_exit.go:204] [ 25919( 223): 25919( 223)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000500)={'erspan0\x00', 0x0}) D0317 18:30:35.828309 431499 task_exit.go:204] [ 25920( 155): 25920( 155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.828816 431499 task_signals.go:204] [ 25920( 155): 25924( 156)] Signal 9, PID: 25920, TID: 25924, fault addr: 0x0: terminating thread group D0317 18:30:35.828921 431499 task_exit.go:204] [ 25920( 155): 25920( 155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.829014 431499 task_exit.go:204] [ 25920( 155): 25924( 156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.838807 431499 task_exit.go:204] [ 25920( 155): 25924( 156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.838894 431499 task_exit.go:204] [ 25920( 155): 25924( 156)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.839005 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.839161 431499 task_exit.go:204] [ 25920( 155): 25920( 155)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 3: setxattr$smack_xattr_label(&(0x7f0000000100)='.\x00', &(0x7f0000000140)='security.SMACK64\x00', 0x0, 0x0, 0x0) D0317 18:30:35.861063 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.861206 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 37 D0317 18:30:35.861970 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.864332 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:35.864466 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 37 D0317 18:30:35.865123 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.865198 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 38 D0317 18:30:35.865268 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:35.865757 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:35.886805 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:35.886978 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 38 D0317 18:30:35.887203 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:35.894645 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:35.894752 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 39 D0317 18:30:35.894821 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:35.897884 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:35.898090 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 36 D0317 18:30:35.898769 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:35.902852 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:35.902927 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 40 D0317 18:30:35.903023 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:35.903760 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:35.903816 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 37 D0317 18:30:35.904082 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:35.904511 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:35.904598 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 41 D0317 18:30:35.905091 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:35.906101 431499 usertrap_amd64.go:212] [ 25926(2881): 25929(2882)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:35.906331 431499 usertrap_amd64.go:122] [ 25926(2881): 25929(2882)] Allocate a new trap: 0xc0027805d0 42 D0317 18:30:35.906458 431499 usertrap_amd64.go:225] [ 25926(2881): 25929(2882)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:35.907680 431499 usertrap_amd64.go:212] [ 25926(2881): 25926(2881)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:35.907755 431499 usertrap_amd64.go:122] [ 25926(2881): 25926(2881)] Allocate a new trap: 0xc0027805d0 43 D0317 18:30:35.907973 431499 usertrap_amd64.go:225] [ 25926(2881): 25926(2881)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:35.910156 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:35.910543 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 36 D0317 18:30:35.913140 431499 task_exit.go:204] [ 25926(2881): 25926(2881)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.913757 431499 task_exit.go:204] [ 25926(2881): 25926(2881)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.913914 431499 task_signals.go:204] [ 25926(2881): 25929(2882)] Signal 9, PID: 25926, TID: 25929, fault addr: 0x0: terminating thread group D0317 18:30:35.914080 431499 task_exit.go:204] [ 25926(2881): 25929(2882)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.920393 431499 task_exit.go:204] [ 25926(2881): 25929(2882)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.920452 431499 task_exit.go:204] [ 25926(2881): 25929(2882)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.920517 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:35.922549 431499 task_exit.go:204] [ 25926(2881): 25926(2881)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 0: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x1, 0x3ff}, {0x1}], 0x2, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/128) D0317 18:30:35.924844 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:35.926891 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:35.926967 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 39 D0317 18:30:35.927043 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:35.931211 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:35.931313 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 38 D0317 18:30:35.931517 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:35.932228 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:35.932323 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 37 D0317 18:30:35.932401 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:35.939570 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:35.939676 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 40 D0317 18:30:35.939780 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:35.942385 431499 usertrap_amd64.go:212] [ 25925(1435): 25930(1436)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:35.942601 431499 usertrap_amd64.go:122] [ 25925(1435): 25930(1436)] Allocate a new trap: 0xc0027805a0 41 D0317 18:30:35.942757 431499 usertrap_amd64.go:225] [ 25925(1435): 25930(1436)] Apply the binary patch addr 55ae6e750320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:35.943379 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:35.943486 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 42 D0317 18:30:35.943626 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e750c10 trap addr 60d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:35.945091 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:35.945201 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 39 D0317 18:30:35.945303 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:35.946188 431499 usertrap_amd64.go:212] [ 25925(1435): 25925(1435)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:35.946283 431499 usertrap_amd64.go:122] [ 25925(1435): 25925(1435)] Allocate a new trap: 0xc0027805a0 43 D0317 18:30:35.946374 431499 usertrap_amd64.go:225] [ 25925(1435): 25925(1435)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:35.947144 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:35.947320 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 40 D0317 18:30:35.947440 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:35.951854 431499 usertrap_amd64.go:212] [ 25927( 157): 25931( 158)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:35.951929 431499 usertrap_amd64.go:122] [ 25927( 157): 25931( 158)] Allocate a new trap: 0xc003cb2390 41 D0317 18:30:35.952029 431499 usertrap_amd64.go:225] [ 25927( 157): 25931( 158)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:35.954286 431499 usertrap_amd64.go:212] [ 25927( 157): 25927( 157)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:35.954423 431499 usertrap_amd64.go:122] [ 25927( 157): 25927( 157)] Allocate a new trap: 0xc003cb2390 42 D0317 18:30:35.954578 431499 usertrap_amd64.go:225] [ 25927( 157): 25927( 157)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:35.961188 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:35.961253 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 38 D0317 18:30:35.961338 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:35.962829 431499 task_exit.go:204] [ 25925(1435): 25925(1435)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.963348 431499 task_signals.go:204] [ 25925(1435): 25930(1436)] Signal 9, PID: 25925, TID: 25930, fault addr: 0x0: terminating thread group D0317 18:30:35.963917 431499 task_exit.go:204] [ 25925(1435): 25925(1435)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.964092 431499 task_exit.go:204] [ 25925(1435): 25930(1436)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.971881 431499 task_exit.go:204] [ 25925(1435): 25930(1436)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.972144 431499 task_exit.go:204] [ 25925(1435): 25930(1436)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.972340 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:35.972530 431499 task_exit.go:204] [ 25925(1435): 25925(1435)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.972769 431499 task_signals.go:204] [ 25927( 157): 25931( 158)] Signal 9, PID: 25927, TID: 25931, fault addr: 0x0: terminating thread group D0317 18:30:35.972932 431499 task_exit.go:204] [ 25927( 157): 25931( 158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.973690 431499 task_exit.go:204] [ 25927( 157): 25927( 157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:35.974263 431499 task_exit.go:204] [ 25927( 157): 25931( 158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.974415 431499 task_exit.go:204] [ 25927( 157): 25931( 158)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:35 executing program 2: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='logon\x00', 0x0) D0317 18:30:35.981387 431499 task_exit.go:204] [ 25927( 157): 25927( 157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:35.981663 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:35.981983 431499 task_exit.go:204] [ 25927( 157): 25927( 157)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:35.982293 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:35.982425 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 37 D0317 18:30:35.982801 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:35.982978 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 39 D0317 18:30:35.983089 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:35.983237 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:35.986524 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f8770c10:sysno 14 18:30:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1d}, 0x1c, 0x0}}], 0x1, 0x8000) D0317 18:30:35.987150 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 40 D0317 18:30:35.987351 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:35.987585 431499 usertrap_amd64.go:212] [ 25928( 225): 25933( 226)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:35.987694 431499 usertrap_amd64.go:122] [ 25928( 225): 25933( 226)] Allocate a new trap: 0xc002780600 41 D0317 18:30:35.987860 431499 usertrap_amd64.go:225] [ 25928( 225): 25933( 226)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:35.997742 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:35.997814 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 38 D0317 18:30:35.997887 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.010767 431499 usertrap_amd64.go:212] [ 25928( 225): 25928( 225)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.010838 431499 usertrap_amd64.go:122] [ 25928( 225): 25928( 225)] Allocate a new trap: 0xc002780600 42 D0317 18:30:36.010910 431499 usertrap_amd64.go:225] [ 25928( 225): 25928( 225)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.023551 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.023670 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 39 D0317 18:30:36.023736 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.027364 431499 task_exit.go:204] [ 25928( 225): 25928( 225)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.027648 431499 task_signals.go:204] [ 25928( 225): 25933( 226)] Signal 9, PID: 25928, TID: 25933, fault addr: 0x0: terminating thread group D0317 18:30:36.028155 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.028267 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 37 D0317 18:30:36.028488 431499 task_exit.go:204] [ 25928( 225): 25928( 225)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.028612 431499 task_exit.go:204] [ 25928( 225): 25933( 226)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.029157 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.029281 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 36 D0317 18:30:36.029730 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.030151 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:36.036371 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.036491 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 37 D0317 18:30:36.036651 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.038226 431499 task_exit.go:204] [ 25928( 225): 25933( 226)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.038363 431499 task_exit.go:204] [ 25928( 225): 25933( 226)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.038531 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.040082 431499 task_exit.go:204] [ 25928( 225): 25928( 225)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.041083 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.041158 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 40 D0317 18:30:36.041342 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.041316 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.041422 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 38 D0317 18:30:36.041508 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) 18:30:36 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7}, 0x7) write$P9_RATTACH(r0, &(0x7f0000000140)={0x14}, 0x14) D0317 18:30:36.043720 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.043809 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 41 D0317 18:30:36.043880 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.044543 431499 usertrap_amd64.go:212] [ 25932(2883): 25936(2884)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.044630 431499 usertrap_amd64.go:122] [ 25932(2883): 25936(2884)] Allocate a new trap: 0xc0067dc690 42 D0317 18:30:36.044729 431499 usertrap_amd64.go:225] [ 25932(2883): 25936(2884)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.051043 431499 usertrap_amd64.go:212] [ 25932(2883): 25932(2883)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.051209 431499 usertrap_amd64.go:122] [ 25932(2883): 25932(2883)] Allocate a new trap: 0xc0067dc690 43 D0317 18:30:36.051404 431499 usertrap_amd64.go:225] [ 25932(2883): 25932(2883)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.057806 431499 task_exit.go:204] [ 25932(2883): 25932(2883)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.058081 431499 task_signals.go:204] [ 25932(2883): 25936(2884)] Signal 9, PID: 25932, TID: 25936, fault addr: 0x0: terminating thread group D0317 18:30:36.058222 431499 task_exit.go:204] [ 25932(2883): 25936(2884)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.058817 431499 task_exit.go:204] [ 25932(2883): 25936(2884)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.058903 431499 task_exit.go:204] [ 25932(2883): 25936(2884)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.062360 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:36.062430 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 38 D0317 18:30:36.062511 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:36.065039 431499 task_exit.go:204] [ 25932(2883): 25932(2883)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.065145 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.065530 431499 task_exit.go:204] [ 25932(2883): 25932(2883)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.066298 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.066396 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 39 D0317 18:30:36.066467 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) 18:30:36 executing program 0: socketpair(0x2, 0x0, 0xffffffff, &(0x7f0000000040)) D0317 18:30:36.081418 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.081529 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 40 D0317 18:30:36.081602 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.084514 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.085378 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 41 D0317 18:30:36.085763 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:36.086297 431499 usertrap_amd64.go:212] [ 25934(1437): 25938(1438)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.086385 431499 usertrap_amd64.go:122] [ 25934(1437): 25938(1438)] Allocate a new trap: 0xc0040fc6c0 42 D0317 18:30:36.086465 431499 usertrap_amd64.go:225] [ 25934(1437): 25938(1438)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:36.092876 431499 usertrap_amd64.go:212] [ 25934(1437): 25934(1437)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.093059 431499 usertrap_amd64.go:122] [ 25934(1437): 25934(1437)] Allocate a new trap: 0xc0040fc6c0 43 D0317 18:30:36.093011 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:36.093146 431499 usertrap_amd64.go:225] [ 25934(1437): 25934(1437)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.093147 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 39 D0317 18:30:36.097255 431499 task_exit.go:204] [ 25934(1437): 25934(1437)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.098339 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:36.098992 431499 task_signals.go:204] [ 25934(1437): 25938(1438)] Signal 9, PID: 25934, TID: 25938, fault addr: 0x0: terminating thread group D0317 18:30:36.099103 431499 task_exit.go:204] [ 25934(1437): 25934(1437)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.099192 431499 task_exit.go:204] [ 25934(1437): 25938(1438)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.099772 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:36.099972 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 36 D0317 18:30:36.101136 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:36.102249 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:36.102385 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 40 D0317 18:30:36.102629 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:36.102835 431499 usertrap_amd64.go:212] [ 25935( 159): 25939( 160)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:36.102899 431499 usertrap_amd64.go:122] [ 25935( 159): 25939( 160)] Allocate a new trap: 0xc000046510 41 D0317 18:30:36.102973 431499 usertrap_amd64.go:225] [ 25935( 159): 25939( 160)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:36.105041 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:36.105158 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 37 D0317 18:30:36.105255 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:36.106289 431499 usertrap_amd64.go:212] [ 25935( 159): 25935( 159)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:36.106366 431499 usertrap_amd64.go:122] [ 25935( 159): 25935( 159)] Allocate a new trap: 0xc000046510 42 D0317 18:30:36.106442 431499 usertrap_amd64.go:225] [ 25935( 159): 25935( 159)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:36.109650 431499 task_exit.go:204] [ 25934(1437): 25938(1438)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.109767 431499 task_exit.go:204] [ 25934(1437): 25938(1438)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.109860 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.110042 431499 task_exit.go:204] [ 25934(1437): 25934(1437)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 2: socketpair(0x10, 0x3, 0x3, &(0x7f0000000040)) D0317 18:30:36.119871 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:36.120199 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 37 D0317 18:30:36.121129 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:36.132327 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:36.132452 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 38 D0317 18:30:36.132896 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.133509 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:36.133587 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 38 D0317 18:30:36.133694 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:36.136011 431499 task_exit.go:204] [ 25935( 159): 25935( 159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.136908 431499 task_exit.go:204] [ 25935( 159): 25935( 159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.136912 431499 task_signals.go:204] [ 25935( 159): 25939( 160)] Signal 9, PID: 25935, TID: 25939, fault addr: 0x0: terminating thread group D0317 18:30:36.137375 431499 task_exit.go:204] [ 25935( 159): 25939( 160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.146076 431499 task_exit.go:204] [ 25935( 159): 25939( 160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.146231 431499 task_exit.go:204] [ 25935( 159): 25939( 160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.146416 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:36.146769 431499 task_exit.go:204] [ 25935( 159): 25935( 159)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.150703 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:36.150792 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 39 18:30:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) D0317 18:30:36.150905 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:36.152546 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:36.152622 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 40 D0317 18:30:36.152740 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:36.153545 431499 usertrap_amd64.go:212] [ 25937( 227): 25941( 228)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:36.153621 431499 usertrap_amd64.go:122] [ 25937( 227): 25941( 228)] Allocate a new trap: 0xc006dc8750 41 D0317 18:30:36.153720 431499 usertrap_amd64.go:225] [ 25937( 227): 25941( 228)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:36.162751 431499 usertrap_amd64.go:212] [ 25937( 227): 25937( 227)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.162850 431499 usertrap_amd64.go:122] [ 25937( 227): 25937( 227)] Allocate a new trap: 0xc006dc8750 42 D0317 18:30:36.162964 431499 usertrap_amd64.go:225] [ 25937( 227): 25937( 227)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.170737 431499 task_exit.go:204] [ 25937( 227): 25937( 227)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.171024 431499 task_signals.go:204] [ 25937( 227): 25941( 228)] Signal 9, PID: 25937, TID: 25941, fault addr: 0x0: terminating thread group D0317 18:30:36.171665 431499 task_exit.go:204] [ 25937( 227): 25941( 228)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.172122 431499 task_exit.go:204] [ 25937( 227): 25937( 227)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.178222 431499 task_exit.go:204] [ 25937( 227): 25941( 228)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.178329 431499 task_exit.go:204] [ 25937( 227): 25941( 228)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.178416 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.178649 431499 task_exit.go:204] [ 25937( 227): 25937( 227)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 1: r0 = socket(0x2, 0x2, 0x0) recvfrom$inet_nvme(r0, 0x0, 0x0, 0x2041, 0x0, 0x0) D0317 18:30:36.185309 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.185402 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 39 D0317 18:30:36.185559 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.187575 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.187841 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 37 D0317 18:30:36.188673 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.195758 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.195843 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 38 D0317 18:30:36.195925 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:36.196813 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.196945 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 36 D0317 18:30:36.197768 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:36.206639 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.206813 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 37 D0317 18:30:36.207028 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.210998 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.211186 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 40 D0317 18:30:36.211452 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.214827 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.214889 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 41 D0317 18:30:36.215024 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.215552 431499 usertrap_amd64.go:212] [ 25940(2885): 25944(2886)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.215644 431499 usertrap_amd64.go:122] [ 25940(2885): 25944(2886)] Allocate a new trap: 0xc0094ba2a0 42 D0317 18:30:36.215724 431499 usertrap_amd64.go:225] [ 25940(2885): 25944(2886)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.221911 431499 usertrap_amd64.go:212] [ 25940(2885): 25940(2885)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.222037 431499 usertrap_amd64.go:122] [ 25940(2885): 25940(2885)] Allocate a new trap: 0xc0094ba2a0 43 D0317 18:30:36.222115 431499 usertrap_amd64.go:225] [ 25940(2885): 25940(2885)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.227867 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.228187 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 39 D0317 18:30:36.228353 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:36.231877 431499 task_exit.go:204] [ 25940(2885): 25940(2885)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.232049 431499 task_signals.go:204] [ 25940(2885): 25944(2886)] Signal 9, PID: 25940, TID: 25944, fault addr: 0x0: terminating thread group D0317 18:30:36.232190 431499 task_exit.go:204] [ 25940(2885): 25944(2886)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.232790 431499 task_exit.go:204] [ 25940(2885): 25944(2886)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.233210 431499 task_exit.go:204] [ 25940(2885): 25944(2886)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.236144 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:36.236475 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 38 D0317 18:30:36.236945 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:36.244155 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.244226 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 40 D0317 18:30:36.244333 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.244733 431499 task_exit.go:204] [ 25940(2885): 25940(2885)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.244922 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.246421 431499 task_exit.go:204] [ 25940(2885): 25940(2885)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.246747 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.246900 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 41 D0317 18:30:36.247161 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) 18:30:36 executing program 0: socketpair(0x22, 0x0, 0x22, &(0x7f0000000140)) D0317 18:30:36.249225 431499 usertrap_amd64.go:212] [ 25942(1439): 25946(1440)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.249354 431499 usertrap_amd64.go:122] [ 25942(1439): 25946(1440)] Allocate a new trap: 0xc0067dc6c0 42 D0317 18:30:36.249438 431499 usertrap_amd64.go:225] [ 25942(1439): 25946(1440)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:36.251506 431499 usertrap_amd64.go:212] [ 25942(1439): 25942(1439)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.251569 431499 usertrap_amd64.go:122] [ 25942(1439): 25942(1439)] Allocate a new trap: 0xc0067dc6c0 43 D0317 18:30:36.251715 431499 usertrap_amd64.go:225] [ 25942(1439): 25942(1439)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.257505 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:36.257654 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 36 D0317 18:30:36.259692 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:36.266257 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:36.266323 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 39 D0317 18:30:36.266349 431499 task_exit.go:204] [ 25942(1439): 25942(1439)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.266446 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:36.267093 431499 task_signals.go:204] [ 25942(1439): 25946(1440)] Signal 9, PID: 25942, TID: 25946, fault addr: 0x0: terminating thread group D0317 18:30:36.267213 431499 task_exit.go:204] [ 25942(1439): 25946(1440)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.268826 431499 task_exit.go:204] [ 25942(1439): 25942(1439)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.269972 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:36.270100 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:36.270200 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 40 D0317 18:30:36.270241 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 37 D0317 18:30:36.270338 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:36.270494 431499 usertrap_amd64.go:212] [ 25943( 161): 25947( 162)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:36.270580 431499 usertrap_amd64.go:122] [ 25943( 161): 25947( 162)] Allocate a new trap: 0xc006f9c4e0 41 D0317 18:30:36.270666 431499 usertrap_amd64.go:225] [ 25943( 161): 25947( 162)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:36.270420 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:36.275026 431499 task_exit.go:204] [ 25942(1439): 25946(1440)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.275155 431499 task_exit.go:204] [ 25942(1439): 25946(1440)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.275265 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.284083 431499 usertrap_amd64.go:212] [ 25943( 161): 25943( 161)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:36.284346 431499 usertrap_amd64.go:122] [ 25943( 161): 25943( 161)] Allocate a new trap: 0xc006f9c4e0 42 D0317 18:30:36.284728 431499 usertrap_amd64.go:225] [ 25943( 161): 25943( 161)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:36.289362 431499 task_exit.go:204] [ 25942(1439): 25942(1439)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x7e0000000) D0317 18:30:36.298801 431499 task_exit.go:204] [ 25943( 161): 25943( 161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.299099 431499 task_signals.go:204] [ 25943( 161): 25947( 162)] Signal 9, PID: 25943, TID: 25947, fault addr: 0x0: terminating thread group D0317 18:30:36.299209 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:36.299338 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 37 D0317 18:30:36.299225 431499 task_exit.go:204] [ 25943( 161): 25947( 162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.300495 431499 task_exit.go:204] [ 25943( 161): 25947( 162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.300729 431499 task_exit.go:204] [ 25943( 161): 25947( 162)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.301097 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:36.308348 431499 task_exit.go:204] [ 25943( 161): 25943( 161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.308472 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:36.311812 431499 task_exit.go:204] [ 25943( 161): 25943( 161)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000005c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@tclass={{0x14}}, @hoplimit_2292={{0x14}}], 0x30}}], 0x1, 0x0) D0317 18:30:36.316278 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:36.316427 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 38 D0317 18:30:36.316572 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.330566 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:36.330826 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 38 D0317 18:30:36.331062 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:36.349749 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.349879 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 39 D0317 18:30:36.349959 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.349864 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:36.350287 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 39 D0317 18:30:36.350382 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:36.351960 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:36.352124 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 40 D0317 18:30:36.352311 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:36.352539 431499 usertrap_amd64.go:212] [ 25945( 229): 25950( 230)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:36.352649 431499 usertrap_amd64.go:122] [ 25945( 229): 25950( 230)] Allocate a new trap: 0xc006dc87b0 41 D0317 18:30:36.352731 431499 usertrap_amd64.go:225] [ 25945( 229): 25950( 230)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:36.356923 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.357064 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 37 D0317 18:30:36.357150 431499 usertrap_amd64.go:212] [ 25945( 229): 25945( 229)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.357228 431499 usertrap_amd64.go:122] [ 25945( 229): 25945( 229)] Allocate a new trap: 0xc006dc87b0 42 D0317 18:30:36.357302 431499 usertrap_amd64.go:225] [ 25945( 229): 25945( 229)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.359661 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.370911 431499 task_exit.go:204] [ 25945( 229): 25945( 229)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.371323 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.371456 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 36 D0317 18:30:36.371969 431499 task_exit.go:204] [ 25945( 229): 25945( 229)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.372223 431499 task_signals.go:204] [ 25945( 229): 25950( 230)] Signal 9, PID: 25945, TID: 25950, fault addr: 0x0: terminating thread group D0317 18:30:36.372408 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:36.372887 431499 task_exit.go:204] [ 25945( 229): 25950( 230)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.373599 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.373654 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 40 D0317 18:30:36.373853 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.378651 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.378725 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 38 D0317 18:30:36.378956 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:36.379024 431499 usertrap_amd64.go:212] [ 25948(2887): 25952(2888)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.379118 431499 usertrap_amd64.go:122] [ 25948(2887): 25952(2888)] Allocate a new trap: 0xc006e64510 41 D0317 18:30:36.379187 431499 usertrap_amd64.go:225] [ 25948(2887): 25952(2888)] Apply the binary patch addr 55ef2c80c320 trap addr 69cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.379461 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.379518 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 42 D0317 18:30:36.379666 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c80cc10 trap addr 69d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.381659 431499 usertrap_amd64.go:212] [ 25948(2887): 25948(2887)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.381724 431499 usertrap_amd64.go:122] [ 25948(2887): 25948(2887)] Allocate a new trap: 0xc006e64510 43 D0317 18:30:36.381817 431499 usertrap_amd64.go:225] [ 25948(2887): 25948(2887)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.382312 431499 task_exit.go:204] [ 25945( 229): 25950( 230)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.382372 431499 task_exit.go:204] [ 25945( 229): 25950( 230)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.382516 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.382691 431499 task_exit.go:204] [ 25945( 229): 25945( 229)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000008080)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000013580)=[{{&(0x7f000000c900)=@ieee802154={0x24, @long}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000c980)='A', 0x1}], 0x1}}], 0x1, 0x1) D0317 18:30:36.396246 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.396361 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 37 D0317 18:30:36.396461 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.399677 431499 task_exit.go:204] [ 25948(2887): 25948(2887)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.399856 431499 task_signals.go:204] [ 25948(2887): 25952(2888)] Signal 9, PID: 25948, TID: 25952, fault addr: 0x0: terminating thread group D0317 18:30:36.399986 431499 task_exit.go:204] [ 25948(2887): 25952(2888)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.402227 431499 task_exit.go:204] [ 25948(2887): 25948(2887)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.409174 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.409410 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 39 D0317 18:30:36.409692 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:36.415053 431499 task_exit.go:204] [ 25948(2887): 25952(2888)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.415161 431499 task_exit.go:204] [ 25948(2887): 25952(2888)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.415280 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.416410 431499 task_exit.go:204] [ 25948(2887): 25948(2887)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8942, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:36.437835 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:36.438087 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 38 D0317 18:30:36.438193 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:36.437833 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.438757 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 40 D0317 18:30:36.438855 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.440660 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.440753 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 41 D0317 18:30:36.440833 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:36.441159 431499 usertrap_amd64.go:212] [ 25949(1441): 25954(1442)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.441231 431499 usertrap_amd64.go:122] [ 25949(1441): 25954(1442)] Allocate a new trap: 0xc0067dc720 42 D0317 18:30:36.441604 431499 usertrap_amd64.go:225] [ 25949(1441): 25954(1442)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:36.445881 431499 usertrap_amd64.go:212] [ 25949(1441): 25949(1441)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.445997 431499 usertrap_amd64.go:122] [ 25949(1441): 25949(1441)] Allocate a new trap: 0xc0067dc720 43 D0317 18:30:36.446137 431499 usertrap_amd64.go:225] [ 25949(1441): 25949(1441)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.457890 431499 task_exit.go:204] [ 25949(1441): 25949(1441)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.458616 431499 task_exit.go:204] [ 25949(1441): 25949(1441)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.458739 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:36.458780 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 39 D0317 18:30:36.458776 431499 task_signals.go:204] [ 25949(1441): 25954(1442)] Signal 9, PID: 25949, TID: 25954, fault addr: 0x0: terminating thread group D0317 18:30:36.458835 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:36.458906 431499 task_exit.go:204] [ 25949(1441): 25954(1442)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.460503 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:36.460691 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 40 D0317 18:30:36.460887 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:36.461945 431499 usertrap_amd64.go:212] [ 25951( 163): 25956( 164)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:36.462120 431499 usertrap_amd64.go:122] [ 25951( 163): 25956( 164)] Allocate a new trap: 0xc004fc6930 41 D0317 18:30:36.462369 431499 usertrap_amd64.go:225] [ 25951( 163): 25956( 164)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:36.467061 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:36.467283 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 37 D0317 18:30:36.467342 431499 usertrap_amd64.go:212] [ 25951( 163): 25951( 163)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:36.468208 431499 task_exit.go:204] [ 25949(1441): 25954(1442)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.468496 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:36.469162 431499 usertrap_amd64.go:122] [ 25951( 163): 25951( 163)] Allocate a new trap: 0xc004fc6930 42 D0317 18:30:36.469338 431499 usertrap_amd64.go:225] [ 25951( 163): 25951( 163)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:36.469260 431499 task_exit.go:204] [ 25949(1441): 25954(1442)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.469785 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.471300 431499 task_exit.go:204] [ 25949(1441): 25949(1441)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.475643 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:36.475838 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 36 D0317 18:30:36.476568 431499 task_exit.go:204] [ 25951( 163): 25951( 163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.476651 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 18:30:36 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) D0317 18:30:36.477218 431499 task_exit.go:204] [ 25951( 163): 25951( 163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.477422 431499 task_signals.go:204] [ 25951( 163): 25956( 164)] Signal 9, PID: 25951, TID: 25956, fault addr: 0x0: terminating thread group D0317 18:30:36.477528 431499 task_exit.go:204] [ 25951( 163): 25956( 164)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.484629 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:36.484701 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 37 D0317 18:30:36.484765 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:36.485374 431499 task_exit.go:204] [ 25951( 163): 25956( 164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.485455 431499 task_exit.go:204] [ 25951( 163): 25956( 164)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.485587 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:36.485705 431499 task_exit.go:204] [ 25951( 163): 25951( 163)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8947, &(0x7f0000000ac0)={'sit0\x00', 0x0}) D0317 18:30:36.503310 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:36.503539 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 38 D0317 18:30:36.503693 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.525325 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:36.525469 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 38 D0317 18:30:36.525721 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:36.526988 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.527124 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 39 D0317 18:30:36.527258 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.539223 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.539281 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 40 D0317 18:30:36.539385 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.540890 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.540974 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 41 D0317 18:30:36.541039 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.542766 431499 usertrap_amd64.go:212] [ 25955(2889): 25959(2890)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.542996 431499 usertrap_amd64.go:122] [ 25955(2889): 25959(2890)] Allocate a new trap: 0xc003cb2540 42 D0317 18:30:36.543150 431499 usertrap_amd64.go:225] [ 25955(2889): 25959(2890)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.550003 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.550138 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 36 D0317 18:30:36.551323 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:36.556441 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:36.556527 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 39 D0317 18:30:36.556569 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.556643 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:36.556644 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 37 D0317 18:30:36.556802 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.558061 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.558178 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 37 D0317 18:30:36.558215 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:36.558268 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 40 D0317 18:30:36.558375 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:36.558674 431499 usertrap_amd64.go:212] [ 25955(2889): 25955(2889)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.558769 431499 usertrap_amd64.go:122] [ 25955(2889): 25955(2889)] Allocate a new trap: 0xc003cb2540 43 D0317 18:30:36.558862 431499 usertrap_amd64.go:225] [ 25955(2889): 25955(2889)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.559034 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.559287 431499 usertrap_amd64.go:212] [ 25953( 231): 25960( 232)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:36.559343 431499 usertrap_amd64.go:122] [ 25953( 231): 25960( 232)] Allocate a new trap: 0xc003cb2510 41 D0317 18:30:36.559422 431499 usertrap_amd64.go:225] [ 25953( 231): 25960( 232)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:36.564675 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.564811 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 38 D0317 18:30:36.565069 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:36.566519 431499 usertrap_amd64.go:212] [ 25953( 231): 25953( 231)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.566615 431499 usertrap_amd64.go:122] [ 25953( 231): 25953( 231)] Allocate a new trap: 0xc003cb2510 42 D0317 18:30:36.566678 431499 task_exit.go:204] [ 25955(2889): 25955(2889)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.566718 431499 usertrap_amd64.go:225] [ 25953( 231): 25953( 231)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.567348 431499 task_exit.go:204] [ 25955(2889): 25955(2889)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.567527 431499 task_signals.go:204] [ 25955(2889): 25959(2890)] Signal 9, PID: 25955, TID: 25959, fault addr: 0x0: terminating thread group D0317 18:30:36.567728 431499 task_exit.go:204] [ 25955(2889): 25959(2890)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.573625 431499 task_exit.go:204] [ 25955(2889): 25959(2890)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.573707 431499 task_exit.go:204] [ 25955(2889): 25959(2890)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.573851 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.573998 431499 task_exit.go:204] [ 25955(2889): 25955(2889)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x0, 0x0) D0317 18:30:36.580695 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:36.581107 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 38 D0317 18:30:36.581280 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:36.584410 431499 task_exit.go:204] [ 25953( 231): 25953( 231)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.584995 431499 task_exit.go:204] [ 25953( 231): 25953( 231)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.585253 431499 task_signals.go:204] [ 25953( 231): 25960( 232)] Signal 9, PID: 25953, TID: 25960, fault addr: 0x0: terminating thread group D0317 18:30:36.585388 431499 task_exit.go:204] [ 25953( 231): 25960( 232)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.591915 431499 task_exit.go:204] [ 25953( 231): 25960( 232)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.592082 431499 task_exit.go:204] [ 25953( 231): 25960( 232)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.592353 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.593151 431499 task_exit.go:204] [ 25953( 231): 25953( 231)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 1: r0 = socket(0x25, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) D0317 18:30:36.600495 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.600572 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 39 D0317 18:30:36.600684 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:36.602315 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:36.602503 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 39 D0317 18:30:36.602734 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:36.604700 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:36.604760 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 40 D0317 18:30:36.604845 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:36.609504 431499 usertrap_amd64.go:212] [ 25958( 165): 25962( 166)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:36.609577 431499 usertrap_amd64.go:122] [ 25958( 165): 25962( 166)] Allocate a new trap: 0xc0040fc7b0 41 D0317 18:30:36.609692 431499 usertrap_amd64.go:225] [ 25958( 165): 25962( 166)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:36.618748 431499 usertrap_amd64.go:212] [ 25958( 165): 25958( 165)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:36.618858 431499 usertrap_amd64.go:122] [ 25958( 165): 25958( 165)] Allocate a new trap: 0xc0040fc7b0 42 D0317 18:30:36.619001 431499 usertrap_amd64.go:225] [ 25958( 165): 25958( 165)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:36.631083 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.631205 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 40 D0317 18:30:36.631310 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.634225 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.634326 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 41 D0317 18:30:36.634628 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:36.634875 431499 usertrap_amd64.go:212] [ 25957(1443): 25964(1444)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.634983 431499 usertrap_amd64.go:122] [ 25957(1443): 25964(1444)] Allocate a new trap: 0xc006dc8840 42 D0317 18:30:36.635197 431499 usertrap_amd64.go:225] [ 25957(1443): 25964(1444)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:36.637058 431499 usertrap_amd64.go:212] [ 25957(1443): 25957(1443)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.637136 431499 usertrap_amd64.go:122] [ 25957(1443): 25957(1443)] Allocate a new trap: 0xc006dc8840 43 D0317 18:30:36.637227 431499 usertrap_amd64.go:225] [ 25957(1443): 25957(1443)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.646062 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:36.646176 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 37 D0317 18:30:36.646878 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:36.651091 431499 task_exit.go:204] [ 25957(1443): 25957(1443)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.652007 431499 task_signals.go:204] [ 25957(1443): 25964(1444)] Signal 9, PID: 25957, TID: 25964, fault addr: 0x0: terminating thread group D0317 18:30:36.652157 431499 task_exit.go:204] [ 25957(1443): 25964(1444)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.653168 431499 task_exit.go:204] [ 25957(1443): 25957(1443)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.660146 431499 task_exit.go:204] [ 25957(1443): 25964(1444)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.660372 431499 task_exit.go:204] [ 25957(1443): 25964(1444)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.660607 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.663768 431499 task_exit.go:204] [ 25957(1443): 25957(1443)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.664329 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:36.664383 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:36.664427 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 38 D0317 18:30:36.664632 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.664489 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 36 D0317 18:30:36.666232 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 18:30:36 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x1}, {0x0, 0x0, 0x1800}], 0x2, 0x0) D0317 18:30:36.669745 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:36.669822 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 37 D0317 18:30:36.669910 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:36.677179 431499 task_exit.go:204] [ 25958( 165): 25958( 165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.678304 431499 task_signals.go:204] [ 25958( 165): 25962( 166)] Signal 9, PID: 25958, TID: 25962, fault addr: 0x0: terminating thread group D0317 18:30:36.678326 431499 task_exit.go:204] [ 25958( 165): 25958( 165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.678872 431499 task_exit.go:204] [ 25958( 165): 25962( 166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.684548 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.684650 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 39 D0317 18:30:36.684750 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.686641 431499 task_exit.go:204] [ 25958( 165): 25962( 166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.686787 431499 task_exit.go:204] [ 25958( 165): 25962( 166)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.686912 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:36.690554 431499 task_exit.go:204] [ 25958( 165): 25958( 165)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000004c0), &(0x7f0000000500)={'fscrypt:', @desc3}, &(0x7f0000000540)={0x0, "a2c1c3162b0b34f79e4b2a201929e20ae02f20462c6edde61b4f22625c9f49fd22470114daa446da6cfc2bba001034ba865c2d3475253bf3dfef230a0bf19b18"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) D0317 18:30:36.707197 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.707302 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 40 D0317 18:30:36.707425 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.709631 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.709716 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 41 D0317 18:30:36.709794 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.709910 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:36.709973 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 38 D0317 18:30:36.710094 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:36.710413 431499 usertrap_amd64.go:212] [ 25961(2891): 25965(2892)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.710542 431499 usertrap_amd64.go:122] [ 25961(2891): 25965(2892)] Allocate a new trap: 0xc0067dc780 42 D0317 18:30:36.710627 431499 usertrap_amd64.go:225] [ 25961(2891): 25965(2892)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.735415 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:36.735507 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 39 D0317 18:30:36.735663 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:36.738224 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:36.738476 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 40 D0317 18:30:36.739277 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:36.739968 431499 usertrap_amd64.go:212] [ 25963( 233): 25969( 234)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:36.740037 431499 usertrap_amd64.go:122] [ 25963( 233): 25969( 234)] Allocate a new trap: 0xc003cb2570 41 D0317 18:30:36.740102 431499 usertrap_amd64.go:225] [ 25963( 233): 25969( 234)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:36.743253 431499 usertrap_amd64.go:212] [ 25963( 233): 25963( 233)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.743684 431499 usertrap_amd64.go:122] [ 25963( 233): 25963( 233)] Allocate a new trap: 0xc003cb2570 42 D0317 18:30:36.744070 431499 usertrap_amd64.go:225] [ 25963( 233): 25963( 233)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.748253 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.748404 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 37 D0317 18:30:36.749485 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.754371 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.754446 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 38 D0317 18:30:36.754533 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:36.769868 431499 task_exit.go:204] [ 25963( 233): 25963( 233)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.770599 431499 task_signals.go:204] [ 25963( 233): 25969( 234)] Signal 9, PID: 25963, TID: 25969, fault addr: 0x0: terminating thread group D0317 18:30:36.770698 431499 task_exit.go:204] [ 25963( 233): 25963( 233)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.770810 431499 task_exit.go:204] [ 25963( 233): 25969( 234)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.771247 431499 usertrap_amd64.go:212] [ 25968(2893): 25968(2893)] Found the pattern at ip 55ef2c8631ae:sysno 230 D0317 18:30:36.771392 431499 usertrap_amd64.go:122] [ 25968(2893): 25968(2893)] Allocate a new trap: 0xc006dc8900 43 D0317 18:30:36.772719 431499 usertrap_amd64.go:225] [ 25968(2893): 25968(2893)] Apply the binary patch addr 55ef2c8631ae trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.778292 431499 task_exit.go:204] [ 25963( 233): 25969( 234)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.778356 431499 task_exit.go:204] [ 25963( 233): 25969( 234)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.778502 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.778693 431499 task_exit.go:204] [ 25963( 233): 25963( 233)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.779655 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.779837 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 36 D0317 18:30:36.780983 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) 18:30:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000005c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@tclass={{0x14}}, @hoplimit_2292={{0x14}}], 0x30}}], 0x1, 0x0) D0317 18:30:36.785803 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.785910 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 37 D0317 18:30:36.786107 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.797204 431499 usertrap_amd64.go:212] [ 25970(2894): 25970(2894)] Found the pattern at ip 55ef2c8631ae:sysno 230 D0317 18:30:36.797503 431499 usertrap_amd64.go:122] [ 25970(2894): 25970(2894)] Allocate a new trap: 0xc006e64600 43 D0317 18:30:36.798753 431499 usertrap_amd64.go:225] [ 25970(2894): 25970(2894)] Apply the binary patch addr 55ef2c8631ae trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.806270 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.806361 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 39 D0317 18:30:36.806445 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:36.810447 431499 usertrap_amd64.go:212] [ 25961(2891): 25961(2891)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.810699 431499 usertrap_amd64.go:122] [ 25961(2891): 25961(2891)] Allocate a new trap: 0xc0067dc780 43 D0317 18:30:36.811264 431499 usertrap_amd64.go:225] [ 25961(2891): 25961(2891)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.815594 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:36.815752 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 38 D0317 18:30:36.815877 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:36.816214 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.816285 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 40 D0317 18:30:36.816709 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.818370 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.818472 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 41 D0317 18:30:36.818559 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:36.819197 431499 usertrap_amd64.go:212] [ 25966(1445): 25971(1446)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.819300 431499 usertrap_amd64.go:122] [ 25966(1445): 25971(1446)] Allocate a new trap: 0xc006dc88d0 42 D0317 18:30:36.819412 431499 usertrap_amd64.go:225] [ 25966(1445): 25971(1446)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:36.823404 431499 usertrap_amd64.go:212] [ 25966(1445): 25966(1445)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.823475 431499 usertrap_amd64.go:122] [ 25966(1445): 25966(1445)] Allocate a new trap: 0xc006dc88d0 43 D0317 18:30:36.823784 431499 usertrap_amd64.go:225] [ 25966(1445): 25966(1445)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.824868 431499 task_signals.go:204] [ 25961(2891): 25965(2892)] Signal 9, PID: 25961, TID: 25965, fault addr: 0x0: terminating thread group D0317 18:30:36.825204 431499 task_exit.go:204] [ 25961(2891): 25965(2892)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.825929 431499 task_exit.go:204] [ 25961(2891): 25961(2891)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.826233 431499 task_exit.go:204] [ 25961(2891): 25965(2892)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.826376 431499 task_exit.go:204] [ 25961(2891): 25965(2892)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.830836 431499 task_exit.go:204] [ 25966(1445): 25966(1445)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.831641 431499 task_signals.go:204] [ 25966(1445): 25971(1446)] Signal 9, PID: 25966, TID: 25971, fault addr: 0x0: terminating thread group D0317 18:30:36.831705 431499 task_exit.go:204] [ 25966(1445): 25966(1445)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.831951 431499 task_exit.go:204] [ 25966(1445): 25971(1446)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.833319 431499 task_exit.go:204] [ 25961(2891): 25961(2891)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.833447 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.833613 431499 task_exit.go:204] [ 25961(2891): 25961(2891)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8901, &(0x7f0000000400)) D0317 18:30:36.839759 431499 task_exit.go:204] [ 25966(1445): 25971(1446)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.840133 431499 task_exit.go:204] [ 25966(1445): 25971(1446)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.840290 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.840617 431499 task_exit.go:204] [ 25966(1445): 25966(1445)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 2: syz_clone(0x301880, 0x0, 0x0, 0x0, 0x0, 0x0) D0317 18:30:36.846838 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:36.846927 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 36 D0317 18:30:36.847748 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:36.853488 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:36.853709 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 37 D0317 18:30:36.853925 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:36.855389 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:36.855460 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 39 D0317 18:30:36.855561 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:36.858080 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:36.858261 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 40 D0317 18:30:36.858390 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:36.858556 431499 usertrap_amd64.go:212] [ 25967( 167): 25973( 168)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:36.858616 431499 usertrap_amd64.go:122] [ 25967( 167): 25973( 168)] Allocate a new trap: 0xc004fc6a20 41 D0317 18:30:36.858678 431499 usertrap_amd64.go:225] [ 25967( 167): 25973( 168)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:36.864315 431499 usertrap_amd64.go:212] [ 25967( 167): 25967( 167)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:36.864418 431499 usertrap_amd64.go:122] [ 25967( 167): 25967( 167)] Allocate a new trap: 0xc004fc6a20 42 D0317 18:30:36.864485 431499 usertrap_amd64.go:225] [ 25967( 167): 25967( 167)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:36.871360 431499 task_signals.go:204] [ 25967( 167): 25973( 168)] Signal 9, PID: 25967, TID: 25973, fault addr: 0x0: terminating thread group D0317 18:30:36.871573 431499 task_exit.go:204] [ 25967( 167): 25973( 168)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.871769 431499 task_exit.go:204] [ 25967( 167): 25967( 167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.872584 431499 task_exit.go:204] [ 25967( 167): 25967( 167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.879524 431499 task_exit.go:204] [ 25967( 167): 25973( 168)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.880283 431499 task_exit.go:204] [ 25967( 167): 25973( 168)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.880431 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:36.882041 431499 task_exit.go:204] [ 25967( 167): 25967( 167)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 3: socketpair(0x1d, 0x0, 0x30b7, &(0x7f0000000140)) D0317 18:30:36.892096 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:36.892216 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 37 D0317 18:30:36.893051 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:36.898692 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:36.898805 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 38 D0317 18:30:36.899262 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:36.903775 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:36.903909 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 38 D0317 18:30:36.903990 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:36.905287 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:36.905412 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 37 D0317 18:30:36.906210 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:36.911188 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:36.911383 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 39 D0317 18:30:36.911495 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:36.911643 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 38 D0317 18:30:36.911805 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:36.911582 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:36.914103 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:36.914256 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 40 D0317 18:30:36.914498 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:36.916036 431499 usertrap_amd64.go:212] [ 25972( 235): 25976( 236)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:36.916125 431499 usertrap_amd64.go:122] [ 25972( 235): 25976( 236)] Allocate a new trap: 0xc0094ba330 41 D0317 18:30:36.916213 431499 usertrap_amd64.go:225] [ 25972( 235): 25976( 236)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:36.921896 431499 usertrap_amd64.go:212] [ 25972( 235): 25972( 235)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:36.921983 431499 usertrap_amd64.go:122] [ 25972( 235): 25972( 235)] Allocate a new trap: 0xc0094ba330 42 D0317 18:30:36.922075 431499 usertrap_amd64.go:225] [ 25972( 235): 25972( 235)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:36.926888 431499 task_exit.go:204] [ 25968(2893): 25968(2893)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.928248 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:36.928423 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 39 D0317 18:30:36.928601 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:36.932438 431499 task_exit.go:204] [ 25972( 235): 25972( 235)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.933080 431499 task_signals.go:204] [ 25972( 235): 25976( 236)] Signal 9, PID: 25972, TID: 25976, fault addr: 0x0: terminating thread group D0317 18:30:36.933188 431499 task_exit.go:204] [ 25972( 235): 25972( 235)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.933676 431499 task_exit.go:204] [ 25972( 235): 25976( 236)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.934144 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:36.934214 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 39 D0317 18:30:36.934303 431499 task_exit.go:204] [ 25968(2893): 25968(2893)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.934311 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:36.934382 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.936014 431499 task_exit.go:204] [ 25968(2893): 25968(2893)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.946370 431499 task_exit.go:204] [ 25972( 235): 25976( 236)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.946461 431499 task_exit.go:204] [ 25972( 235): 25976( 236)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.946615 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:36.947513 431499 task_exit.go:204] [ 25972( 235): 25972( 235)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.949355 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:36.949424 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 40 D0317 18:30:36.949494 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:36.952178 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:36.952246 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 40 D0317 18:30:36.952410 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:36.952584 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:36.952648 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 41 D0317 18:30:36.952744 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:36.953395 431499 usertrap_amd64.go:212] [ 25975(1447): 25978(1448)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:36.953484 431499 usertrap_amd64.go:122] [ 25975(1447): 25978(1448)] Allocate a new trap: 0xc0040fc840 42 D0317 18:30:36.953619 431499 usertrap_amd64.go:225] [ 25975(1447): 25978(1448)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) 18:30:36 executing program 1: pipe2$watch_queue(&(0x7f0000000300), 0x80) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0x0) D0317 18:30:36.954538 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:36.954631 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 41 D0317 18:30:36.954801 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:36.954992 431499 usertrap_amd64.go:212] [ 25974(2895): 25979(2896)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:36.955055 431499 usertrap_amd64.go:122] [ 25974(2895): 25979(2896)] Allocate a new trap: 0xc004fc6a50 42 D0317 18:30:36.955120 431499 usertrap_amd64.go:225] [ 25974(2895): 25979(2896)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:36.956551 431499 usertrap_amd64.go:212] [ 25975(1447): 25975(1447)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:36.956737 431499 usertrap_amd64.go:122] [ 25975(1447): 25975(1447)] Allocate a new trap: 0xc0040fc840 43 D0317 18:30:36.956806 431499 usertrap_amd64.go:225] [ 25975(1447): 25975(1447)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:36.959120 431499 task_exit.go:204] [ 25970(2894): 25970(2894)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.960970 431499 usertrap_amd64.go:212] [ 25974(2895): 25974(2895)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:36.961078 431499 usertrap_amd64.go:122] [ 25974(2895): 25974(2895)] Allocate a new trap: 0xc004fc6a50 43 D0317 18:30:36.961153 431499 usertrap_amd64.go:225] [ 25974(2895): 25974(2895)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:36.964312 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:36.964761 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 36 D0317 18:30:36.965650 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:36.971255 431499 task_exit.go:204] [ 25970(2894): 25970(2894)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.971398 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.973354 431499 task_exit.go:204] [ 25975(1447): 25975(1447)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.973808 431499 task_signals.go:204] [ 25974(2895): 25979(2896)] Signal 9, PID: 25974, TID: 25979, fault addr: 0x0: terminating thread group D0317 18:30:36.974488 431499 task_exit.go:204] [ 25974(2895): 25979(2896)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.974038 431499 task_signals.go:204] [ 25975(1447): 25978(1448)] Signal 9, PID: 25975, TID: 25978, fault addr: 0x0: terminating thread group D0317 18:30:36.974595 431499 task_exit.go:204] [ 25974(2895): 25974(2895)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.975430 431499 task_exit.go:204] [ 25974(2895): 25974(2895)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.975805 431499 task_exit.go:204] [ 25975(1447): 25978(1448)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:36.976060 431499 task_exit.go:204] [ 25970(2894): 25970(2894)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.976709 431499 task_exit.go:204] [ 25975(1447): 25975(1447)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.979327 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:36.979396 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 37 D0317 18:30:36.979467 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:36.983115 431499 task_exit.go:204] [ 25975(1447): 25978(1448)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.983191 431499 task_exit.go:204] [ 25975(1447): 25978(1448)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.983340 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:36.985819 431499 task_exit.go:204] [ 25975(1447): 25975(1447)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.986011 431499 task_exit.go:204] [ 25974(2895): 25979(2896)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:36.986103 431499 task_exit.go:204] [ 25974(2895): 25979(2896)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:36.986276 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:36.987283 431499 task_exit.go:204] [ 25974(2895): 25974(2895)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:36 executing program 2: add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="cd", 0x1, 0xfffffffffffffffd) 18:30:36 executing program 0: r0 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="d1", 0x1, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, r0) D0317 18:30:37.012091 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:37.012360 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 38 D0317 18:30:37.012683 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:37.012789 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 36 D0317 18:30:37.012646 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:37.014770 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:37.022173 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:37.022252 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 37 D0317 18:30:37.022409 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:37.030119 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:37.030233 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 39 D0317 18:30:37.030348 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:37.031957 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:37.032026 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 40 D0317 18:30:37.032104 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:37.033953 431499 usertrap_amd64.go:212] [ 25977( 169): 25982( 170)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:37.034021 431499 usertrap_amd64.go:122] [ 25977( 169): 25982( 170)] Allocate a new trap: 0xc002304510 41 D0317 18:30:37.034114 431499 usertrap_amd64.go:225] [ 25977( 169): 25982( 170)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:37.039203 431499 usertrap_amd64.go:212] [ 25977( 169): 25977( 169)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:37.039259 431499 usertrap_amd64.go:122] [ 25977( 169): 25977( 169)] Allocate a new trap: 0xc002304510 42 D0317 18:30:37.039352 431499 usertrap_amd64.go:225] [ 25977( 169): 25977( 169)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:37.052196 431499 task_exit.go:204] [ 25977( 169): 25977( 169)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.052773 431499 task_exit.go:204] [ 25977( 169): 25977( 169)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.052908 431499 task_signals.go:204] [ 25977( 169): 25982( 170)] Signal 9, PID: 25977, TID: 25982, fault addr: 0x0: terminating thread group D0317 18:30:37.052999 431499 task_exit.go:204] [ 25977( 169): 25982( 170)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.055596 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:37.056271 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 38 D0317 18:30:37.056764 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:37.056543 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:37.057298 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 37 D0317 18:30:37.058774 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:37.061461 431499 task_exit.go:204] [ 25977( 169): 25982( 170)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.061570 431499 task_exit.go:204] [ 25977( 169): 25982( 170)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.061732 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:37.061947 431499 task_exit.go:204] [ 25977( 169): 25977( 169)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.067304 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:37.067411 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 37 D0317 18:30:37.068381 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:37.072618 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:37.072691 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 39 D0317 18:30:37.072830 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:37.073182 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:37.073342 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 38 D0317 18:30:37.073416 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:37.073462 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 38 D0317 18:30:37.073536 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:37.073422 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:37.074311 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:37.074374 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 40 D0317 18:30:37.074482 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:37.076653 431499 usertrap_amd64.go:212] [ 25980( 237): 25984( 238)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:37.076959 431499 usertrap_amd64.go:122] [ 25980( 237): 25984( 238)] Allocate a new trap: 0xc004fc6a80 41 D0317 18:30:37.077199 431499 usertrap_amd64.go:225] [ 25980( 237): 25984( 238)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) 18:30:37 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0\x00', 0x0) D0317 18:30:37.080892 431499 usertrap_amd64.go:212] [ 25980( 237): 25980( 237)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:37.081099 431499 usertrap_amd64.go:122] [ 25980( 237): 25980( 237)] Allocate a new trap: 0xc004fc6a80 42 D0317 18:30:37.081185 431499 usertrap_amd64.go:225] [ 25980( 237): 25980( 237)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:37.095658 431499 task_exit.go:204] [ 25980( 237): 25980( 237)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.096485 431499 task_signals.go:204] [ 25980( 237): 25984( 238)] Signal 9, PID: 25980, TID: 25984, fault addr: 0x0: terminating thread group D0317 18:30:37.096690 431499 task_exit.go:204] [ 25980( 237): 25984( 238)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.096921 431499 task_exit.go:204] [ 25980( 237): 25980( 237)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.103564 431499 task_exit.go:204] [ 25980( 237): 25984( 238)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.103760 431499 task_exit.go:204] [ 25980( 237): 25984( 238)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.103943 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:37.104195 431499 task_exit.go:204] [ 25980( 237): 25980( 237)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.106995 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:37.107121 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 39 D0317 18:30:37.107233 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) 18:30:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x401c5820, &(0x7f0000000cc0)={'ip_vti0\x00', 0x0}) D0317 18:30:37.123496 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:37.123645 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 36 D0317 18:30:37.124482 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:37.127309 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:37.127392 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 40 D0317 18:30:37.127482 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:37.128906 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:37.128977 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 41 D0317 18:30:37.129049 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:37.129506 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:37.129630 431499 usertrap_amd64.go:212] [ 25981(2897): 25986(2898)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:37.129617 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 39 D0317 18:30:37.129689 431499 usertrap_amd64.go:122] [ 25981(2897): 25986(2898)] Allocate a new trap: 0xc0040ca570 42 D0317 18:30:37.129734 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:37.129783 431499 usertrap_amd64.go:225] [ 25981(2897): 25986(2898)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:37.133766 431499 usertrap_amd64.go:212] [ 25981(2897): 25981(2897)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:37.134069 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:37.134180 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 37 D0317 18:30:37.134151 431499 usertrap_amd64.go:122] [ 25981(2897): 25981(2897)] Allocate a new trap: 0xc0040ca570 43 D0317 18:30:37.134319 431499 usertrap_amd64.go:225] [ 25981(2897): 25981(2897)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:37.134285 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:37.143895 431499 task_exit.go:204] [ 25981(2897): 25981(2897)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.144601 431499 task_exit.go:204] [ 25981(2897): 25981(2897)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.145077 431499 task_signals.go:204] [ 25981(2897): 25986(2898)] Signal 9, PID: 25981, TID: 25986, fault addr: 0x0: terminating thread group D0317 18:30:37.145245 431499 task_exit.go:204] [ 25981(2897): 25986(2898)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.152032 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:37.152203 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 40 D0317 18:30:37.152329 431499 task_exit.go:204] [ 25981(2897): 25986(2898)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.152420 431499 task_exit.go:204] [ 25981(2897): 25986(2898)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.152534 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:37.152544 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:37.154312 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:37.154383 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 41 D0317 18:30:37.154496 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:37.155379 431499 task_exit.go:204] [ 25981(2897): 25981(2897)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.155722 431499 usertrap_amd64.go:212] [ 25983(1449): 25988(1450)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:37.155811 431499 usertrap_amd64.go:122] [ 25983(1449): 25988(1450)] Allocate a new trap: 0xc0026c6750 42 D0317 18:30:37.155900 431499 usertrap_amd64.go:225] [ 25983(1449): 25988(1450)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:37.157341 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:37.157585 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 38 D0317 18:30:37.157698 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) 18:30:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x475}) D0317 18:30:37.160713 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:37.160819 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 36 D0317 18:30:37.161695 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:37.161851 431499 usertrap_amd64.go:212] [ 25983(1449): 25983(1449)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:37.161947 431499 usertrap_amd64.go:122] [ 25983(1449): 25983(1449)] Allocate a new trap: 0xc0026c6750 43 D0317 18:30:37.162182 431499 usertrap_amd64.go:225] [ 25983(1449): 25983(1449)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:37.168008 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:37.168634 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 37 D0317 18:30:37.168851 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:37.174724 431499 task_exit.go:204] [ 25983(1449): 25983(1449)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.175642 431499 task_signals.go:204] [ 25983(1449): 25988(1450)] Signal 9, PID: 25983, TID: 25988, fault addr: 0x0: terminating thread group D0317 18:30:37.175767 431499 task_exit.go:204] [ 25983(1449): 25983(1449)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.175878 431499 task_exit.go:204] [ 25983(1449): 25988(1450)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.179319 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:37.179400 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 39 D0317 18:30:37.179479 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:37.182064 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:37.182311 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 40 D0317 18:30:37.182448 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:37.183148 431499 usertrap_amd64.go:212] [ 25985( 171): 25989( 172)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:37.183250 431499 usertrap_amd64.go:122] [ 25985( 171): 25989( 172)] Allocate a new trap: 0xc003cb2720 41 D0317 18:30:37.183346 431499 usertrap_amd64.go:225] [ 25985( 171): 25989( 172)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:37.187767 431499 usertrap_amd64.go:212] [ 25985( 171): 25985( 171)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:37.187968 431499 usertrap_amd64.go:122] [ 25985( 171): 25985( 171)] Allocate a new trap: 0xc003cb2720 42 D0317 18:30:37.188150 431499 usertrap_amd64.go:225] [ 25985( 171): 25985( 171)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:37.188566 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:37.188753 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 38 D0317 18:30:37.189024 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:37.192000 431499 task_exit.go:204] [ 25983(1449): 25988(1450)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.192148 431499 task_exit.go:204] [ 25983(1449): 25988(1450)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.192246 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:37.200486 431499 task_exit.go:204] [ 25983(1449): 25983(1449)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:37 executing program 2: add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0) D0317 18:30:37.211999 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:37.212098 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 39 D0317 18:30:37.212187 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0317 18:30:37.212538 431499 task_exit.go:204] [ 25985( 171): 25985( 171)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.213124 431499 task_exit.go:204] [ 25985( 171): 25985( 171)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.213307 431499 task_signals.go:204] [ 25985( 171): 25989( 172)] Signal 9, PID: 25985, TID: 25989, fault addr: 0x0: terminating thread group D0317 18:30:37.213389 431499 task_exit.go:204] [ 25985( 171): 25989( 172)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.217395 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:37.220803 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 40 D0317 18:30:37.217590 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:37.221601 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 37 D0317 18:30:37.222345 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:37.221441 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:37.223395 431499 usertrap_amd64.go:212] [ 25987( 239): 25991( 240)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:37.223475 431499 usertrap_amd64.go:122] [ 25987( 239): 25991( 240)] Allocate a new trap: 0xc0094ba390 41 D0317 18:30:37.223582 431499 usertrap_amd64.go:225] [ 25987( 239): 25991( 240)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:37.224602 431499 task_exit.go:204] [ 25985( 171): 25989( 172)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.224954 431499 task_exit.go:204] [ 25985( 171): 25989( 172)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.225438 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:37.225870 431499 task_exit.go:204] [ 25985( 171): 25985( 171)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:37 executing program 3: request_key(&(0x7f00000000c0)='.request_key_auth\x00', 0x0, 0x0, 0x0) D0317 18:30:37.237584 431499 usertrap_amd64.go:212] [ 25987( 239): 25987( 239)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:37.237673 431499 usertrap_amd64.go:122] [ 25987( 239): 25987( 239)] Allocate a new trap: 0xc0094ba390 42 D0317 18:30:37.237747 431499 usertrap_amd64.go:225] [ 25987( 239): 25987( 239)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:37.242886 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:37.244445 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 38 D0317 18:30:37.244558 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:37.246242 431499 task_exit.go:204] [ 25987( 239): 25987( 239)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.246824 431499 task_signals.go:204] [ 25987( 239): 25991( 240)] Signal 9, PID: 25987, TID: 25991, fault addr: 0x0: terminating thread group D0317 18:30:37.246936 431499 task_exit.go:204] [ 25987( 239): 25987( 239)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.249010 431499 task_exit.go:204] [ 25987( 239): 25991( 240)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.256948 431499 task_exit.go:204] [ 25987( 239): 25991( 240)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.257009 431499 task_exit.go:204] [ 25987( 239): 25991( 240)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.257116 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:37.257217 431499 task_exit.go:204] [ 25987( 239): 25987( 239)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:37 executing program 1: socket$inet6(0xa, 0x15b05f93cde649d5, 0x0) D0317 18:30:37.273784 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:37.273911 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 36 D0317 18:30:37.276603 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:37.277163 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:37.277290 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 37 D0317 18:30:37.278222 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:37.282078 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:37.282205 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 39 D0317 18:30:37.282380 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:37.290325 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:37.290416 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 37 D0317 18:30:37.290534 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:37.293229 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:37.293380 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 38 D0317 18:30:37.293511 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:37.308964 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:37.309084 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 40 D0317 18:30:37.309163 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:37.312086 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:37.312430 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 41 D0317 18:30:37.312520 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:37.313823 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:37.313864 431499 usertrap_amd64.go:212] [ 25990(2899): 25995(2900)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:37.313911 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 36 D0317 18:30:37.313931 431499 usertrap_amd64.go:122] [ 25990(2899): 25995(2900)] Allocate a new trap: 0xc006f9c540 42 D0317 18:30:37.314021 431499 usertrap_amd64.go:225] [ 25990(2899): 25995(2900)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:37.314989 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:37.320203 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:37.320297 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 38 D0317 18:30:37.320971 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:37.324634 431499 usertrap_amd64.go:212] [ 25990(2899): 25990(2899)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:37.324776 431499 usertrap_amd64.go:122] [ 25990(2899): 25990(2899)] Allocate a new trap: 0xc006f9c540 43 D0317 18:30:37.324920 431499 usertrap_amd64.go:225] [ 25990(2899): 25990(2899)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:37.326032 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:37.326159 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 39 D0317 18:30:37.326382 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:37.326936 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:37.327032 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 37 D0317 18:30:37.327214 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:37.333312 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:37.333433 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 39 D0317 18:30:37.333566 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:37.335734 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:37.335864 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 40 D0317 18:30:37.335970 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:37.336339 431499 usertrap_amd64.go:212] [ 25993( 173): 25996( 174)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:37.336397 431499 task_exit.go:204] [ 25990(2899): 25990(2899)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.336529 431499 usertrap_amd64.go:122] [ 25993( 173): 25996( 174)] Allocate a new trap: 0xc0040fc8d0 41 D0317 18:30:37.336991 431499 task_exit.go:204] [ 25990(2899): 25990(2899)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.337253 431499 usertrap_amd64.go:225] [ 25993( 173): 25996( 174)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:37.337599 431499 task_signals.go:204] [ 25990(2899): 25995(2900)] Signal 9, PID: 25990, TID: 25995, fault addr: 0x0: terminating thread group D0317 18:30:37.337733 431499 task_exit.go:204] [ 25990(2899): 25995(2900)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.340331 431499 usertrap_amd64.go:212] [ 25993( 173): 25993( 173)] Found the pattern at ip 55a8b05eac93:sysno 3 D0317 18:30:37.340611 431499 usertrap_amd64.go:122] [ 25993( 173): 25993( 173)] Allocate a new trap: 0xc0040fc8d0 42 D0317 18:30:37.340742 431499 usertrap_amd64.go:225] [ 25993( 173): 25993( 173)] Apply the binary patch addr 55a8b05eac93 trap addr 64d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0317 18:30:37.343244 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:37.343894 431499 task_exit.go:204] [ 25990(2899): 25995(2900)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.344000 431499 task_exit.go:204] [ 25990(2899): 25995(2900)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.344122 431499 task_signals.go:443] [ 14757( 1): 14757( 1)] Discarding ignored signal 17 D0317 18:30:37.343331 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 40 D0317 18:30:37.345807 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:37.345925 431499 task_exit.go:204] [ 25990(2899): 25990(2899)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.347883 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:37.347934 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 41 D0317 18:30:37.348018 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e750c10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) 18:30:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="410eb98ac6be0000", 0x8) D0317 18:30:37.349417 431499 usertrap_amd64.go:212] [ 25992(1451): 25997(1452)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:37.349497 431499 usertrap_amd64.go:122] [ 25992(1451): 25997(1452)] Allocate a new trap: 0xc006e646f0 42 D0317 18:30:37.349578 431499 usertrap_amd64.go:225] [ 25992(1451): 25997(1452)] Apply the binary patch addr 55ae6e750320 trap addr 60d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:37.351870 431499 task_exit.go:204] [ 25993( 173): 25993( 173)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.353105 431499 task_signals.go:204] [ 25993( 173): 25996( 174)] Signal 9, PID: 25993, TID: 25996, fault addr: 0x0: terminating thread group D0317 18:30:37.353170 431499 task_exit.go:204] [ 25993( 173): 25993( 173)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.353569 431499 task_exit.go:204] [ 25993( 173): 25996( 174)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.354320 431499 usertrap_amd64.go:212] [ 25992(1451): 25992(1451)] Found the pattern at ip 55ae6e77ac93:sysno 3 D0317 18:30:37.354374 431499 usertrap_amd64.go:122] [ 25992(1451): 25992(1451)] Allocate a new trap: 0xc006e646f0 43 D0317 18:30:37.354457 431499 usertrap_amd64.go:225] [ 25992(1451): 25992(1451)] Apply the binary patch addr 55ae6e77ac93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0317 18:30:37.356637 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:37.356737 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 38 D0317 18:30:37.356875 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0317 18:30:37.361695 431499 task_exit.go:204] [ 25993( 173): 25996( 174)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.361804 431499 task_exit.go:204] [ 25993( 173): 25996( 174)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.361919 431499 task_signals.go:443] [ 25315( 1): 25315( 1)] Discarding ignored signal 17 D0317 18:30:37.364461 431499 task_exit.go:204] [ 25993( 173): 25993( 173)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.365123 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f87c7b92:sysno 435 D0317 18:30:37.365309 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 39 D0317 18:30:37.365510 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f87c7b92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) 18:30:37 executing program 3: add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "f09d707e72262e8e07f170b21ac2e4d1421a85dd4a5c695f718294d916ecb781cd7253af46111967b3589246a45b8fff78c9b9f4512e00cb074b31ab24205999"}, 0x48, 0xfffffffffffffffb) D0317 18:30:37.367827 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f8770c10:sysno 14 D0317 18:30:37.367902 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 40 D0317 18:30:37.368011 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f8770c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0317 18:30:37.368495 431499 usertrap_amd64.go:212] [ 25994( 241): 25998( 242)] Found the pattern at ip 5637f8770320:sysno 273 D0317 18:30:37.368604 431499 usertrap_amd64.go:122] [ 25994( 241): 25998( 242)] Allocate a new trap: 0xc0026c6840 41 D0317 18:30:37.368676 431499 usertrap_amd64.go:225] [ 25994( 241): 25998( 242)] Apply the binary patch addr 5637f8770320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0317 18:30:37.370767 431499 usertrap_amd64.go:212] [ 25994( 241): 25994( 241)] Found the pattern at ip 5637f879ac93:sysno 3 D0317 18:30:37.370903 431499 usertrap_amd64.go:122] [ 25994( 241): 25994( 241)] Allocate a new trap: 0xc0026c6840 42 D0317 18:30:37.371025 431499 usertrap_amd64.go:225] [ 25994( 241): 25994( 241)] Apply the binary patch addr 5637f879ac93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0317 18:30:37.375968 431499 task_exit.go:204] [ 25994( 241): 25994( 241)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.376763 431499 task_exit.go:204] [ 25994( 241): 25994( 241)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.376758 431499 task_signals.go:204] [ 25992(1451): 25997(1452)] Signal 9, PID: 25992, TID: 25997, fault addr: 0x0: terminating thread group D0317 18:30:37.377468 431499 task_signals.go:204] [ 25994( 241): 25998( 242)] Signal 9, PID: 25994, TID: 25998, fault addr: 0x0: terminating thread group D0317 18:30:37.377544 431499 task_exit.go:204] [ 25992(1451): 25992(1451)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.378007 431499 task_exit.go:204] [ 25992(1451): 25997(1452)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.378862 431499 task_exit.go:204] [ 25994( 241): 25998( 242)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.380144 431499 task_exit.go:204] [ 25992(1451): 25992(1451)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.385544 431499 task_exit.go:204] [ 25992(1451): 25997(1452)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.385622 431499 task_exit.go:204] [ 25992(1451): 25997(1452)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.385715 431499 task_signals.go:443] [ 20297( 1): 20297( 1)] Discarding ignored signal 17 D0317 18:30:37.387826 431499 task_exit.go:204] [ 25992(1451): 25992(1451)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f00000001c0), 0x4) D0317 18:30:37.398022 431499 task_exit.go:204] [ 25994( 241): 25998( 242)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.398108 431499 task_exit.go:204] [ 25994( 241): 25998( 242)] Transitioning from exit state TaskExitZombie to TaskExitDead D0317 18:30:37.398202 431499 task_signals.go:443] [ 24936( 1): 24936( 1)] Discarding ignored signal 17 D0317 18:30:37.399784 431499 task_exit.go:204] [ 25994( 241): 25994( 241)] Transitioning from exit state TaskExitZombie to TaskExitDead 18:30:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000e80)={@private1, 0x0, 0x2}, &(0x7f0000000ec0)=0x20) D0317 18:30:37.411269 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c863860:sysno 109 D0317 18:30:37.411463 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 37 D0317 18:30:37.414651 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c863860 trap addr 69b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 155 6 0]) D0317 18:30:37.416922 431499 usertrap_amd64.go:212] [ 26000( 175): 26000( 175)] Found the pattern at ip 55a8b0617860:sysno 109 D0317 18:30:37.417001 431499 usertrap_amd64.go:122] [ 26000( 175): 26000( 175)] Allocate a new trap: 0xc0094ba3c0 36 D0317 18:30:37.417840 431499 usertrap_amd64.go:225] [ 26000( 175): 26000( 175)] Apply the binary patch addr 55a8b0617860 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0317 18:30:37.429244 431499 usertrap_amd64.go:212] [ 26000( 175): 26000( 175)] Found the pattern at ip 55a8b05eb520:sysno 266 D0317 18:30:37.429329 431499 usertrap_amd64.go:122] [ 26000( 175): 26000( 175)] Allocate a new trap: 0xc0094ba3c0 37 D0317 18:30:37.429400 431499 usertrap_amd64.go:225] [ 26000( 175): 26000( 175)] Apply the binary patch addr 55a8b05eb520 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0317 18:30:37.429843 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c837520:sysno 266 D0317 18:30:37.430020 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 38 D0317 18:30:37.430112 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c837520 trap addr 69be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 155 6 0]) D0317 18:30:37.452702 431499 usertrap_amd64.go:212] [ 26001(1453): 26001(1453)] Found the pattern at ip 55ae6e7a7860:sysno 109 D0317 18:30:37.452855 431499 usertrap_amd64.go:122] [ 26001(1453): 26001(1453)] Allocate a new trap: 0xc002780780 37 D0317 18:30:37.456321 431499 usertrap_amd64.go:225] [ 26001(1453): 26001(1453)] Apply the binary patch addr 55ae6e7a7860 trap addr 60b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 11 6 0]) D0317 18:30:37.461760 431499 usertrap_amd64.go:212] [ 26001(1453): 26001(1453)] Found the pattern at ip 55ae6e77b520:sysno 266 D0317 18:30:37.461916 431499 usertrap_amd64.go:122] [ 26001(1453): 26001(1453)] Allocate a new trap: 0xc002780780 38 D0317 18:30:37.462398 431499 usertrap_amd64.go:225] [ 26001(1453): 26001(1453)] Apply the binary patch addr 55ae6e77b520 trap addr 60be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 11 6 0]) D0317 18:30:37.473336 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c80cca2:sysno 14 D0317 18:30:37.473434 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 39 D0317 18:30:37.473446 431499 usertrap_amd64.go:212] [ 26000( 175): 26000( 175)] Found the pattern at ip 55a8b05c0ca2:sysno 14 D0317 18:30:37.473509 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c80cca2 trap addr 69c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 156 6 0]) D0317 18:30:37.473509 431499 usertrap_amd64.go:122] [ 26000( 175): 26000( 175)] Allocate a new trap: 0xc0094ba3c0 38 D0317 18:30:37.473626 431499 usertrap_amd64.go:225] [ 26000( 175): 26000( 175)] Apply the binary patch addr 55a8b05c0ca2 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0317 18:30:37.482873 431499 usertrap_amd64.go:212] [ 26002( 243): 26002( 243)] Found the pattern at ip 5637f87c7860:sysno 109 D0317 18:30:37.483021 431499 usertrap_amd64.go:122] [ 26002( 243): 26002( 243)] Allocate a new trap: 0xc006f9c5a0 36 D0317 18:30:37.484076 431499 usertrap_amd64.go:225] [ 26002( 243): 26002( 243)] Apply the binary patch addr 5637f87c7860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0317 18:30:37.490347 431499 usertrap_amd64.go:212] [ 26001(1453): 26001(1453)] Found the pattern at ip 55ae6e750ca2:sysno 14 D0317 18:30:37.490482 431499 usertrap_amd64.go:122] [ 26001(1453): 26001(1453)] Allocate a new trap: 0xc002780780 39 D0317 18:30:37.490564 431499 usertrap_amd64.go:225] [ 26001(1453): 26001(1453)] Apply the binary patch addr 55ae6e750ca2 trap addr 60c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0317 18:30:37.491985 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c863b92:sysno 435 D0317 18:30:37.492057 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 40 D0317 18:30:37.492153 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c863b92 trap addr 69c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 156 6 0]) D0317 18:30:37.543193 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c80cc10:sysno 14 D0317 18:30:37.543344 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 41 D0317 18:30:37.543489 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c80cc10 trap addr 69cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 156 6 0]) D0317 18:30:37.546058 431499 usertrap_amd64.go:212] [ 25999(2901): 26003(2902)] Found the pattern at ip 55ef2c80c320:sysno 273 D0317 18:30:37.546179 431499 usertrap_amd64.go:122] [ 25999(2901): 26003(2902)] Allocate a new trap: 0xc003cb2750 42 D0317 18:30:37.546298 431499 usertrap_amd64.go:225] [ 25999(2901): 26003(2902)] Apply the binary patch addr 55ef2c80c320 trap addr 69d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 157 6 0]) D0317 18:30:37.552553 431499 usertrap_amd64.go:212] [ 26002( 243): 26002( 243)] Found the pattern at ip 5637f879b520:sysno 266 D0317 18:30:37.552703 431499 usertrap_amd64.go:122] [ 26002( 243): 26002( 243)] Allocate a new trap: 0xc006f9c5a0 37 D0317 18:30:37.552817 431499 usertrap_amd64.go:225] [ 26002( 243): 26002( 243)] Apply the binary patch addr 5637f879b520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0317 18:30:37.553407 431499 usertrap_amd64.go:212] [ 25999(2901): 25999(2901)] Found the pattern at ip 55ef2c836c93:sysno 3 D0317 18:30:37.553690 431499 usertrap_amd64.go:122] [ 25999(2901): 25999(2901)] Allocate a new trap: 0xc003cb2750 43 D0317 18:30:37.554236 431499 usertrap_amd64.go:225] [ 25999(2901): 25999(2901)] Apply the binary patch addr 55ef2c836c93 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0317 18:30:37.555042 431499 usertrap_amd64.go:212] [ 26000( 175): 26000( 175)] Found the pattern at ip 55a8b0617b92:sysno 435 D0317 18:30:37.555500 431499 usertrap_amd64.go:122] [ 26000( 175): 26000( 175)] Allocate a new trap: 0xc0094ba3c0 39 D0317 18:30:37.555802 431499 usertrap_amd64.go:225] [ 26000( 175): 26000( 175)] Apply the binary patch addr 55a8b0617b92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0317 18:30:37.560094 431499 usertrap_amd64.go:212] [ 26000( 175): 26000( 175)] Found the pattern at ip 55a8b05c0c10:sysno 14 D0317 18:30:37.560178 431499 usertrap_amd64.go:122] [ 26000( 175): 26000( 175)] Allocate a new trap: 0xc0094ba3c0 40 D0317 18:30:37.560256 431499 usertrap_amd64.go:225] [ 26000( 175): 26000( 175)] Apply the binary patch addr 55a8b05c0c10 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0317 18:30:37.562034 431499 usertrap_amd64.go:212] [ 26000( 175): 26004( 176)] Found the pattern at ip 55a8b05c0320:sysno 273 D0317 18:30:37.562089 431499 usertrap_amd64.go:122] [ 26000( 175): 26004( 176)] Allocate a new trap: 0xc0094ba3c0 41 D0317 18:30:37.562763 431499 usertrap_amd64.go:225] [ 26000( 175): 26004( 176)] Apply the binary patch addr 55a8b05c0320 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0317 18:30:37.566547 431499 usertrap_amd64.go:212] [ 26001(1453): 26001(1453)] Found the pattern at ip 55ae6e7a7b92:sysno 435 D0317 18:30:37.566663 431499 usertrap_amd64.go:122] [ 26001(1453): 26001(1453)] Allocate a new trap: 0xc002780780 40 D0317 18:30:37.566894 431499 usertrap_amd64.go:225] [ 26001(1453): 26001(1453)] Apply the binary patch addr 55ae6e7a7b92 trap addr 60c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0317 18:30:37.569860 431499 usertrap_amd64.go:212] [ 26001(1453): 26005(1454)] Found the pattern at ip 55ae6e750320:sysno 273 D0317 18:30:37.569933 431499 usertrap_amd64.go:122] [ 26001(1453): 26005(1454)] Allocate a new trap: 0xc002780780 41 D0317 18:30:37.570007 431499 usertrap_amd64.go:225] [ 26001(1453): 26005(1454)] Apply the binary patch addr 55ae6e750320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0317 18:30:37.572827 431499 usertrap_amd64.go:212] [ 26001(1453): 26001(1453)] Found the pattern at ip 55ae6e750c10:sysno 14 D0317 18:30:37.572907 431499 usertrap_amd64.go:122] [ 26001(1453): 26001(1453)] Allocate a new trap: 0xc002780780 42 D0317 18:30:37.572969 431499 usertrap_amd64.go:225] [ 26001(1453): 26001(1453)] Apply the binary patch addr 55ae6e750c10 trap addr 60d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0317 18:30:37.577073 431499 task_exit.go:204] [ 25999(2901): 25999(2901)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.577949 431499 task_signals.go:204] [ 25999(2901): 26003(2902)] Signal 9, PID: 25999, TID: 26003, fault addr: 0x0: terminating thread group D0317 18:30:37.578227 431499 task_exit.go:204] [ 25999(2901): 25999(2901)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0317 18:30:37.578329 431499 usertrap_amd64.go:212] [ 26002( 243): 26002( 243)] Found the pattern at ip 5637f8770ca2:sysno 14 D0317 18:30:37.578388 431499 task_exit.go:204] [ 25999(2901): 26003(2902)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0317 18:30:37.578413 431499 usertrap_amd64.go:122] [ 26002( 243): 26002( 243)] Allocate a new trap: 0xc006f9c5a0 38 D0317 18:30:37.578560 431499 usertrap_amd64.go:225] [ 26002( 243): 26002( 243)] Apply the binary patch addr 5637f8770ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x1e21a36] goroutine 70424 gp=0xc005b1b340 m=24 mp=0xc00091f008 [running]: panic({0x312ce0?, 0x2827720?}) GOROOT/src/runtime/panic.go:779 +0x158 fp=0xc0049950c0 sp=0xc004995010 pc=0x1358318 runtime.panicmem(...) GOROOT/src/runtime/panic.go:261 runtime.sigpanic() GOROOT/src/runtime/signal_unix.go:881 +0x378 fp=0xc004995120 sp=0xc0049950c0 pc=0x1373578 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*endpoint).OnCorkOptionSet(0xc006244e08, 0x0) pkg/tcpip/transport/tcp/endpoint.go:1766 +0xb6 fp=0xc004995190 sp=0xc004995120 pc=0x1e21a36 gvisor.dev/gvisor/pkg/tcpip.(*SocketOptions).SetCorkOption(0xc006245318, 0x0) pkg/tcpip/socketops.go:474 +0x66 fp=0xc0049951b0 sp=0xc004995190 pc=0x16d69a6 gvisor.dev/gvisor/pkg/sentry/socket/netstack.setSockOptTCP(0x0?, {0x833048, 0xc00804b770}, {0x7f446004ea18, 0xc006244e08}, 0x3, {0xc00994e93c, 0x4, 0x1399b91?}) pkg/sentry/socket/netstack/netstack.go:2015 +0x425 fp=0xc004995250 sp=0xc0049951b0 pc=0x1ef1945 gvisor.dev/gvisor/pkg/sentry/socket/netstack.SetSockOpt(0xc00994e008, {0x833048, 0xc00804b770}, {0x7f446004ea18, 0xc006244e08}, 0x6, 0x3, {0xc00994e93c, 0x4, 0x90}) pkg/sentry/socket/netstack/netstack.go:1765 +0x196 fp=0xc0049952b0 sp=0xc004995250 pc=0x1eeed16 gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).SetSockOpt(0xc00804b770, 0xc00994e008, 0x6, 0x3, {0xc00994e93c, 0x4, 0x90}) pkg/sentry/socket/netstack/netstack.go:611 +0x608 fp=0xc0049953d8 sp=0xc0049952b0 pc=0x1ee67e8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.SetSockOpt(0xc00994e008, 0xca?, {{0x3}, {0x6}, {0x3}, {0x200001c0}, {0x4}, {0x0}}) pkg/sentry/syscalls/linux/sys_socket.go:551 +0x3b5 fp=0xc0049954f0 sp=0xc0049953d8 pc=0x1fb72b5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00994e008, 0x36, {{0x3}, {0x6}, {0x3}, {0x200001c0}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:143 +0x995 fp=0xc004995938 sp=0xc0049954f0 pc=0x1d32e55 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00994e008, 0x36, {{0x3}, {0x6}, {0x3}, {0x200001c0}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:323 +0x72 fp=0xc0049959e0 sp=0xc004995938 pc=0x1d34cb2 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00994e008, 0x36, {{0x3}, {0x6}, {0x3}, {0x200001c0}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:283 +0x94 fp=0xc004995a50 sp=0xc0049959e0 pc=0x1d346b4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00994e008) pkg/sentry/kernel/task_syscall.go:258 +0x4b0 fp=0xc004995b80 sp=0xc004995a50 pc=0x1d34250 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00994e008?, 0xc00994e008) pkg/sentry/kernel/task_run.go:263 +0x1fee fp=0xc004995e98 sp=0xc004995b80 pc=0x1d1dace gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00994e008, 0x6595) pkg/sentry/kernel/task_run.go:98 +0x46d fp=0xc004995fb0 sp=0xc004995e98 pc=0x1d1b14d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.gowrap1() pkg/sentry/kernel/task_start.go:390 +0x45 fp=0xc004995fe0 sp=0xc004995fb0 pc=0x1d30985 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc004995fe8 sp=0xc004995fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start in goroutine 70467 pkg/sentry/kernel/task_start.go:390 +0x1ae goroutine 1 gp=0xc0000061c0 m=nil [semacquire, 18 minutes]: runtime.gopark(0xc0003a1f20?, 0xc0001944e0?, 0xc0?, 0xe0?, 0xc00052f118?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0008070c0 sp=0xc0008070a0 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.semacquire1(0xc0001d2200, 0x0, 0x1, 0x0, 0x12) GOROOT/src/runtime/sema.go:160 +0x225 fp=0xc000807128 sp=0xc0008070c0 pc=0x13706e5 sync.runtime_Semacquire(0xc0001d2200?) GOROOT/src/runtime/sema.go:62 +0x25 fp=0xc000807160 sp=0xc000807128 pc=0x13920c5 sync.(*WaitGroup).Wait(0xc0001d21f8) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc000807190 sp=0xc000807160 pc=0x13aa865 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1265 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000722008) runsc/boot/loader.go:1297 +0x65 fp=0xc0008071b8 sp=0xc000807190 pc=0x2503ea5 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc0001dc000, {0xc000228118?, 0x10?}, 0xc000368460, {0xc000254900, 0x2, 0x2752400?}) runsc/cmd/boot.go:507 +0x2ac5 fp=0xc000807bf0 sp=0xc0008071b8 pc=0x26d0045 github.com/google/subcommands.(*Commander).Execute(0xc000266000, {0x8129d0, 0x3821fc0}, {0xc000254900, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x684 fp=0xc000807ce0 sp=0xc000807bf0 pc=0x14a5224 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:221 +0x20f7 fp=0xc000807f38 sp=0xc000807ce0 pc=0x271f937 main.main() runsc/main.go:31 +0x1d fp=0xc000807f50 sp=0xc000807f38 pc=0x2720c9d runtime.main() GOROOT/src/runtime/proc.go:271 +0x29d fp=0xc000807fe0 sp=0xc000807f50 pc=0x135b9dd runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000807fe8 sp=0xc000807fe0 pc=0x13968c1 goroutine 2 gp=0xc000006c40 m=nil [force gc (idle), 18 minutes]: runtime.gopark(0x285d590?, 0x2883b00?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00013c7a8 sp=0xc00013c788 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.forcegchelper() GOROOT/src/runtime/proc.go:326 +0xb3 fp=0xc00013c7e0 sp=0xc00013c7a8 pc=0x135bcb3 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00013c7e8 sp=0xc00013c7e0 pc=0x13968c1 created by runtime.init.6 in goroutine 1 GOROOT/src/runtime/proc.go:314 +0x1a goroutine 18 gp=0xc000182380 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014cf80 sp=0xc00014cf60 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.bgsweep(0xc00018e000) GOROOT/src/runtime/mgcsweep.go:318 +0xdf fp=0xc00014cfc8 sp=0xc00014cf80 pc=0x134571f runtime.gcenable.gowrap1() GOROOT/src/runtime/mgc.go:203 +0x25 fp=0xc00014cfe0 sp=0xc00014cfc8 pc=0x133a045 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014cfe8 sp=0xc00014cfe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:203 +0x66 goroutine 19 gp=0xc000182540 m=nil [GC scavenge wait]: runtime.gopark(0x2881a80?, 0xcddfc?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000152f78 sp=0xc000152f58 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x2881a80) GOROOT/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc000152fa8 sp=0xc000152f78 pc=0x13430e9 runtime.bgscavenge(0xc00018e000) GOROOT/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc000152fc8 sp=0xc000152fa8 pc=0x1343679 runtime.gcenable.gowrap2() GOROOT/src/runtime/mgc.go:204 +0x25 fp=0xc000152fe0 sp=0xc000152fc8 pc=0x1339fe5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000152fe8 sp=0xc000152fe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:204 +0xa5 goroutine 34 gp=0xc000204380 m=nil [finalizer wait, 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000284e20 sp=0xc000284e00 pc=0x135be4e runtime.runfinq() GOROOT/src/runtime/mfinal.go:194 +0x145 fp=0xc000284fe0 sp=0xc000284e20 pc=0x1339005 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000284fe8 sp=0xc000284fe0 pc=0x13968c1 created by runtime.createfing in goroutine 1 GOROOT/src/runtime/mfinal.go:164 +0x3d goroutine 35 gp=0xc000344700 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000283f50 sp=0xc000283f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000283fe0 sp=0xc000283f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000283fe8 sp=0xc000283fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 36 gp=0xc0003448c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000282f50 sp=0xc000282f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000282fe0 sp=0xc000282f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000282fe8 sp=0xc000282fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 50 gp=0xc0004c6000 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000281f50 sp=0xc000281f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000281fe0 sp=0xc000281f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000281fe8 sp=0xc000281fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 51 gp=0xc0004c61c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000280f50 sp=0xc000280f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000280fe0 sp=0xc000280f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000280fe8 sp=0xc000280fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 3 gp=0xc000007880 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000507f50 sp=0xc000507f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000507fe0 sp=0xc000507f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 4 gp=0xc000007a40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000506f50 sp=0xc000506f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000506fe0 sp=0xc000506f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 52 gp=0xc0004c6380 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000505f50 sp=0xc000505f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000505fe0 sp=0xc000505f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 37 gp=0xc000344a80 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000504f50 sp=0xc000504f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000504fe0 sp=0xc000504f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 5 gp=0xc000007c00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000503f50 sp=0xc000503f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000503fe0 sp=0xc000503f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 53 gp=0xc0004c6540 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000502f50 sp=0xc000502f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000502fe0 sp=0xc000502f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 38 gp=0xc000344c40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000501f50 sp=0xc000501f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000501fe0 sp=0xc000501f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000501fe8 sp=0xc000501fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 54 gp=0xc0004c6700 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000500f50 sp=0xc000500f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000500fe0 sp=0xc000500f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000500fe8 sp=0xc000500fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 39 gp=0xc000344e00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ff50 sp=0xc00050ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050ffe0 sp=0xc00050ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050ffe8 sp=0xc00050ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 40 gp=0xc000344fc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ef50 sp=0xc00050ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050efe0 sp=0xc00050ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050efe8 sp=0xc00050efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 55 gp=0xc0004c68c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050df50 sp=0xc00050df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050dfe0 sp=0xc00050df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050dfe8 sp=0xc00050dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 56 gp=0xc0004c6a80 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050cf50 sp=0xc00050cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050cfe0 sp=0xc00050cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050cfe8 sp=0xc00050cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 41 gp=0xc000345180 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050bf50 sp=0xc00050bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050bfe0 sp=0xc00050bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050bfe8 sp=0xc00050bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 42 gp=0xc000345340 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050af50 sp=0xc00050af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050afe0 sp=0xc00050af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050afe8 sp=0xc00050afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 57 gp=0xc0004c6c40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000509f50 sp=0xc000509f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000509fe0 sp=0xc000509f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000509fe8 sp=0xc000509fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 6 gp=0xc000007dc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000508f50 sp=0xc000508f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000508fe0 sp=0xc000508f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000508fe8 sp=0xc000508fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 58 gp=0xc0004c6e00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037bf50 sp=0xc00037bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037bfe0 sp=0xc00037bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037bfe8 sp=0xc00037bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 43 gp=0xc000345500 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037af50 sp=0xc00037af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037afe0 sp=0xc00037af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037afe8 sp=0xc00037afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 7 gp=0xc00017a000 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000379f50 sp=0xc000379f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000379fe0 sp=0xc000379f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000379fe8 sp=0xc000379fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 59 gp=0xc0004c6fc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000378f50 sp=0xc000378f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000378fe0 sp=0xc000378f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000378fe8 sp=0xc000378fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 44 gp=0xc0003456c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000377f50 sp=0xc000377f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000377fe0 sp=0xc000377f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000377fe8 sp=0xc000377fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 60 gp=0xc0004c7180 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000376f50 sp=0xc000376f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000376fe0 sp=0xc000376f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000376fe8 sp=0xc000376fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 45 gp=0xc000345880 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000375f50 sp=0xc000375f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000375fe0 sp=0xc000375f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000375fe8 sp=0xc000375fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 8 gp=0xc00017a1c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000374f50 sp=0xc000374f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000374fe0 sp=0xc000374f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000374fe8 sp=0xc000374fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 9 gp=0xc00017a380 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004cff50 sp=0xc0004cff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004cffe0 sp=0xc0004cff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cffe8 sp=0xc0004cffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 61 gp=0xc0004c7340 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004cef50 sp=0xc0004cef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004cefe0 sp=0xc0004cef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cefe8 sp=0xc0004cefe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 46 gp=0xc000345a40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004cdf50 sp=0xc0004cdf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004cdfe0 sp=0xc0004cdf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cdfe8 sp=0xc0004cdfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 47 gp=0xc000345c00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004ccf50 sp=0xc0004ccf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004ccfe0 sp=0xc0004ccf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004ccfe8 sp=0xc0004ccfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 48 gp=0xc000345dc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004cbf50 sp=0xc0004cbf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004cbfe0 sp=0xc0004cbf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cbfe8 sp=0xc0004cbfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 49 gp=0xc00037e000 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004caf50 sp=0xc0004caf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004cafe0 sp=0xc0004caf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cafe8 sp=0xc0004cafe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 66 gp=0xc00037e1c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c9f50 sp=0xc0004c9f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c9fe0 sp=0xc0004c9f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c9fe8 sp=0xc0004c9fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 62 gp=0xc0004c7500 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c8f50 sp=0xc0004c8f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c8fe0 sp=0xc0004c8f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c8fe8 sp=0xc0004c8fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 63 gp=0xc0004c76c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d7f50 sp=0xc0004d7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d7fe0 sp=0xc0004d7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d7fe8 sp=0xc0004d7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 64 gp=0xc0004c7880 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d6f50 sp=0xc0004d6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d6fe0 sp=0xc0004d6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d6fe8 sp=0xc0004d6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 10 gp=0xc00017a540 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d5f50 sp=0xc0004d5f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d5fe0 sp=0xc0004d5f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d5fe8 sp=0xc0004d5fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 11 gp=0xc00017a700 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d4f50 sp=0xc0004d4f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d4fe0 sp=0xc0004d4f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d4fe8 sp=0xc0004d4fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 12 gp=0xc00017a8c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d3f50 sp=0xc0004d3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d3fe0 sp=0xc0004d3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d3fe8 sp=0xc0004d3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 67 gp=0xc00037e380 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d2f50 sp=0xc0004d2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d2fe0 sp=0xc0004d2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d2fe8 sp=0xc0004d2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 65 gp=0xc0004c7a40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d1f50 sp=0xc0004d1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d1fe0 sp=0xc0004d1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d1fe8 sp=0xc0004d1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 82 gp=0xc0004c7c00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004d0f50 sp=0xc0004d0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004d0fe0 sp=0xc0004d0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004d0fe8 sp=0xc0004d0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 68 gp=0xc00037e540 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051ff50 sp=0xc00051ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051ffe0 sp=0xc00051ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051ffe8 sp=0xc00051ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 13 gp=0xc00017aa80 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051ef50 sp=0xc00051ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051efe0 sp=0xc00051ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051efe8 sp=0xc00051efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 83 gp=0xc0004c7dc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051df50 sp=0xc00051df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051dfe0 sp=0xc00051df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051dfe8 sp=0xc00051dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 84 gp=0xc0004d8000 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051cf50 sp=0xc00051cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051cfe0 sp=0xc00051cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051cfe8 sp=0xc00051cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 85 gp=0xc0004d81c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051bf50 sp=0xc00051bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051bfe0 sp=0xc00051bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051bfe8 sp=0xc00051bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 86 gp=0xc0004d8380 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051af50 sp=0xc00051af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051afe0 sp=0xc00051af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051afe8 sp=0xc00051afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 69 gp=0xc00037e700 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000519f50 sp=0xc000519f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000519fe0 sp=0xc000519f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000519fe8 sp=0xc000519fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 70 gp=0xc00037e8c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000518f50 sp=0xc000518f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000518fe0 sp=0xc000518f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000518fe8 sp=0xc000518fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 71 gp=0xc00037ea80 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004e1f50 sp=0xc0004e1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004e1fe0 sp=0xc0004e1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004e1fe8 sp=0xc0004e1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 87 gp=0xc0004d8540 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004e0f50 sp=0xc0004e0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004e0fe0 sp=0xc0004e0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004e0fe8 sp=0xc0004e0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 14 gp=0xc00017ac40 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004dff50 sp=0xc0004dff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004dffe0 sp=0xc0004dff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004dffe8 sp=0xc0004dffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 88 gp=0xc0004d8700 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004def50 sp=0xc0004def30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004defe0 sp=0xc0004def50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004defe8 sp=0xc0004defe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 15 gp=0xc00017ae00 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004ddf50 sp=0xc0004ddf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004ddfe0 sp=0xc0004ddf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004ddfe8 sp=0xc0004ddfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 89 gp=0xc0004d88c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004dcf50 sp=0xc0004dcf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004dcfe0 sp=0xc0004dcf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004dcfe8 sp=0xc0004dcfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 16 gp=0xc00017afc0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004dbf50 sp=0xc0004dbf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004dbfe0 sp=0xc0004dbf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004dbfe8 sp=0xc0004dbfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 90 gp=0xc0004d8a80 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004daf50 sp=0xc0004daf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004dafe0 sp=0xc0004daf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004dafe8 sp=0xc0004dafe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 98 gp=0xc00017b180 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000527f50 sp=0xc000527f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000527fe0 sp=0xc000527f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000527fe8 sp=0xc000527fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 99 gp=0xc00017b340 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000526f50 sp=0xc000526f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000526fe0 sp=0xc000526f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000526fe8 sp=0xc000526fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 100 gp=0xc00017b500 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000525f50 sp=0xc000525f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000525fe0 sp=0xc000525f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000525fe8 sp=0xc000525fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 101 gp=0xc00017b6c0 m=nil [GC worker (idle), 18 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000524f50 sp=0xc000524f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000524fe0 sp=0xc000524f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000524fe8 sp=0xc000524fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 20 gp=0xc000182700 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x55?, 0x59?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000523f50 sp=0xc000523f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000523fe0 sp=0xc000523f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000523fe8 sp=0xc000523fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 21 gp=0xc0001828c0 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e2fc5ee3?, 0x3?, 0xae?, 0x5d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000522f50 sp=0xc000522f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000522fe0 sp=0xc000522f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000522fe8 sp=0xc000522fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 22 gp=0xc000182a80 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e30085b3?, 0x1?, 0xfa?, 0xea?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000521f50 sp=0xc000521f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000521fe0 sp=0xc000521f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000521fe8 sp=0xc000521fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 23 gp=0xc000182c40 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e30018df?, 0x3?, 0xc7?, 0x99?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000520f50 sp=0xc000520f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000520fe0 sp=0xc000520f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000520fe8 sp=0xc000520fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 24 gp=0xc000182e00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x7c?, 0x93?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019ff50 sp=0xc00019ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019ffe0 sp=0xc00019ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019ffe8 sp=0xc00019ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 25 gp=0xc000182fc0 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e2ffcc59?, 0x3?, 0x26?, 0x2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019ef50 sp=0xc00019ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019efe0 sp=0xc00019ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019efe8 sp=0xc00019efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 26 gp=0xc000183180 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xf2?, 0xb1?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019df50 sp=0xc00019df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019dfe0 sp=0xc00019df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019dfe8 sp=0xc00019dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 27 gp=0xc000183340 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xab?, 0xbe?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019cf50 sp=0xc00019cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019cfe0 sp=0xc00019cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019cfe8 sp=0xc00019cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 28 gp=0xc000183500 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a325cd010ee?, 0x1?, 0x95?, 0xe4?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019bf50 sp=0xc00019bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019bfe0 sp=0xc00019bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019bfe8 sp=0xc00019bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 29 gp=0xc0001836c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a325ccaa488?, 0x1?, 0x7b?, 0xdd?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019af50 sp=0xc00019af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019afe0 sp=0xc00019af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019afe8 sp=0xc00019afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 30 gp=0xc000183880 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e2ff2df3?, 0x1?, 0xb3?, 0xf8?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000199f50 sp=0xc000199f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000199fe0 sp=0xc000199f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000199fe8 sp=0xc000199fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 31 gp=0xc000183a40 m=nil [GC worker (idle)]: runtime.gopark(0x53c618?, 0xc000196140?, 0x1a?, 0xa?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000198f50 sp=0xc000198f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000198fe0 sp=0xc000198f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000198fe8 sp=0xc000198fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 32 gp=0xc000183c00 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a3348de86be?, 0x1?, 0x2e?, 0xab?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 33 gp=0xc000183dc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x93?, 0xd6?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 114 gp=0xc0001a8000 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xc4?, 0xda?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 115 gp=0xc0001a81c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a325cd0a0e1?, 0x1?, 0xe0?, 0xcd?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 116 gp=0xc0001a8380 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x3823b00?, 0x1?, 0xf1?, 0x48?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 117 gp=0xc0001a8540 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x21?, 0xb0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 118 gp=0xc0001a8700 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a325ccf45e2?, 0x1?, 0x2d?, 0xcc?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a1f50 sp=0xc0001a1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a1fe0 sp=0xc0001a1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a1fe8 sp=0xc0001a1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 119 gp=0xc0001a88c0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x4e?, 0x34?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a0f50 sp=0xc0001a0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a0fe0 sp=0xc0001a0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a0fe8 sp=0xc0001a0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 120 gp=0xc0001a8a80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xd2?, 0x8b?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b1f50 sp=0xc0001b1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b1fe0 sp=0xc0001b1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b1fe8 sp=0xc0001b1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 121 gp=0xc0001a8c40 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x34?, 0x62?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b0f50 sp=0xc0001b0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b0fe0 sp=0xc0001b0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b0fe8 sp=0xc0001b0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 122 gp=0xc0001a8e00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xe0?, 0x98?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001aff50 sp=0xc0001aff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001affe0 sp=0xc0001aff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001affe8 sp=0xc0001affe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 123 gp=0xc0001a8fc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a33496783ec?, 0x1?, 0xb6?, 0xa3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001aef50 sp=0xc0001aef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001aefe0 sp=0xc0001aef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001aefe8 sp=0xc0001aefe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 124 gp=0xc0001a9180 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xa?, 0x85?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001adf50 sp=0xc0001adf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001adfe0 sp=0xc0001adf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001adfe8 sp=0xc0001adfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 125 gp=0xc0001a9340 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e2ff1967?, 0x3?, 0xac?, 0x66?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001acf50 sp=0xc0001acf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001acfe0 sp=0xc0001acf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001acfe8 sp=0xc0001acfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 126 gp=0xc0001a9500 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a325cd02279?, 0x1?, 0x10?, 0x58?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001abf50 sp=0xc0001abf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001abfe0 sp=0xc0001abf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001abfe8 sp=0xc0001abfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 127 gp=0xc0001a96c0 m=nil [GC worker (idle), 17 minutes]: runtime.gopark(0x4c1938e2dd95c1?, 0x3?, 0xe1?, 0x50?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001aaf50 sp=0xc0001aaf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001aafe0 sp=0xc0001aaf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001aafe8 sp=0xc0001aafe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 128 gp=0xc0001a9880 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a3348de87e0?, 0x1?, 0xdf?, 0xc2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b9f50 sp=0xc0001b9f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b9fe0 sp=0xc0001b9f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b9fe8 sp=0xc0001b9fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 129 gp=0xc0001a9a40 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xd2?, 0x23?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b8f50 sp=0xc0001b8f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b8fe0 sp=0xc0001b8f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b8fe8 sp=0xc0001b8fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 130 gp=0xc0001a9c00 m=nil [GC worker (idle)]: runtime.gopark(0x4c1a33499a1be0?, 0x1?, 0xf2?, 0xd8?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b7f50 sp=0xc0001b7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b7fe0 sp=0xc0001b7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b7fe8 sp=0xc0001b7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 131 gp=0xc0001a9dc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xc2?, 0xbb?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b6f50 sp=0xc0001b6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b6fe0 sp=0xc0001b6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 132 gp=0xc00037efc0 m=nil [sync.Cond.Wait, 18 minutes]: runtime.gopark(0xc000153cd8?, 0x13a854e?, 0x91?, 0x9b?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000153cb8 sp=0xc000153c98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc0002036d8, 0x0) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc000153d08 sp=0xc000153cb8 pc=0x1392439 sync.(*Cond).Wait(0xc0002036c8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc000153d38 sp=0xc000153d08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000203008) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc000153df0 sp=0xc000153d38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000203008) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc000153fc0 sp=0xc000153df0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc000153fe0 sp=0xc000153fc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000153fe8 sp=0xc000153fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 133 gp=0xc00037f340 m=nil [chan receive, 13 minutes]: runtime.gopark(0xc000297540?, 0x22b52c0?, 0x0?, 0xf3?, 0xc004fb2b40?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000285ef8 sp=0xc000285ed8 pc=0x135be4e runtime.chanrecv(0xc0002003c0, 0xc000285fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x36d fp=0xc000285f70 sp=0xc000285ef8 pc=0x13251ed runtime.chanrecv2(0xc00037f180?, 0x34b880?) GOROOT/src/runtime/chan.go:447 +0x12 fp=0xc000285f98 sp=0xc000285f70 pc=0x1324e72 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:336 +0x5b fp=0xc000285fe0 sp=0xc000285f98 pc=0x22b5bfb runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000285fe8 sp=0xc000285fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess in goroutine 1 pkg/sentry/platform/systrap/subprocess.go:333 +0x550 goroutine 134 gp=0xc00037f500 m=nil [sleep]: runtime.gopark(0x4c1a343da50b0a?, 0x1399bc9?, 0xb0?, 0x6f?, 0x16b7594?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000286f80 sp=0xc000286f60 pc=0x135be4e time.Sleep(0x61a80) GOROOT/src/runtime/time.go:195 +0x115 fp=0xc000286fc0 sp=0xc000286f80 pc=0x13930f5 gvisor.dev/gvisor/pkg/sentry/platform/systrap.controlFastPath() pkg/sentry/platform/systrap/metrics.go:263 +0x25 fp=0xc000286fe0 sp=0xc000286fc0 pc=0x22af865 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000286fe8 sp=0xc000286fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.New.func2 in goroutine 1 pkg/sentry/platform/systrap/systrap.go:346 +0x25 goroutine 135 gp=0xc00037f6c0 m=nil [sync.Cond.Wait]: runtime.gopark(0xc000287cd8?, 0x13a854e?, 0x30?, 0x38?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000287cb8 sp=0xc000287c98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000203ed8, 0xd03a) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc000287d08 sp=0xc000287cb8 pc=0x1392439 sync.(*Cond).Wait(0xc000203ec8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc000287d38 sp=0xc000287d08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000203808) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc000287df0 sp=0xc000287d38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000203808) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc000287fc0 sp=0xc000287df0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc000287fe0 sp=0xc000287fc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000287fe8 sp=0xc000287fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 136 gp=0xc00037f880 m=nil [select]: runtime.gopark(0xc0007cbfb0?, 0x2?, 0x80?, 0xd5?, 0xc0007cbf04?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0007cbd80 sp=0xc0007cbd60 pc=0x135be4e runtime.selectgo(0xc0007cbfb0, 0xc0007cbf00, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x865 fp=0xc0007cbed0 sp=0xc0007cbd80 pc=0x136f3e5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x2ba fp=0xc0007cbfe0 sp=0xc0007cbed0 pc=0x1d4229a runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0007cbfe8 sp=0xc0007cbfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater in goroutine 1 pkg/sentry/kernel/timekeeper.go:224 +0x16d goroutine 137 gp=0xc00037fa40 m=nil [select, 18 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a038?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b2de8 sp=0xc0001b2dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a038, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0001b2e18 sp=0xc0001b2de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0001b2e88 sp=0xc0001b2e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0001b2eb0 sp=0xc0001b2e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a008, 0xc000250f78) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0001b2fb0 sp=0xc0001b2eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0001b2fe0 sp=0xc0001b2fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b2fe8 sp=0xc0001b2fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 138 gp=0xc00037fc00 m=nil [select, 18 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a0c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014ede8 sp=0xc00014edc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a0c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00014ee18 sp=0xc00014ede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a0b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00014ee88 sp=0xc00014ee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a0b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00014eeb0 sp=0xc00014ee88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a098, 0xc000250f78) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00014efb0 sp=0xc00014eeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00014efe0 sp=0xc00014efb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014efe8 sp=0xc00014efe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 D0317 18:30:37.976057 1 connection.go:127] sock read failed, closing connection: EOF W0317 18:30:37.976276 431490 sandbox.go:1144] Wait RPC to container "ci-gvisor-systrap-1-race-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0317 18:30:37.976411 1 gofer.go:341] All lisafs servers exited. I0317 18:30:37.976567 1 main.go:226] Exiting with status: 0 D0317 18:30:37.977934 431490 container.go:795] Destroy container, cid: ci-gvisor-systrap-1-race-1 D0317 18:30:37.978099 431490 container.go:1092] Destroying container, cid: ci-gvisor-systrap-1-race-1 D0317 18:30:37.978170 431490 sandbox.go:1437] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-1 D0317 18:30:37.978195 431490 sandbox.go:1186] Destroying sandbox "ci-gvisor-systrap-1-race-1" D0317 18:30:37.978322 431490 container.go:1106] Killing gofer for container, cid: ci-gvisor-systrap-1-race-1, PID: 431498 D0317 18:30:37.988680 431490 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-1" I0317 18:30:37.989047 431490 main.go:226] Exiting with status: 512 VM DIAGNOSIS: I0317 18:30:37.922297 457371 main.go:194] **************** gVisor **************** I0317 18:30:37.923381 457371 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 457371, PPID 589324, UID 0, GID 0 D0317 18:30:37.923497 457371 main.go:196] Page size: 0x1000 (4096 bytes) I0317 18:30:37.923546 457371 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0317 18:30:37.923740 457371 config.go:395] Platform: systrap I0317 18:30:37.923823 457371 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0317 18:30:37.925104 457371 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0317 18:30:37.925217 457371 config.go:398] Network: sandbox I0317 18:30:37.925276 457371 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0317 18:30:37.925366 457371 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0317 18:30:37.925419 457371 config.go:418] Config.Traceback (--traceback): system D0317 18:30:37.925501 457371 config.go:418] Config.Debug (--debug): true D0317 18:30:37.925560 457371 config.go:418] Config.LogFilename (--log): (empty) D0317 18:30:37.925589 457371 config.go:418] Config.LogFormat (--log-format): text D0317 18:30:37.925615 457371 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0317 18:30:37.925675 457371 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0317 18:30:37.925708 457371 config.go:418] Config.DebugCommand (--debug-command): (empty) D0317 18:30:37.925765 457371 config.go:418] Config.PanicLog (--panic-log): (empty) D0317 18:30:37.925793 457371 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0317 18:30:37.925810 457371 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0317 18:30:37.925866 457371 config.go:418] Config.FileAccess (--file-access): shared D0317 18:30:37.925932 457371 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0317 18:30:37.925994 457371 config.go:418] Config.Overlay (--overlay): false D0317 18:30:37.926022 457371 config.go:418] Config.Overlay2 (--overlay2): none D0317 18:30:37.926068 457371 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0317 18:30:37.926122 457371 config.go:418] Config.HostUDS (--host-uds): none D0317 18:30:37.926162 457371 config.go:418] Config.HostFifo (--host-fifo): none D0317 18:30:37.926208 457371 config.go:418] Config.Network (--network): sandbox D0317 18:30:37.926236 457371 config.go:418] Config.EnableRaw (--net-raw): true D0317 18:30:37.926262 457371 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0317 18:30:37.926312 457371 config.go:418] Config.HostGSO (--gso): false D0317 18:30:37.926336 457371 config.go:418] Config.GvisorGSO (--software-gso): true D0317 18:30:37.926407 457371 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0317 18:30:37.926462 457371 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0317 18:30:37.926504 457371 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0317 18:30:37.926542 457371 config.go:418] Config.QDisc (--qdisc): fifo D0317 18:30:37.926569 457371 config.go:418] Config.LogPackets (--log-packets): false D0317 18:30:37.926605 457371 config.go:418] Config.PCAP (--pcap-log): (empty) D0317 18:30:37.926684 457371 config.go:418] Config.Platform (--platform): systrap D0317 18:30:37.926740 457371 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0317 18:30:37.926805 457371 config.go:418] Config.MetricServer (--metric-server): (empty) D0317 18:30:37.926847 457371 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0317 18:30:37.926918 457371 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0317 18:30:37.926956 457371 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0317 18:30:37.926988 457371 config.go:418] Config.Strace (--strace): false D0317 18:30:37.927038 457371 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0317 18:30:37.927115 457371 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0317 18:30:37.927146 457371 config.go:418] Config.StraceEvent (--strace-event): false D0317 18:30:37.927183 457371 config.go:420] Config.DisableSeccomp: false D0317 18:30:37.927235 457371 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0317 18:30:37.927294 457371 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0317 18:30:37.927329 457371 config.go:418] Config.PanicSignal (--panic-signal): -1 D0317 18:30:37.927356 457371 config.go:418] Config.ProfileEnable (--profile): false D0317 18:30:37.927372 457371 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0317 18:30:37.927395 457371 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0317 18:30:37.927436 457371 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0317 18:30:37.927474 457371 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0317 18:30:37.927520 457371 config.go:418] Config.TraceFile (--trace): (empty) D0317 18:30:37.927547 457371 config.go:420] Config.RestoreFile: (empty) D0317 18:30:37.927596 457371 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0317 18:30:37.927697 457371 config.go:418] Config.Rootless (--rootless): false D0317 18:30:37.927724 457371 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0317 18:30:37.927755 457371 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0317 18:30:37.927816 457371 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0317 18:30:37.927844 457371 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0317 18:30:37.927882 457371 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0317 18:30:37.927906 457371 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0317 18:30:37.927930 457371 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0317 18:30:37.927968 457371 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0317 18:30:37.927991 457371 config.go:418] Config.BufferPooling (--buffer-pooling): true D0317 18:30:37.928044 457371 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0317 18:30:37.928104 457371 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0317 18:30:37.928129 457371 config.go:418] Config.FDLimit (--fdlimit): -1 D0317 18:30:37.928173 457371 config.go:418] Config.DCache (--dcache): -1 D0317 18:30:37.928217 457371 config.go:418] Config.IOUring (--iouring): false D0317 18:30:37.928248 457371 config.go:418] Config.DirectFS (--directfs): true D0317 18:30:37.928305 457371 config.go:418] Config.NVProxy (--nvproxy): false D0317 18:30:37.928333 457371 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0317 18:30:37.928372 457371 config.go:418] Config.TPUProxy (--tpuproxy): false D0317 18:30:37.928400 457371 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0317 18:30:37.928426 457371 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0317 18:30:37.928479 457371 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0317 18:30:37.928528 457371 config.go:420] Config.explicitlySet: (unexported) D0317 18:30:37.928553 457371 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0317 18:30:37.928578 457371 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0317 18:30:37.928634 457371 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0317 18:30:37.928674 457371 main.go:199] **************** gVisor **************** W0317 18:30:37.928699 457371 main.go:214] Block the TERM signal. This is only safe in tests! D0317 18:30:37.928829 457371 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0317 18:30:37.935448 457371 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-1", PID: 431499 Found sandbox "ci-gvisor-systrap-1-race-1", PID: 431499 I0317 18:30:37.935588 457371 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0317 18:30:37.935653 457371 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0317 18:30:37.935708 457371 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-1" W0317 18:30:37.935887 457371 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: connecting to control server at PID 431499: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: connecting to control server at PID 431499: connection refused W0317 18:30:37.936135 457371 main.go:235] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-1"]: exit status 128 I0317 18:30:37.922297 457371 main.go:194] **************** gVisor **************** I0317 18:30:37.923381 457371 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 457371, PPID 589324, UID 0, GID 0 D0317 18:30:37.923497 457371 main.go:196] Page size: 0x1000 (4096 bytes) I0317 18:30:37.923546 457371 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0317 18:30:37.923740 457371 config.go:395] Platform: systrap I0317 18:30:37.923823 457371 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0317 18:30:37.925104 457371 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0317 18:30:37.925217 457371 config.go:398] Network: sandbox I0317 18:30:37.925276 457371 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0317 18:30:37.925366 457371 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0317 18:30:37.925419 457371 config.go:418] Config.Traceback (--traceback): system D0317 18:30:37.925501 457371 config.go:418] Config.Debug (--debug): true D0317 18:30:37.925560 457371 config.go:418] Config.LogFilename (--log): (empty) D0317 18:30:37.925589 457371 config.go:418] Config.LogFormat (--log-format): text D0317 18:30:37.925615 457371 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0317 18:30:37.925675 457371 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0317 18:30:37.925708 457371 config.go:418] Config.DebugCommand (--debug-command): (empty) D0317 18:30:37.925765 457371 config.go:418] Config.PanicLog (--panic-log): (empty) D0317 18:30:37.925793 457371 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0317 18:30:37.925810 457371 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0317 18:30:37.925866 457371 config.go:418] Config.FileAccess (--file-access): shared D0317 18:30:37.925932 457371 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0317 18:30:37.925994 457371 config.go:418] Config.Overlay (--overlay): false D0317 18:30:37.926022 457371 config.go:418] Config.Overlay2 (--overlay2): none D0317 18:30:37.926068 457371 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0317 18:30:37.926122 457371 config.go:418] Config.HostUDS (--host-uds): none D0317 18:30:37.926162 457371 config.go:418] Config.HostFifo (--host-fifo): none D0317 18:30:37.926208 457371 config.go:418] Config.Network (--network): sandbox D0317 18:30:37.926236 457371 config.go:418] Config.EnableRaw (--net-raw): true D0317 18:30:37.926262 457371 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0317 18:30:37.926312 457371 config.go:418] Config.HostGSO (--gso): false D0317 18:30:37.926336 457371 config.go:418] Config.GvisorGSO (--software-gso): true D0317 18:30:37.926407 457371 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0317 18:30:37.926462 457371 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0317 18:30:37.926504 457371 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0317 18:30:37.926542 457371 config.go:418] Config.QDisc (--qdisc): fifo D0317 18:30:37.926569 457371 config.go:418] Config.LogPackets (--log-packets): false D0317 18:30:37.926605 457371 config.go:418] Config.PCAP (--pcap-log): (empty) D0317 18:30:37.926684 457371 config.go:418] Config.Platform (--platform): systrap D0317 18:30:37.926740 457371 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0317 18:30:37.926805 457371 config.go:418] Config.MetricServer (--metric-server): (empty) D0317 18:30:37.926847 457371 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0317 18:30:37.926918 457371 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0317 18:30:37.926956 457371 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0317 18:30:37.926988 457371 config.go:418] Config.Strace (--strace): false D0317 18:30:37.927038 457371 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0317 18:30:37.927115 457371 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0317 18:30:37.927146 457371 config.go:418] Config.StraceEvent (--strace-event): false D0317 18:30:37.927183 457371 config.go:420] Config.DisableSeccomp: false D0317 18:30:37.927235 457371 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0317 18:30:37.927294 457371 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0317 18:30:37.927329 457371 config.go:418] Config.PanicSignal (--panic-signal): -1 D0317 18:30:37.927356 457371 config.go:418] Config.ProfileEnable (--profile): false D0317 18:30:37.927372 457371 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0317 18:30:37.927395 457371 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0317 18:30:37.927436 457371 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0317 18:30:37.927474 457371 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0317 18:30:37.927520 457371 config.go:418] Config.TraceFile (--trace): (empty) D0317 18:30:37.927547 457371 config.go:420] Config.RestoreFile: (empty) D0317 18:30:37.927596 457371 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0317 18:30:37.927697 457371 config.go:418] Config.Rootless (--rootless): false D0317 18:30:37.927724 457371 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0317 18:30:37.927755 457371 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0317 18:30:37.927816 457371 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0317 18:30:37.927844 457371 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0317 18:30:37.927882 457371 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0317 18:30:37.927906 457371 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0317 18:30:37.927930 457371 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0317 18:30:37.927968 457371 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0317 18:30:37.927991 457371 config.go:418] Config.BufferPooling (--buffer-pooling): true D0317 18:30:37.928044 457371 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0317 18:30:37.928104 457371 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0317 18:30:37.928129 457371 config.go:418] Config.FDLimit (--fdlimit): -1 D0317 18:30:37.928173 457371 config.go:418] Config.DCache (--dcache): -1 D0317 18:30:37.928217 457371 config.go:418] Config.IOUring (--iouring): false D0317 18:30:37.928248 457371 config.go:418] Config.DirectFS (--directfs): true D0317 18:30:37.928305 457371 config.go:418] Config.NVProxy (--nvproxy): false D0317 18:30:37.928333 457371 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0317 18:30:37.928372 457371 config.go:418] Config.TPUProxy (--tpuproxy): false D0317 18:30:37.928400 457371 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0317 18:30:37.928426 457371 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0317 18:30:37.928479 457371 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0317 18:30:37.928528 457371 config.go:420] Config.explicitlySet: (unexported) D0317 18:30:37.928553 457371 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0317 18:30:37.928578 457371 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0317 18:30:37.928634 457371 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0317 18:30:37.928674 457371 main.go:199] **************** gVisor **************** W0317 18:30:37.928699 457371 main.go:214] Block the TERM signal. This is only safe in tests! D0317 18:30:37.928829 457371 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0317 18:30:37.935448 457371 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-1", PID: 431499 Found sandbox "ci-gvisor-systrap-1-race-1", PID: 431499 I0317 18:30:37.935588 457371 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0317 18:30:37.935653 457371 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0317 18:30:37.935708 457371 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-1" W0317 18:30:37.935887 457371 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: connecting to control server at PID 431499: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: connecting to control server at PID 431499: connection refused W0317 18:30:37.936135 457371 main.go:235] Failure to execute command, err: 1 [21285139.490606] exe[292798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643d66b5237 cs:33 sp:7f4c09d5bef8 ax:2f700000 si:5643d67232f7 di:ffffffffff600000 [21285163.621715] potentially unexpected fatal signal 11. [21285163.627015] CPU: 13 PID: 274026 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21285163.639006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21285163.648654] RIP: 0033:0x55818f328948 [21285163.652631] Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 [21285163.671869] RSP: 002b:00007f6caf654440 EFLAGS: 00010202 [21285163.677976] RAX: 000000000000036e RBX: 0000000000000000 RCX: 000055818f328dd3 [21285163.686948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [21285163.695877] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21285163.704825] R10: 000055818ff8a750 R11: 0000000000000246 R12: 000000000000036e [21285163.713755] R13: ffffffffffffffb0 R14: 0000000000000002 R15: 0000000000000000 [21285163.722664] FS: 000055818ff8a480 GS: 0000000000000000 [21285624.472946] potentially unexpected fatal signal 5. [21285624.478175] CPU: 59 PID: 305446 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21285624.485118] potentially unexpected fatal signal 5. [21285624.490164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21285624.495357] CPU: 61 PID: 304008 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21285624.495359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21285624.495365] RIP: 0033:0x7fffffffe062 [21285624.495370] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21285624.504976] RIP: 0033:0x7fffffffe062 [21285624.504982] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21285624.516982] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21285624.516986] RAX: 00007f666a8b9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21285624.516987] RDX: 0000000000000001 RSI: 0000000000004000 RDI: 00007f666a8b9000 [21285624.516989] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000010de6000 [21285624.516991] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21285624.516992] R13: 000000c000143808 R14: 000000c00017ec40 R15: 0000000000049c30 [21285624.516993] FS: 00007f7611d9d6c0 GS: 0000000000000000 [21285624.630259] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21285624.637304] RAX: 00007f4504c39000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21285624.646245] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f4504c39000 [21285624.655179] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000010df8000 [21285624.664075] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21285624.673024] R13: 000000c000143808 R14: 000000c00017ec40 R15: 0000000000049c30 [21285624.681936] FS: 00007f7611d9d6c0 GS: 0000000000000000 [21285968.926787] potentially unexpected fatal signal 11. [21285968.932099] CPU: 63 PID: 288964 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21285968.944081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21285968.953730] RIP: 0033:0x55f30d8ea851 [21285968.957786] Code: 24 10 00 00 00 44 8b 54 24 30 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 eb ae 66 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff eb ae e8 10 26 00 00 48 83 ec 58 48 89 4c [21285968.978368] RSP: 002b:00007f245e88c4d0 EFLAGS: 00010213 [21285968.984022] RAX: 0000000000000002 RBX: 00000000000008cf RCX: 000055f30d8ea801 [21285968.991562] RDX: ffffffffffffffb0 RSI: 000055f30d93645d RDI: 00000000ffffff9c [21285968.999116] RBP: 00007f245e88c59c R08: 0000000010c8afcb R09: 0000000000000926 [21285969.008071] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 [21285969.015654] R13: 000000000011e0d9 R14: 000000000011df50 R15: 000000000000000c [21285969.023218] FS: 000055f30e549480 GS: 0000000000000000 [21285969.040493] potentially unexpected fatal signal 5. [21285969.045837] CPU: 55 PID: 286043 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21285969.059236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21285969.068928] RIP: 0033:0x7fffffffe062 [21285969.072948] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21285969.092137] RSP: 002b:000000c000675b90 EFLAGS: 00000297 [21285969.097795] RAX: 000000000004c05c RBX: 0000000000000000 RCX: 00007fffffffe05a [21285969.105332] RDX: 0000000000000000 RSI: 000000c000676000 RDI: 0000000000012f00 [21285969.112886] RBP: 000000c000675c28 R08: 000000c000900010 R09: 0000000000000000 [21285969.121810] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000675c18 [21285969.129389] R13: 000000c000421410 R14: 000000c000500fc0 R15: 0000000000045d17 [21285969.136959] FS: 000000c000180098 GS: 0000000000000000 [21286041.516204] exe[309113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590aeab2ab9 cs:33 sp:7f0aca2bdef8 ax:0 si:20000080 di:ffffffffff600000 [21286043.254144] exe[309472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c41096ab9 cs:33 sp:7fce1059aef8 ax:0 si:20000080 di:ffffffffff600000 [21286102.963177] exe[314686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577dcd61ab9 cs:33 sp:7f78bca45858 ax:0 si:5577dcdbb062 di:ffffffffff600000 [21286103.065928] exe[314676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558aeedccab9 cs:33 sp:7f5cef929858 ax:0 si:558aeee26062 di:ffffffffff600000 [21286103.091357] exe[314686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560aaa7f0ab9 cs:33 sp:7fa8985fe858 ax:0 si:560aaa84a062 di:ffffffffff600000 [21286103.186388] exe[314615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577dcd61ab9 cs:33 sp:7f78bca45858 ax:0 si:5577dcdbb062 di:ffffffffff600000 [21286103.508062] exe[314734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560aaa7f0ab9 cs:33 sp:7fa8985fe858 ax:0 si:560aaa84a062 di:ffffffffff600000 [21286103.607111] exe[314273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577dcd61ab9 cs:33 sp:7f78bca45858 ax:0 si:5577dcdbb062 di:ffffffffff600000 [21286103.740198] exe[314762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fac7ab9 cs:33 sp:7f4a478e5858 ax:0 si:55769fb21062 di:ffffffffff600000 [21286103.831400] exe[314532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558aeedccab9 cs:33 sp:7f5cef929858 ax:0 si:558aeee26062 di:ffffffffff600000 [21286485.017178] exe[258247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c4c2f1ab9 cs:33 sp:7f109e331858 ax:0 si:560c4c34b097 di:ffffffffff600000 [21286951.609547] potentially unexpected fatal signal 11. [21286951.614880] CPU: 7 PID: 328134 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21286951.626809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21286951.636484] RIP: 0033:0x55e20a87c65e [21286951.640474] Code: ff 0f 1f 00 8d 47 01 eb 16 0f 1f 00 48 83 c0 01 8b b4 85 5c 08 00 00 85 f6 0f 85 fd 00 00 00 89 c7 83 f8 04 75 e6 48 8b 4d 60 <48> 8b 41 08 48 83 e0 f8 48 39 85 88 08 00 00 0f 82 4a 02 00 00 48 [21286951.659819] RSP: 002b:00007f92e8ccb2f0 EFLAGS: 00010246 [21286951.666971] RAX: 0000000000000004 RBX: 0000000000008040 RCX: 000055e20b5007d0 [21286951.675871] RDX: 000055e20a9a2e20 RSI: 0000000000000000 RDI: 0000000000000004 [21286951.684824] RBP: 000055e20a9a2660 R08: 00000000010cdd3d R09: 0000000000000308 [21286951.693781] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [21286951.702698] R13: 0000000000000076 R14: 000055e20a9a26c0 R15: 0000000000000000 [21286951.711602] FS: 000055e20b4ff480 GS: 0000000000000000 [21287509.714387] exe[317519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565527ecaab9 cs:33 sp:7f0c02fd2858 ax:0 si:565527f24062 di:ffffffffff600000 [21287509.789764] exe[314607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea99c8ab9 cs:33 sp:7fe25da3d858 ax:0 si:560ea9a22062 di:ffffffffff600000 [21287628.058015] exe[346384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0abacfab9 cs:33 sp:7eac32f58858 ax:0 si:55f0abb29070 di:ffffffffff600000 [21287796.000614] exe[333593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e61dd51ab9 cs:33 sp:7f6574706858 ax:0 si:55e61ddab070 di:ffffffffff600000 [21287875.799080] exe[314168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bebd00ab9 cs:33 sp:7fa298fa8858 ax:0 si:559bebd5a062 di:ffffffffff600000 [21287875.987631] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.007384] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.027528] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.047630] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.066930] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.086721] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.107909] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.128441] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287876.149840] exe[314852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da16db2ab9 cs:33 sp:7f72c8f3c858 ax:0 si:55da16e0c062 di:ffffffffff600000 [21287976.235935] warn_bad_vsyscall: 24 callbacks suppressed [21287976.235938] exe[314468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559412d12ab9 cs:33 sp:7fe27abfe858 ax:0 si:559412d6c062 di:ffffffffff600000 [21287976.361895] exe[316185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd062f1ab9 cs:33 sp:7f2b7ab58858 ax:0 si:55dd0634b062 di:ffffffffff600000 [21288248.992433] exe[357311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558207091237 cs:33 sp:7f8f4a0f1ef8 ax:2f700000 si:5582070ff2f7 di:ffffffffff600000 [21288372.481051] exe[335014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55593bfb7ab9 cs:33 sp:7f82296b1858 ax:0 si:55593c011070 di:ffffffffff600000 [21288389.066525] exe[310949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afeb121ab9 cs:33 sp:7fbaa3165858 ax:0 si:55afeb17b062 di:ffffffffff600000 [21288389.196607] exe[314392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595ea5a5ab9 cs:33 sp:7f6ec3105858 ax:0 si:5595ea5ff062 di:ffffffffff600000 [21288412.190450] exe[248447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bfad23ab9 cs:33 sp:7f4ce4f1a858 ax:0 si:556bfad7d097 di:ffffffffff600000 [21288705.668545] exe[338078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f8a81aab9 cs:33 sp:7f7f2dae8858 ax:0 si:561f8a874062 di:ffffffffff600000 [21288705.870194] exe[318486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d494aeaab9 cs:33 sp:7fb7743f7858 ax:0 si:55d494b44062 di:ffffffffff600000 [21289093.169369] exe[310980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56111feabab9 cs:33 sp:7f2b6bacf858 ax:0 si:56111ff05062 di:ffffffffff600000 [21289093.358136] exe[314919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56111feabab9 cs:33 sp:7f2b6baae858 ax:0 si:56111ff05062 di:ffffffffff600000 [21289193.880463] potentially unexpected fatal signal 11. [21289193.885877] CPU: 30 PID: 305477 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21289193.897899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21289193.907663] RIP: 0033:0x5622ab8450e9 [21289193.911677] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21289193.930867] RSP: 002b:00007f4928b0e448 EFLAGS: 00010213 [21289193.936525] RAX: 0000000000000016 RBX: 00005622ab88f3b9 RCX: 00005622ab8450d7 [21289193.945445] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f4928b0f5c0 [21289193.952976] RBP: 00007f4928b0f59c R08: 0000000032ac84ba R09: 0000000000001bf6 [21289193.960498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4928b0f5c0 [21289193.968036] R13: 00005622ab88f3b9 R14: 000000000036ed56 R15: 0000000000000012 [21289193.975564] FS: 00005622ac4a2480 GS: 0000000000000000 [21289348.050425] potentially unexpected fatal signal 5. [21289348.055650] CPU: 65 PID: 374918 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21289348.067666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21289348.077317] RIP: 0033:0x7fffffffe062 [21289348.081309] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21289348.100665] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [21289348.107664] RAX: 0000556c41016000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21289348.116592] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000556c41016000 [21289348.125535] RBP: 000000c0005e5c28 R08: 0000000000000009 R09: 000000001085a000 [21289348.134467] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005e5c18 [21289348.143396] R13: 000000c00080c030 R14: 000000c000618540 R15: 000000000005867f [21289348.152316] FS: 000000c000180098 GS: 0000000000000000 [21289525.224493] potentially unexpected fatal signal 5. [21289525.229823] CPU: 10 PID: 382848 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21289525.241818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21289525.251442] RIP: 0033:0x7fffffffe062 [21289525.255403] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21289525.274757] RSP: 002b:000000c0006e3b90 EFLAGS: 00000297 [21289525.280403] RAX: 00007f0c0dbc8000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21289525.287949] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f0c0dbc8000 [21289525.295497] RBP: 000000c0006e3c28 R08: 0000000000000009 R09: 000000000c35a000 [21289525.304433] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006e3c18 [21289525.313362] R13: 000000c0006ecb10 R14: 000000c00047e8c0 R15: 000000000005b3b3 [21289525.322290] FS: 000000c000200098 GS: 0000000000000000 [21290101.216786] exe[199478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564074ad4ab9 cs:33 sp:7f38b60f1858 ax:0 si:564074b2e062 di:ffffffffff600000 [21290218.899191] exe[393618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615d4bafab9 cs:33 sp:7f6b1ed15ef8 ax:0 si:20000040 di:ffffffffff600000 [21290233.831452] exe[366349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ab8968ab9 cs:33 sp:7fe57748b858 ax:0 si:562ab89c2097 di:ffffffffff600000 [21290589.706390] potentially unexpected fatal signal 5. [21290589.711609] CPU: 19 PID: 408470 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21290589.724033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21290589.733847] RIP: 0033:0x7fffffffe062 [21290589.738010] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21290589.757217] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21290589.764441] RAX: 0000555cd2753000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21290589.773375] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000555cd2753000 [21290589.782281] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000e18c000 [21290589.791216] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21290589.798773] R13: 000000c000143008 R14: 000000c0001bc700 R15: 0000000000061997 [21290589.806616] FS: 00007faf40e9e6c0 GS: 0000000000000000 [21290675.745936] exe[365726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562486fdbab9 cs:33 sp:7f85f8c24858 ax:0 si:562487035097 di:ffffffffff600000 [21290760.146345] potentially unexpected fatal signal 5. [21290760.151571] CPU: 64 PID: 390265 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21290760.163571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21290760.173263] RIP: 0033:0x7fffffffe062 [21290760.177300] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21290760.197849] RSP: 002b:000000c0004cfb90 EFLAGS: 00000297 [21290760.204868] RAX: 0000001b33620000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21290760.213813] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b33620000 [21290760.222722] RBP: 000000c0004cfc28 R08: 0000000000000009 R09: 0000000020c00000 [21290760.231652] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0004cfc18 [21290760.240580] R13: 000000c000505f50 R14: 000000c0004c0fc0 R15: 000000000005ea89 [21290760.249507] FS: 0000000001f6b7f0 GS: 0000000000000000 [21291130.130685] exe[369346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdf0bf6ab9 cs:33 sp:7f012a5e3ef8 ax:0 si:20000040 di:ffffffffff600000 [21291130.216049] exe[366969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdf0bf6ab9 cs:33 sp:7f012a5e3ef8 ax:0 si:20000040 di:ffffffffff600000 [21291130.217377] exe[366996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdf0bf6ab9 cs:33 sp:7f012a5c2ef8 ax:0 si:20000040 di:ffffffffff600000 [21291612.593951] exe[385754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e469c05ab9 cs:33 sp:7f2daa89d858 ax:0 si:55e469c5f062 di:ffffffffff600000 [21291696.370862] exe[412734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fa0e43237 cs:33 sp:7eb2617ddef8 ax:2f700000 si:556fa0eb12f7 di:ffffffffff600000 [21292006.904630] exe[366988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfe05b1ab9 cs:33 sp:7eff61ccfef8 ax:0 si:20006f40 di:ffffffffff600000 [21292007.000247] exe[431156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55faeade0ab9 cs:33 sp:7f06eabacef8 ax:0 si:20006f40 di:ffffffffff600000 [21292019.339236] exe[367077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55faeade0ab9 cs:33 sp:7f06eabacef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.488572] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.510144] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.539089] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.562170] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.582564] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.609144] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.628931] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.648604] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292019.668379] exe[427938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648dd3d4ab9 cs:33 sp:7f9fc0324ef8 ax:0 si:20000580 di:ffffffffff600000 [21292025.571391] warn_bad_vsyscall: 24 callbacks suppressed [21292025.571395] exe[443519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6537e0ab9 cs:33 sp:7ecb2c687858 ax:0 si:55e65383a062 di:ffffffffff600000 [21292210.620683] exe[446515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfd7ad6237 cs:33 sp:7fa5e0dfeef8 ax:2f700000 si:55bfd7b442f7 di:ffffffffff600000 [21292574.064558] exe[456529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55616f51fab9 cs:33 sp:7f2920d41ef8 ax:0 si:20000780 di:ffffffffff600000 [21292652.400733] exe[436373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563831532ab9 cs:33 sp:7effcb02fef8 ax:0 si:20006100 di:ffffffffff600000 [21293110.908668] exe[424055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc8c33f237 cs:33 sp:7f931db75ef8 ax:2f700000 si:55dc8c3ad2f7 di:ffffffffff600000 [21293177.323148] potentially unexpected fatal signal 11. [21293177.328452] CPU: 16 PID: 467458 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21293177.340436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21293177.350075] RIP: 0033:0x55b4877d837b [21293177.354070] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21293177.374822] RSP: 002b:00007fcc7372d310 EFLAGS: 00010246 [21293177.381816] RAX: 00007fcc7372d470 RBX: 00007fcc7372d470 RCX: 0000000000000000 [21293177.390770] RDX: 00007f62ec600060 RSI: 00007fcc7372d4c8 RDI: 00007fcc7372d4f0 [21293177.399711] RBP: 0000000000000000 R08: 00007f62ec600060 R09: 000055b48794cf8c [21293177.408678] R10: 0000000000000003 R11: 00000000861c4ae6 R12: 000055b48794cf80 [21293177.417614] R13: 0000000000000fb0 R14: 000055b48794cf80 R15: 00007fcc7372d418 [21293177.426654] FS: 000055b48847d480 GS: 0000000000000000 [21293257.561677] potentially unexpected fatal signal 11. [21293257.567003] CPU: 64 PID: 473274 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21293257.578982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21293257.588636] RIP: 0033:0x55d31025efcf [21293257.592646] Code: 48 89 84 24 90 00 00 00 48 89 9c 24 98 00 00 00 4c 8b 35 c4 69 17 00 4d 8d ae 00 00 40 00 4d 39 ec 0f 83 91 06 00 00 4c 89 eb <4d> 8b 2c 24 4d 8d 7c 24 08 4c 89 bc 24 08 01 00 00 49 83 fd ff 0f [21293257.611843] RSP: 002b:00007fc201000310 EFLAGS: 00010287 [21293257.618838] RAX: 00007fc201000418 RBX: 00007faeb9800000 RCX: 000000000000ee48 [21293257.626367] RDX: 0000000000000220 RSI: 00007fc2010002f0 RDI: 0000000000000000 [21293257.633996] RBP: 0000000000000001 R08: 000000002076bbc8 R09: 000000000000007c [21293257.642932] R10: 00aa35bae97266b1 R11: 00000000861c4aca R12: 00007faeb9400000 [21293257.651857] R13: 00007faeb9800000 R14: 00007faeb9400000 R15: 0000000000000000 [21293257.659422] FS: 000055d310f04480 GS: 0000000000000000 [21293710.595901] exe[483320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a30359db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20822000 [21294110.626789] potentially unexpected fatal signal 5. [21294110.632032] CPU: 2 PID: 417853 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21294110.643937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21294110.653591] RIP: 0033:0x7fffffffe062 [21294110.657651] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21294110.678207] RSP: 002b:000000c000615be8 EFLAGS: 00000297 [21294110.685210] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21294110.694152] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21294110.703067] RBP: 000000c000615c80 R08: 0000000000000000 R09: 0000000000000000 [21294110.711977] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000615c70 [21294110.720941] R13: 000000c00062a000 R14: 000000c000234e00 R15: 00000000000649fc [21294110.729798] FS: 0000000002206a10 GS: 0000000000000000 [21294503.400833] potentially unexpected fatal signal 5. [21294503.406070] CPU: 81 PID: 529619 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21294503.418044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21294503.427671] RIP: 0033:0x7fffffffe062 [21294503.431642] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21294503.450920] RSP: 002b:000000c0005e3b90 EFLAGS: 00000297 [21294503.456714] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21294503.464238] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055759a800000 [21294503.471757] RBP: 000000c0005e3c28 R08: 0000000000000000 R09: 0000000000000000 [21294503.479286] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e3c18 [21294503.486972] R13: 000000c0005edf50 R14: 000000c00045a700 R15: 0000000000072ce7 [21294503.494570] FS: 000000c000480098 GS: 0000000000000000 [21295046.625330] potentially unexpected fatal signal 11. [21295046.630644] CPU: 68 PID: 520918 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21295046.642672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21295046.652354] RIP: 0033:0x55ee9856cd97 [21295046.656369] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21295046.675619] RSP: 002b:00007fa654e1ec90 EFLAGS: 00010206 [21295046.682668] RAX: 00007fa654e1f500 RBX: 00007fa654e1f1f0 RCX: 0000000000000000 [21295046.691649] RDX: 00007fa654e1f370 RSI: 000055ee985ef3d8 RDI: 00007fa654e1f1f0 [21295046.699417] RBP: 00007fa654e1f2e0 R08: 0000000000000000 R09: 0000000000000000 [21295046.708364] R10: 0000000000001000 R11: 0000000000000293 R12: 000055ee985ef3d8 [21295046.717331] R13: 00007fa654e1f370 R14: 0000000000000000 R15: 00007fa654e1f1f0 [21295046.726281] FS: 000055ee99202480 GS: 0000000000000000 [21295156.939174] exe[500460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b44f712ab9 cs:33 sp:7f921add3858 ax:0 si:55b44f76c062 di:ffffffffff600000 [21295742.474851] exe[643744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55746edd0ab9 cs:33 sp:7f20f0a67858 ax:0 si:55746ee2a070 di:ffffffffff600000 [21295838.810944] exe[644693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f021134ab9 cs:33 sp:7f7802e65858 ax:0 si:55f02118e062 di:ffffffffff600000 [21295838.942157] exe[619242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4f63b8ab9 cs:33 sp:7faec67d5858 ax:0 si:55c4f6412062 di:ffffffffff600000 [21295839.107114] exe[625302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a122b57ab9 cs:33 sp:7f408ff2b858 ax:0 si:55a122bb1062 di:ffffffffff600000 [21295839.271871] exe[624901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4f63b8ab9 cs:33 sp:7faec67d5858 ax:0 si:55c4f6412062 di:ffffffffff600000 [21295979.038971] exe[732299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654c5d86237 cs:33 sp:7eb9bd525ef8 ax:2f700000 si:5654c5df42f7 di:ffffffffff600000 [21295993.249729] exe[626973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a0834ab9 cs:33 sp:7ec05acf0858 ax:0 si:5571a088e062 di:ffffffffff600000 [21295993.698640] exe[626972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559263225ab9 cs:33 sp:7ef61b53a858 ax:0 si:55926327f062 di:ffffffffff600000 [21295993.897366] exe[620629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a0834ab9 cs:33 sp:7ec05acf0858 ax:0 si:5571a088e062 di:ffffffffff600000 [21295994.110992] exe[656363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a0834ab9 cs:33 sp:7ec05acf0858 ax:0 si:5571a088e062 di:ffffffffff600000 [21296065.587229] exe[731626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b948c0bab9 cs:33 sp:7f9e7ae2c858 ax:0 si:55b948c65062 di:ffffffffff600000 [21296065.728025] exe[731387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e47aa2ab9 cs:33 sp:7fd7c10f6858 ax:0 si:557e47afc062 di:ffffffffff600000 [21296065.817434] exe[731611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f97c7ab9 cs:33 sp:7fea44e8e858 ax:0 si:5556f9821062 di:ffffffffff600000 [21296065.946497] exe[732810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dff7396ab9 cs:33 sp:7fd985be4858 ax:0 si:55dff73f0062 di:ffffffffff600000 [21298005.877756] exe[756532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caea295ab9 cs:33 sp:7fb3db67a858 ax:0 si:55caea2ef062 di:ffffffffff600000 [21298006.211019] exe[756742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564421521ab9 cs:33 sp:7f7a507b8858 ax:0 si:56442157b062 di:ffffffffff600000 [21298006.270679] exe[756888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caea295ab9 cs:33 sp:7fb3db67a858 ax:0 si:55caea2ef062 di:ffffffffff600000 [21298006.321714] exe[756893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565219e77ab9 cs:33 sp:7fe9e8ad5858 ax:0 si:565219ed1062 di:ffffffffff600000 [21298220.338480] exe[670075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563559d0dab9 cs:33 sp:7f7e0e7e4858 ax:0 si:563559d67062 di:ffffffffff600000 [21298220.414748] exe[740109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccb9d36ab9 cs:33 sp:7f26f9ea2858 ax:0 si:55ccb9d90062 di:ffffffffff600000 [21298220.519950] exe[699774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563559d0dab9 cs:33 sp:7f7e0e7e4858 ax:0 si:563559d67062 di:ffffffffff600000 [21298220.573026] exe[739998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf384d0ab9 cs:33 sp:7f73d957b858 ax:0 si:55cf3852a062 di:ffffffffff600000 [21298475.861389] exe[742973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef520c7237 cs:33 sp:7fe4a6d08ef8 ax:2f700000 si:55ef521352f7 di:ffffffffff600000 [21298488.614309] exe[763576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db8b01e237 cs:33 sp:7ea209902ef8 ax:2f700000 si:55db8b08c2f7 di:ffffffffff600000 [21298491.393994] exe[751705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bdf39d237 cs:33 sp:7f127733cef8 ax:2f700000 si:559bdf40b2f7 di:ffffffffff600000 [21298538.624768] exe[749608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab7f65237 cs:33 sp:7f4e08929ef8 ax:2f700000 si:563ab7fd32f7 di:ffffffffff600000 [21298811.283640] exe[764726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5a997237 cs:33 sp:7ebe724e7ef8 ax:2f700000 si:564b5aa052f7 di:ffffffffff600000 [21298888.740188] exe[766781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632aa399237 cs:33 sp:7f183dbb6ef8 ax:2f700000 si:5632aa4072f7 di:ffffffffff600000 [21298998.843963] exe[741191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e895f51237 cs:33 sp:7f9dfbef0ef8 ax:2f700000 si:55e895fbf2f7 di:ffffffffff600000 [21299059.288696] exe[756793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4b21c5237 cs:33 sp:7f0e49104ef8 ax:2f700000 si:55a4b22332f7 di:ffffffffff600000 [21299486.407045] potentially unexpected fatal signal 5. [21299486.412303] CPU: 63 PID: 736682 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21299486.424291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21299486.433936] RIP: 0033:0x7fffffffe062 [21299486.438031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21299486.457247] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21299486.462919] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21299486.471836] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21299486.480777] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21299486.489703] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21299486.498644] R13: 0000000002883b00 R14: 000000c0001bafc0 R15: 00000000000b0ef1 [21299486.507554] FS: 00000000054143c0 GS: 0000000000000000 [21299493.444206] exe[760639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f634bdab9 cs:33 sp:7f12b0ce2858 ax:0 si:560f63517070 di:ffffffffff600000 [21299493.812133] exe[763066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8bc9dcab9 cs:33 sp:7f0bfb478858 ax:0 si:55b8bca36070 di:ffffffffff600000 [21299493.816599] exe[779216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd94526ab9 cs:33 sp:7f89dea67858 ax:0 si:55dd94580070 di:ffffffffff600000 [21299493.819864] exe[760544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f634bdab9 cs:33 sp:7f12b0ce2858 ax:0 si:560f63517070 di:ffffffffff600000 [21299493.908801] exe[763057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e628a98ab9 cs:33 sp:7f190ff54858 ax:0 si:55e628af2070 di:ffffffffff600000 [21299493.952556] exe[762609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd94526ab9 cs:33 sp:7f89dea67858 ax:0 si:55dd94580070 di:ffffffffff600000 [21299494.052499] exe[761310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd94526ab9 cs:33 sp:7f89dea67858 ax:0 si:55dd94580070 di:ffffffffff600000 [21299494.082563] exe[762404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8bc9dcab9 cs:33 sp:7f0bfb478858 ax:0 si:55b8bca36070 di:ffffffffff600000 [21299777.839785] exe[782585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572c0476ab9 cs:33 sp:7fc2dce40858 ax:0 si:5572c04d0062 di:ffffffffff600000 [21299780.586862] exe[781273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7615f3ab9 cs:33 sp:7ff320bc6858 ax:0 si:55d76164d062 di:ffffffffff600000 [21299780.640212] exe[777012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ab85f6ab9 cs:33 sp:7fa951ecb858 ax:0 si:558ab8650062 di:ffffffffff600000 [21299780.718035] exe[783225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572c0476ab9 cs:33 sp:7fc2dce40858 ax:0 si:5572c04d0062 di:ffffffffff600000 [21300231.268919] exe[779242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55622202eab9 cs:33 sp:7fb4001fe858 ax:0 si:556222088062 di:ffffffffff600000 [21300231.337426] exe[776515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556be7635ab9 cs:33 sp:7f3a8f117858 ax:0 si:556be768f062 di:ffffffffff600000 [21300231.399321] exe[781385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c8e244ab9 cs:33 sp:7f73af139858 ax:0 si:557c8e29e062 di:ffffffffff600000 [21300231.485718] exe[771746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652fd4c6ab9 cs:33 sp:7f4a138ea858 ax:0 si:5652fd520062 di:ffffffffff600000 [21300343.572448] exe[763620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e9ba9ab9 cs:33 sp:7fe2a302a858 ax:0 si:5628e9c03062 di:ffffffffff600000 [21300523.183544] exe[774099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6704fbab9 cs:33 sp:7f927c0de858 ax:0 si:55a670555062 di:ffffffffff600000 [21300523.303799] exe[774037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6704fbab9 cs:33 sp:7f927c0de858 ax:0 si:55a670555062 di:ffffffffff600000 [21300523.407262] exe[773986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56500e828ab9 cs:33 sp:7f9953bfe858 ax:0 si:56500e882062 di:ffffffffff600000 [21300523.506124] exe[774013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6704fbab9 cs:33 sp:7f927c0de858 ax:0 si:55a670555062 di:ffffffffff600000 [21300650.184882] exe[791532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558547dd8ab9 cs:33 sp:7f0ca6725858 ax:0 si:558547e32062 di:ffffffffff600000 [21300726.869048] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e55b949ab9 cs:33 sp:7edc51c62858 ax:0 si:55e55b9a3062 di:ffffffffff600000 [21301000.046353] exe[785158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56125e33aab9 cs:33 sp:7ffbf7f2c858 ax:0 si:56125e394062 di:ffffffffff600000 [21301328.800672] exe[762075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558119a90ab9 cs:33 sp:7f0bd1629858 ax:0 si:558119aea070 di:ffffffffff600000 [21301449.495170] potentially unexpected fatal signal 5. [21301449.500415] CPU: 47 PID: 755918 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21301449.501728] potentially unexpected fatal signal 5. [21301449.512419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21301449.517654] CPU: 73 PID: 756499 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21301449.517656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21301449.517662] RIP: 0033:0x7fffffffe062 [21301449.517668] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21301449.517673] RSP: 002b:000000c00064bb90 EFLAGS: 00000297 [21301449.517685] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21301449.527400] RIP: 0033:0x7fffffffe062 [21301449.527404] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21301449.527405] RSP: 002b:000000c00064bb90 EFLAGS: 00000297 [21301449.527407] RAX: 00000000000c36b8 RBX: 0000000000000000 RCX: 00007fffffffe05a [21301449.527407] RDX: 0000000000000000 RSI: 000000c00064c000 RDI: 0000000000012f00 [21301449.527408] RBP: 000000c00064bc28 R08: 000000c00066c1f0 R09: 0000000000000000 [21301449.527408] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00064bc18 [21301449.527409] R13: 000000c000652150 R14: 000000c000182a80 R15: 00000000000b88c3 [21301449.527410] FS: 000000c000600098 GS: 0000000000000000 [21301449.667247] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21301449.676233] RBP: 000000c00064bc28 R08: 0000000000000000 R09: 0000000000000000 [21301449.685166] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00064bc18 [21301449.694081] R13: 000000c000652150 R14: 000000c000182a80 R15: 00000000000b88c3 [21301449.702995] FS: 000000c000600098 GS: 0000000000000000 [21301678.916474] exe[766100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627dc795ab9 cs:33 sp:7eddecbf1858 ax:0 si:5627dc7ef062 di:ffffffffff600000 [21301679.099973] exe[791970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb786aab9 cs:33 sp:7ec174528858 ax:0 si:55cdb78c4062 di:ffffffffff600000 [21301679.542877] exe[771950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627dc795ab9 cs:33 sp:7eddecbf1858 ax:0 si:5627dc7ef062 di:ffffffffff600000 [21301679.858685] exe[791970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fc92ceab9 cs:33 sp:7eb73768d858 ax:0 si:557fc9328062 di:ffffffffff600000 [21301733.428688] exe[760544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559083518ab9 cs:33 sp:7f0007eb4858 ax:0 si:559083572062 di:ffffffffff600000 [21301936.124159] exe[781119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c440500ab9 cs:33 sp:7f7cec79c858 ax:0 si:55c44055a062 di:ffffffffff600000 [21301978.831032] exe[767228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56133ef9fab9 cs:33 sp:7f09bb777858 ax:0 si:56133eff9062 di:ffffffffff600000 [21302110.610713] exe[808768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3a42d237 cs:33 sp:7ff51daafef8 ax:2f700000 si:564d3a49b2f7 di:ffffffffff600000 [21302154.931971] exe[797013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556afc22dab9 cs:33 sp:7f2643227858 ax:0 si:556afc287062 di:ffffffffff600000 [21302355.319686] exe[805804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac10d5a237 cs:33 sp:7f2bfacb6ef8 ax:2f700000 si:55ac10dc82f7 di:ffffffffff600000 [21302381.445591] exe[801027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55792833e237 cs:33 sp:7f225b85eef8 ax:2f700000 si:5579283ac2f7 di:ffffffffff600000 [21302465.994431] exe[811519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e896d1237 cs:33 sp:7fb055bcbef8 ax:2f700000 si:555e8973f2f7 di:ffffffffff600000 [21302687.152476] exe[748309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561914f3ab9 cs:33 sp:7f3e5f42c858 ax:0 si:55619154d070 di:ffffffffff600000 [21302897.745223] potentially unexpected fatal signal 5. [21302897.750467] CPU: 65 PID: 832920 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21302897.762454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21302897.772089] RIP: 0033:0x7fffffffe062 [21302897.776067] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21302897.795265] RSP: 002b:000000c000757be8 EFLAGS: 00000297 [21302897.800931] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21302897.809879] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21302897.817439] RBP: 000000c000757c80 R08: 0000000000000000 R09: 0000000000000000 [21302897.825002] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000757c70 [21302897.832557] R13: 000000c000762000 R14: 000000c0004a1c00 R15: 00000000000be964 [21302897.841486] FS: 000000c00013b898 GS: 0000000000000000 [21303916.946967] exe[854837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1557e2237 cs:33 sp:7f6a1ebfeef8 ax:2f700000 si:55f1558502f7 di:ffffffffff600000 [21304085.383624] exe[819029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608ad97ab9 cs:33 sp:7ed91d92e858 ax:0 si:55608adf1062 di:ffffffffff600000 [21304223.694134] exe[836246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d52e816ab9 cs:33 sp:7ed74904b858 ax:0 si:55d52e870062 di:ffffffffff600000 [21304254.481754] exe[856097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7a1b6cab9 cs:33 sp:7f34287c5ef8 ax:0 si:20000040 di:ffffffffff600000 [21304254.620859] exe[857425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7a1b6cab9 cs:33 sp:7f34287c5ef8 ax:0 si:20000040 di:ffffffffff600000 [21304254.652576] exe[856124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7a1b6cab9 cs:33 sp:7f34287c5ef8 ax:0 si:20000040 di:ffffffffff600000 [21304377.614831] potentially unexpected fatal signal 11. [21304377.620192] CPU: 17 PID: 820274 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21304377.632184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21304377.641804] RIP: 0033:0x55e17d99ddd3 [21304377.645778] Code: Unable to access opcode bytes at RIP 0x55e17d99dda9. [21304377.652730] RSP: 002b:00007fb5cecc0438 EFLAGS: 00010246 [21304377.658397] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055e17d99ddd3 [21304377.665946] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [21304377.673522] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21304377.681072] R10: 000055e17e5ff750 R11: 0000000000000246 R12: 0000000000000001 [21304377.690014] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21304377.697555] FS: 000055e17e5ff480 GS: 0000000000000000 [21304615.193788] exe[861630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dedfe50237 cs:33 sp:7ed1f25bdef8 ax:2f700000 si:55dedfebe2f7 di:ffffffffff600000 [21304731.730271] exe[841369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae3c12bab9 cs:33 sp:7ec0b7986ef8 ax:0 si:20000700 di:ffffffffff600000 [21306143.636154] exe[883659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9ad4c8ab9 cs:33 sp:7fededd10858 ax:0 si:55a9ad522062 di:ffffffffff600000 [21306211.529079] exe[883522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563342b50ab9 cs:33 sp:7fe4e37fe858 ax:0 si:563342baa062 di:ffffffffff600000 [21306217.436134] exe[885595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a5dc6bab9 cs:33 sp:7f2cd55fe858 ax:0 si:563a5dcc5062 di:ffffffffff600000 [21307036.750623] exe[879863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0c5d43ab9 cs:33 sp:7ee6025b7ef8 ax:0 si:20000180 di:ffffffffff600000 [21308168.973108] exe[909317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099a83cab9 cs:33 sp:7fb8bb9ce858 ax:0 si:56099a896062 di:ffffffffff600000 [21308373.010327] exe[909944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56317c639ab9 cs:33 sp:7f126bb7c858 ax:0 si:56317c693097 di:ffffffffff600000 [21308373.146797] exe[913561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d826b22ab9 cs:33 sp:7fca7a7c0858 ax:0 si:55d826b7c097 di:ffffffffff600000 [21308373.153052] exe[903254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562651477ab9 cs:33 sp:7fe9455a0858 ax:0 si:5626514d1097 di:ffffffffff600000 [21308373.258532] exe[919450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56317c639ab9 cs:33 sp:7f126bb7c858 ax:0 si:56317c693097 di:ffffffffff600000 [21308373.362602] exe[919504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562651477ab9 cs:33 sp:7fe9455a0858 ax:0 si:5626514d1097 di:ffffffffff600000 [21308373.497370] exe[919430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56317c639ab9 cs:33 sp:7f126bb7c858 ax:0 si:56317c693097 di:ffffffffff600000 [21308373.641505] exe[919491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562651477ab9 cs:33 sp:7fe9455a0858 ax:0 si:5626514d1097 di:ffffffffff600000 [21308373.762968] exe[903209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d826b22ab9 cs:33 sp:7fca7a7c0858 ax:0 si:55d826b7c097 di:ffffffffff600000 [21308373.973103] exe[913232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562651477ab9 cs:33 sp:7fe9455a0858 ax:0 si:5626514d1097 di:ffffffffff600000 [21308374.130494] exe[902967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d826b22ab9 cs:33 sp:7fca7a7c0858 ax:0 si:55d826b7c062 di:ffffffffff600000 [21308638.562589] warn_bad_vsyscall: 7 callbacks suppressed [21308638.562593] exe[893501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ffec0cab9 cs:33 sp:7ff4d8e98858 ax:0 si:559ffec66062 di:ffffffffff600000 [21308999.673981] potentially unexpected fatal signal 5. [21308999.679225] CPU: 45 PID: 930220 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21308999.691218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21308999.701482] RIP: 0033:0x7fffffffe062 [21308999.705476] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21308999.724667] RSP: 002b:000000c000631b90 EFLAGS: 00000297 [21308999.730372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21308999.739312] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055a202e00000 [21308999.748236] RBP: 000000c000631c28 R08: 0000000000000000 R09: 0000000000000000 [21308999.757257] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000631c18 [21308999.766293] R13: 000000c000331f20 R14: 000000c00047ea80 R15: 00000000000d9ef6 [21308999.775322] FS: 000000c000180098 GS: 0000000000000000 [21309038.430352] exe[931592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8228ec237 cs:33 sp:7fbb4f10cef8 ax:2f700000 si:55f82295a2f7 di:ffffffffff600000 [21309329.435776] exe[918394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c17ea5dab9 cs:33 sp:7fe407793858 ax:0 si:55c17eab7062 di:ffffffffff600000 [21309497.529116] potentially unexpected fatal signal 5. [21309497.534364] CPU: 42 PID: 892456 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21309497.546351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21309497.556178] RIP: 0033:0x7fffffffe062 [21309497.560161] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21309497.579355] RSP: 002b:000000c000769be8 EFLAGS: 00000297 [21309497.585017] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21309497.592570] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21309497.600094] RBP: 000000c000769c80 R08: 0000000000000000 R09: 0000000000000000 [21309497.609029] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000769c70 [21309497.616598] R13: 000000c000647000 R14: 000000c000476700 R15: 00000000000d6f2a [21309497.625547] FS: 000000c00013b898 GS: 0000000000000000 [21309502.205696] exe[919714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c4faeab9 cs:33 sp:7f9e449c9858 ax:0 si:5650c5008062 di:ffffffffff600000 [21309502.329324] exe[906609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618e627bab9 cs:33 sp:7f92b0aa9858 ax:0 si:5618e62d5062 di:ffffffffff600000 [21309536.531367] exe[912479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efa17beab9 cs:33 sp:7ea8eb3f9858 ax:0 si:55efa1818062 di:ffffffffff600000 [21309536.605560] exe[913548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efa17beab9 cs:33 sp:7ea8eb3f9858 ax:0 si:55efa1818062 di:ffffffffff600000 [21309608.332936] exe[906956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c378822ab9 cs:33 sp:7f8760f42858 ax:0 si:55c37887c097 di:ffffffffff600000 [21309608.522138] exe[906956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c4faeab9 cs:33 sp:7f9e449c9858 ax:0 si:5650c5008097 di:ffffffffff600000 [21309608.563442] exe[906956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c4faeab9 cs:33 sp:7f9e44987858 ax:0 si:5650c5008097 di:ffffffffff600000 [21309777.127227] potentially unexpected fatal signal 5. [21309777.132448] CPU: 69 PID: 948420 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21309777.144443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21309777.154053] RIP: 0033:0x7fffffffe062 [21309777.158012] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21309777.177291] RSP: 002b:000000c00062fb90 EFLAGS: 00000297 [21309777.178845] potentially unexpected fatal signal 5. [21309777.182938] RAX: 000055712b1d4000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21309777.188160] CPU: 46 PID: 948656 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21309777.188162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21309777.188167] RIP: 0033:0x7fffffffe062 [21309777.188170] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21309777.188171] RSP: 002b:000000c00062fb90 EFLAGS: 00000297 [21309777.188172] RAX: 000055c6cc201000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21309777.188173] RDX: 0000000000000001 RSI: 0000000000054000 RDI: 000055c6cc201000 [21309777.188174] RBP: 000000c00062fc28 R08: 0000000000000009 R09: 000000000f86b000 [21309777.188174] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00062fc18 [21309777.188175] R13: 000000c000637f50 R14: 000000c000503500 R15: 00000000000e7386 [21309777.188176] FS: 0000000001f6c6b0 GS: 0000000000000000 [21309777.299262] RDX: 0000000000000003 RSI: 000000000002c000 RDI: 000055712b1d4000 [21309777.308267] RBP: 000000c00062fc28 R08: 0000000000000009 R09: 000000000f6c0000 [21309777.317188] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00062fc18 [21309777.326104] R13: 000000c000637f50 R14: 000000c000503500 R15: 00000000000e7386 [21309777.335015] FS: 0000000001f6c6b0 GS: 0000000000000000 [21309812.842942] exe[952017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fb3a68237 cs:33 sp:7eb2622e9ef8 ax:2f700000 si:563fb3ad62f7 di:ffffffffff600000 [21309898.415862] exe[954295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b36848237 cs:33 sp:7f4d267d8ef8 ax:2f700000 si:560b368b62f7 di:ffffffffff600000 [21310862.800181] potentially unexpected fatal signal 5. [21310862.805521] CPU: 53 PID: 964304 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21310862.817754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21310862.827404] RIP: 0033:0x7fffffffe062 [21310862.831447] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21310862.852073] RSP: 002b:000000c0005cdb90 EFLAGS: 00000297 [21310862.857787] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21310862.866661] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21310862.874242] RBP: 000000c0005cdc28 R08: 0000000000000000 R09: 0000000000000000 [21310862.881820] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005cdc18 [21310862.889391] R13: 000000c0004f1e30 R14: 000000c0001a9340 R15: 00000000000e87f0 [21310862.896958] FS: 0000000001f6c6b0 GS: 0000000000000000 [21311277.303196] exe[984344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652fd2c0ab9 cs:33 sp:7ef48069cef8 ax:0 si:20000080 di:ffffffffff600000 [21311352.769305] exe[934958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bc28f1ab9 cs:33 sp:7f5a2ae42ef8 ax:0 si:20000040 di:ffffffffff600000 [21311924.656350] exe[955979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f47dfaa237 cs:33 sp:7eaaa3b18ef8 ax:2f700000 si:55f47e0182f7 di:ffffffffff600000 [21313430.050014] exe[970138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e3f6aeab9 cs:33 sp:7ea70a492858 ax:0 si:564e3f708097 di:ffffffffff600000 [21314160.402879] exe[923821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556915212ab9 cs:33 sp:7ed53fcb3858 ax:0 si:55691526c097 di:ffffffffff600000 [21314161.033933] exe[919333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556915212ab9 cs:33 sp:7ed53fcb3858 ax:0 si:55691526c097 di:ffffffffff600000 [21314425.634816] exe[999788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556762e62ab9 cs:33 sp:7edd4fffe858 ax:0 si:556762ebc062 di:ffffffffff600000 [21314997.808048] exe[44391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5470aa237 cs:33 sp:7f6d57105ef8 ax:2f700000 si:55c5471182f7 di:ffffffffff600000 [21315169.163928] exe[27068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55956d2c7ab9 cs:33 sp:7f8701fb8ef8 ax:0 si:20002dc0 di:ffffffffff600000 [21315617.706542] potentially unexpected fatal signal 11. [21315617.711857] CPU: 67 PID: 44673 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21315617.723768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21315617.733406] RIP: 0033:0x55bd176d9e48 [21315617.737399] Code: 8b 54 15 10 48 39 15 d7 e8 c4 00 0f 82 c6 01 00 00 4c 8b 80 78 04 00 00 49 39 d6 48 8b 0c 24 4c 0f 42 f2 48 8b b0 70 04 00 00 <66> 0f 6f 05 20 81 06 00 4c 89 c2 48 c1 e2 04 4c 8d 5e 01 48 01 ca [21315617.756713] RSP: 002b:00007fc1c307e170 EFLAGS: 00010246 [21315617.763711] RAX: 000055bd177d30c0 RBX: 000055bd183307f0 RCX: 000055bd183307f0 [21315617.771518] RDX: 0000000000000000 RSI: 0000000000000148 RDI: 0000000000000001 [21315617.780466] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [21315617.789405] R10: 0000000000021000 R11: 0000000000000010 R12: 0000000000000001 [21315617.796960] R13: 000055bd18328b60 R14: 0000000000000000 R15: 0000000000000001 [21315617.804507] FS: 000055bd1832f480 GS: 0000000000000000 [21315665.995736] potentially unexpected fatal signal 5. [21315666.000966] CPU: 63 PID: 30415 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21315666.012861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21315666.022507] RIP: 0033:0x7fffffffe062 [21315666.026528] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21315666.045747] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21315666.051509] RAX: 000056077da40000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21315666.059063] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000056077da40000 [21315666.066596] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000003dfa000 [21315666.075517] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21315666.083047] R13: 000000c000143008 R14: 000000c0001b8a80 R15: 0000000000005aac [21315666.091968] FS: 00007f74c549e6c0 GS: 0000000000000000 [21315732.343618] exe[10901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a2afd8ab9 cs:33 sp:7f73b3baa858 ax:0 si:564a2b032062 di:ffffffffff600000 [21315790.104014] potentially unexpected fatal signal 11. [21315790.109324] CPU: 7 PID: 81350 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21315790.121156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21315790.130842] RIP: 0033:0x55e35daf1a93 [21315790.134870] Code: 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 48 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 <48> c7 05 22 55 10 00 00 00 00 00 4c 8d 0d 7b 08 c6 00 0f 11 05 04 [21315790.154068] RSP: 002b:00007f0492883440 EFLAGS: 00010202 [21315790.159734] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055e35daf1e0d [21315790.167378] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055e35e753760 [21315790.176297] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21315790.183873] R10: 000055e35e753750 R11: 0000000000000246 R12: 0000000000000000 [21315790.192816] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21315790.201777] FS: 000055e35e753480 GS: 0000000000000000 [21315923.500384] exe[88696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2e9f4ab9 cs:33 sp:7ff4b4f0d858 ax:0 si:559d2ea4e062 di:ffffffffff600000 [21316227.807030] exe[22365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56406b4f5ab9 cs:33 sp:7f2ec757c858 ax:0 si:56406b54f062 di:ffffffffff600000 [21316254.231201] exe[23082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56271cfdf237 cs:33 sp:7ea47d4d8ef8 ax:2f700000 si:56271d04d2f7 di:ffffffffff600000 [21316439.185328] exe[95351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54f20ab9 cs:33 sp:7efb75ee0858 ax:0 si:55ec54f7a097 di:ffffffffff600000 [21316439.290620] exe[95349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54f20ab9 cs:33 sp:7efb75ee0858 ax:0 si:55ec54f7a097 di:ffffffffff600000 [21317012.034586] exe[70834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558986422ab9 cs:33 sp:7eec61fb7858 ax:0 si:55898647c062 di:ffffffffff600000 [21317335.775201] potentially unexpected fatal signal 5. [21317335.780418] CPU: 62 PID: 120181 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21317335.792397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21317335.802061] RIP: 0033:0x7fffffffe062 [21317335.806059] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21317335.825359] RSP: 002b:000000c000541be8 EFLAGS: 00000297 [21317335.832378] RAX: 000000000001eb26 RBX: 0000000000000000 RCX: 00007fffffffe05a [21317335.839902] RDX: 0000000000000000 RSI: 000000c000542000 RDI: 0000000000012f00 [21317335.847450] RBP: 000000c000541c80 R08: 000000c0054494b0 R09: 0000000000000000 [21317335.854999] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000541c70 [21317335.863905] R13: 000000c000772000 R14: 000000c000285dc0 R15: 0000000000006c96 [21317335.871443] FS: 000000c00013b098 GS: 0000000000000000 [21317517.814891] exe[89666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eb40c4ab9 cs:33 sp:7ffadfcae858 ax:0 si:556eb411e062 di:ffffffffff600000 [21318386.179879] exe[131839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccd212bab9 cs:33 sp:7f38fb1f8858 ax:0 si:55ccd2185097 di:ffffffffff600000 [21318477.152623] exe[141803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a852b67237 cs:33 sp:7ea6209acef8 ax:2f700000 si:55a852bd52f7 di:ffffffffff600000 [21318560.743688] exe[138708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeb9898ab9 cs:33 sp:7fb4155fe858 ax:0 si:55eeb98f2062 di:ffffffffff600000 [21318610.153037] exe[149309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b046702ab9 cs:33 sp:7f666b589858 ax:0 si:55b04675c062 di:ffffffffff600000 [21318636.909777] exe[118799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c600b2fab9 cs:33 sp:7ee9768b8858 ax:0 si:55c600b89062 di:ffffffffff600000 [21318703.966105] exe[152631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce491a0ab9 cs:33 sp:7fa273873858 ax:0 si:55ce491fa062 di:ffffffffff600000 [21319239.948713] exe[105203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609b2ff6ab9 cs:33 sp:7f541c98e858 ax:0 si:5609b3050062 di:ffffffffff600000 [21319281.805771] exe[88252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e72c90ab9 cs:33 sp:7f731ca30858 ax:0 si:563e72cea062 di:ffffffffff600000 [21319282.840203] exe[160827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e7be0ab9 cs:33 sp:7ef8bdd7a858 ax:0 si:5619e7c3a062 di:ffffffffff600000 [21319282.968957] exe[133459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591000dbab9 cs:33 sp:7ee96eb6f858 ax:0 si:559100135062 di:ffffffffff600000 [21319289.257276] exe[129673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b938aa7ab9 cs:33 sp:7fd79c1fe858 ax:0 si:55b938b01062 di:ffffffffff600000 [21319300.226959] exe[163820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b90e0b2ab9 cs:33 sp:7f1ffb1fe858 ax:0 si:55b90e10c062 di:ffffffffff600000 [21319489.282484] exe[165274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0b21deab9 cs:33 sp:7fc21525f858 ax:0 si:55c0b2238062 di:ffffffffff600000 [21319737.625655] exe[133262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec03f13ab9 cs:33 sp:7eae3fccc858 ax:0 si:55ec03f6d062 di:ffffffffff600000 [21320246.900234] exe[179234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633287f8ab9 cs:33 sp:7f3104a5f858 ax:0 si:563328852062 di:ffffffffff600000 [21320247.060997] exe[169058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560816d00ab9 cs:33 sp:7fc4e6892858 ax:0 si:560816d5a062 di:ffffffffff600000 [21320384.716538] exe[175749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc9e42eab9 cs:33 sp:7f2e18591858 ax:0 si:55dc9e488097 di:ffffffffff600000 [21320385.091786] exe[175749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc9e42eab9 cs:33 sp:7f2e18591858 ax:0 si:55dc9e488097 di:ffffffffff600000 [21320461.621591] potentially unexpected fatal signal 11. [21320461.627149] CPU: 74 PID: 182851 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21320461.639133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21320461.648761] RIP: 0033:0x5644d7fbc0e9 [21320461.652797] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21320461.672179] RSP: 002b:00007f6cef8c9448 EFLAGS: 00010213 [21320461.677840] RAX: 0000000000000016 RBX: 00005644d80063b9 RCX: 00005644d7fbc0d7 [21320461.686776] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f6cef8ca5c0 [21320461.694417] RBP: 00007f6cef8ca59c R08: 00000000093526fc R09: 0000000000000928 [21320461.703461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cef8ca5c0 [21320461.712468] R13: 00005644d80063b9 R14: 0000000000120618 R15: 000000000000000c [21320461.721916] FS: 00005644d8c19480 GS: 0000000000000000 [21321276.097133] potentially unexpected fatal signal 11. [21321276.102451] CPU: 6 PID: 202989 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21321276.114355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21321276.124090] RIP: 0033:0x56184a38e1ef [21321276.128085] Code: 00 00 00 e9 33 0c 05 00 0f 1f 00 e9 3b f8 ff ff 0f 1f 00 81 fa 00 01 00 00 74 d6 8b 57 10 83 e2 7f 83 fa 01 0f 85 92 00 00 00 <64> 8b 04 25 d0 02 00 00 39 47 08 75 30 8b 47 04 83 f8 ff 0f 84 bc [21321276.147356] RSP: 002b:00007f58d717a150 EFLAGS: 00010246 [21321276.154357] RAX: 0000000000000000 RBX: 000056184b0177f0 RCX: 000056184b0177d0 [21321276.163303] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000056184a4b9f20 [21321276.170901] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [21321276.178485] R10: 0000000000021000 R11: 0000000000000010 R12: 00007f58d717a470 [21321276.187417] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [21321276.196357] FS: 000056184b016480 GS: 0000000000000000 [21321864.229070] exe[221053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca62fa0ab9 cs:33 sp:7f0ad3232858 ax:0 si:55ca62ffa062 di:ffffffffff600000 [21322182.496781] potentially unexpected fatal signal 5. [21322182.502005] CPU: 82 PID: 223976 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21322182.513982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21322182.523671] RIP: 0033:0x7fffffffe062 [21322182.527679] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21322182.548253] RSP: 002b:000000c000605b90 EFLAGS: 00000297 [21322182.553899] RAX: 000055d88df1c000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21322182.561473] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 000055d88df1c000 [21322182.569039] RBP: 000000c000605c28 R08: 0000000000000009 R09: 0000000007015000 [21322182.577982] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000605c18 [21322182.586892] R13: 000000c0005fff50 R14: 000000c0001d68c0 R15: 000000000003651f [21322182.595813] FS: 000000c00013b098 GS: 0000000000000000 [21322779.065086] exe[242435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbc849d237 cs:33 sp:7ef61d3d8ef8 ax:2f700000 si:55cbc850b2f7 di:ffffffffff600000 [21323097.483598] exe[241533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56176d2d9237 cs:33 sp:7f43b0c51ef8 ax:2f700000 si:56176d3472f7 di:ffffffffff600000 [21323097.670145] exe[252847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c33df8237 cs:33 sp:7f7c81e94ef8 ax:2f700000 si:557c33e662f7 di:ffffffffff600000 [21323576.631683] potentially unexpected fatal signal 5. [21323576.636933] CPU: 31 PID: 256818 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21323576.649164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21323576.658797] RIP: 0033:0x7fffffffe062 [21323576.662758] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21323576.681995] RSP: 002b:000000c000563b90 EFLAGS: 00000297 [21323576.687652] RAX: 0000562ce28de000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21323576.695258] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000562ce28de000 [21323576.704175] RBP: 000000c000563c28 R08: 0000000000000009 R09: 000000000b194000 [21323576.711742] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000563c18 [21323576.720665] R13: 000000c000608150 R14: 000000c0001b2540 R15: 000000000003c13f [21323576.729599] FS: 000000c00013b098 GS: 0000000000000000 [21325035.229741] exe[297066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4acc12db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21325111.608799] exe[288618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e9cb23ab9 cs:33 sp:7f16245a1858 ax:0 si:561e9cb7d062 di:ffffffffff600000 [21325259.238759] potentially unexpected fatal signal 5. [21325259.243971] CPU: 3 PID: 273724 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21325259.255904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21325259.265556] RIP: 0033:0x7fffffffe062 [21325259.269552] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21325259.288780] RSP: 002b:000000c00054db90 EFLAGS: 00000297 [21325259.294432] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21325259.303351] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21325259.312259] RBP: 000000c00054dc28 R08: 0000000000000000 R09: 0000000000000000 [21325259.321169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00054dc18 [21325259.330077] R13: 000000c000555f50 R14: 000000c00046d6c0 R15: 0000000000042c44 [21325259.337645] FS: 0000000001f6c6b0 GS: 0000000000000000 [21326462.884090] potentially unexpected fatal signal 5. [21326462.889367] CPU: 0 PID: 304224 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21326462.901384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21326462.911055] RIP: 0033:0x7fffffffe062 [21326462.915109] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21326462.934499] RSP: 002b:000000c0006b5b90 EFLAGS: 00000297 [21326462.941531] RAX: 000000000004dc9a RBX: 0000000000000000 RCX: 00007fffffffe05a [21326462.950586] RDX: 0000000000000000 RSI: 000000c0006b6000 RDI: 0000000000012f00 [21326462.959496] RBP: 000000c0006b5c28 R08: 000000c000c04b50 R09: 0000000000000000 [21326462.968409] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006b5c18 [21326462.975934] R13: 000000c0006c4b10 R14: 000000c000582380 R15: 000000000004a28b [21326462.983625] FS: 000000c00013a898 GS: 0000000000000000 [21326758.314907] potentially unexpected fatal signal 5. [21326758.320152] CPU: 91 PID: 321927 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21326758.332253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21326758.341884] RIP: 0033:0x7fffffffe062 [21326758.345984] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21326758.365256] RSP: 002b:000000c000649b90 EFLAGS: 00000297 [21326758.370880] RAX: 000055fd4634e000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21326758.378489] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055fd4634e000 [21326758.386025] RBP: 000000c000649c28 R08: 0000000000000009 R09: 000000000609a000 [21326758.394995] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000649c18 [21326758.403941] R13: 000000c00064e030 R14: 000000c000481dc0 R15: 000000000003e16d [21326758.411493] FS: 000000c000180898 GS: 0000000000000000 [21326758.525848] potentially unexpected fatal signal 5. [21326758.532088] CPU: 33 PID: 302781 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21326758.545064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21326758.556149] RIP: 0033:0x7fffffffe062 [21326758.561535] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21326758.582136] RSP: 002b:000000c000649b90 EFLAGS: 00000297 [21326758.589145] RAX: 000055fd45697000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21326758.598094] RDX: 0000000000000005 RSI: 00000000000a3000 RDI: 000055fd45697000 [21326758.607098] RBP: 000000c000649c28 R08: 0000000000000020 R09: 0000000000025000 [21326758.616031] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000649c18 [21326758.624983] R13: 000000c00064e030 R14: 000000c000481dc0 R15: 000000000003e16d [21326758.633928] FS: 000000c000180898 GS: 0000000000000000 [21327399.125410] exe[321426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632a5356ab9 cs:33 sp:7f758fe48858 ax:0 si:5632a53b0062 di:ffffffffff600000 [21328158.824160] potentially unexpected fatal signal 5. [21328158.829400] CPU: 49 PID: 365275 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21328158.841376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21328158.851013] RIP: 0033:0x7fffffffe062 [21328158.855024] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21328158.874306] RSP: 002b:000000c000657b90 EFLAGS: 00000297 [21328158.879967] RAX: 00005604a8800000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21328158.887520] RDX: 0000000000000001 RSI: 000000000005b000 RDI: 00005604a8800000 [21328158.896443] RBP: 000000c000657c28 R08: 0000000000000009 R09: 0000000019486000 [21328158.905383] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000657c18 [21328158.914313] R13: 000000c0007084b0 R14: 000000c000267500 R15: 0000000000058b85 [21328158.923281] FS: 000000c000180098 GS: 0000000000000000 [21328706.163234] exe[389852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55631c76d237 cs:33 sp:7f2ca64cfef8 ax:2f700000 si:55631c7db2f7 di:ffffffffff600000 [21328756.520871] exe[370598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56426d90cab9 cs:33 sp:7fb44cc3a858 ax:0 si:56426d966062 di:ffffffffff600000 [21328775.687938] exe[381585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bd3794237 cs:33 sp:7f938f447ef8 ax:2f700000 si:555bd38022f7 di:ffffffffff600000 [21328796.766630] exe[390699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bd3794237 cs:33 sp:7f938f447ef8 ax:2f700000 si:555bd38022f7 di:ffffffffff600000 [21329693.720215] exe[395424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ead773db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329693.934390] exe[372352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329693.981342] exe[377161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ead773db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329694.017163] exe[392924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ead773db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329694.123137] exe[392116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329694.314717] exe[403457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329694.857517] exe[391248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329695.017774] exe[392924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55700d6ecdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329695.166054] exe[403972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329695.306611] exe[395429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329702.928060] warn_bad_vsyscall: 17 callbacks suppressed [21329702.928063] exe[375223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ead773db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329703.112113] exe[383294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329703.709010] exe[395390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55700d6ecdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329703.917347] exe[396795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329703.987965] exe[391255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329713.246641] exe[371246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b377630db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329713.417171] exe[404650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329748.446901] exe[391186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55700d6ecdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329748.641963] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329759.516685] exe[372350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329759.673973] exe[372350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55700d6ecdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329759.724021] exe[390804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55700d6ecdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329812.042795] exe[404090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329812.223911] exe[403972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bcb4c1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329838.262329] exe[396053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556499394db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329838.423983] exe[376033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329838.471319] exe[374380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cd6ceddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329861.212139] exe[383239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bcb4c1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329861.425485] exe[383121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601c1bbbdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329931.786450] exe[383175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601c1bbbdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1346000 [21329932.078647] exe[395442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1346000 [21329940.439501] exe[368870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329940.603250] exe[378282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329953.925008] exe[378304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c462f58db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329954.089805] exe[371430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329954.142530] exe[374437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329994.170872] exe[383279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c462f58db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329994.376325] exe[391205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21329994.467865] exe[383182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330006.451145] exe[374403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330006.582016] exe[383197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c462f58db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330010.297154] exe[386127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330010.462495] exe[392152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330010.515117] exe[396368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55637120ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330023.531416] exe[376028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330023.802056] exe[379256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330026.555355] exe[405711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330026.765157] exe[405701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330028.478861] exe[405704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330028.826256] exe[396818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330028.854548] exe[377562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330029.097967] exe[392170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330029.343821] exe[396636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330032.887936] exe[378304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330033.081056] exe[396655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330045.376982] exe[392248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330045.548373] exe[371125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330061.518144] exe[405706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330061.816362] exe[368938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1836adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330068.867284] exe[372381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330069.015876] exe[375069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330087.825309] exe[395482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330087.978876] exe[403972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330098.668167] exe[396147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330098.838188] exe[395495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330098.891281] exe[392173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330139.202234] exe[377169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330139.405739] exe[383234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330140.860393] exe[376033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.183625] exe[388291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.616258] exe[391812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.837336] exe[372275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.860379] exe[379620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.877329] exe[396592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.885685] exe[372275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330141.918826] exe[383888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330156.243060] warn_bad_vsyscall: 60 callbacks suppressed [21330156.243064] exe[389802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55993d51edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21330156.502785] exe[391266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21330159.120141] exe[409992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330159.186023] exe[410024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330159.307829] exe[389218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330159.386728] exe[391280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.450407] exe[391184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.696966] exe[390790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.721483] exe[400204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.739302] exe[376813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.755369] exe[390794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.775466] exe[368900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.798233] exe[376251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.817267] exe[378291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.838012] exe[403910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330161.854197] exe[405425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330174.752785] warn_bad_vsyscall: 26 callbacks suppressed [21330174.752789] exe[383888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330174.926781] exe[387781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330175.213574] exe[371125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330175.382053] exe[396226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330196.492124] exe[396632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330196.751989] exe[380378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629c46abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.619794] exe[390790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.639732] exe[396431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.849369] exe[389808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.890768] exe[406009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.916774] exe[391193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.928869] exe[396169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330214.990423] exe[389233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330215.257236] exe[396120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330224.542109] exe[392139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330224.791308] exe[411286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330231.497435] exe[391290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330231.686037] exe[391176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602948abdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330240.467243] exe[387466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330240.701563] exe[391232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56282eed4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330240.778981] exe[391806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56282eed4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330246.713049] exe[387813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330246.736352] exe[383145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330246.887523] exe[389898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330246.908439] exe[383806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330248.627583] exe[396636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330248.857607] exe[383316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330248.967433] exe[389794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330252.518929] exe[395482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f0c83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330252.829849] exe[377048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330252.950092] exe[376026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330254.950533] exe[396349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330255.264374] exe[368879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8026cddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330260.640051] exe[384075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56282eed4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330260.834009] exe[376254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330260.905593] exe[389790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330287.496714] exe[376664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee1b83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330287.781476] exe[401964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.608180] exe[396585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.652994] exe[396634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.802767] exe[375963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee1b83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.849952] exe[410491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee1b83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.887862] exe[383805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee1b83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330301.930347] exe[405593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee1b83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330320.602279] exe[390564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330320.796062] exe[383251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330333.363245] exe[389809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbf9753db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330333.578094] exe[374006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330333.819863] exe[411880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330333.893849] exe[380400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330334.310493] exe[392290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330337.985894] exe[376810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330338.185268] exe[383859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330338.266738] exe[390126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330357.860344] exe[395471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ed1c1ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330359.571320] exe[390796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330360.171201] exe[371246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330360.316807] exe[411312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ed1c1ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330360.367819] exe[411419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ed1c1ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330366.633767] exe[375961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ed1c1ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330366.817367] exe[371589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330366.940716] exe[411980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330367.021342] exe[386129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330367.133512] exe[395433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330367.532994] exe[411702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330382.978401] exe[402968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564860515db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330392.627021] exe[392400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f8f9d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330392.814838] exe[371589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ed1c1ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330411.140629] exe[382983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611d1523db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330415.787499] exe[404724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56210f3d2db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330415.884928] exe[395979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df0fcbdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330437.662367] exe[390538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330437.883494] exe[390536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b882bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330447.377986] exe[375970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b882bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330447.587981] exe[411983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330453.907573] exe[371125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330454.322633] exe[411143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4ba83db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330514.385030] exe[390560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330514.608416] exe[368880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b882bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330515.416450] exe[410302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556881d9ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330531.682438] exe[383251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56330e391db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330531.890132] exe[411115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5f956db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330554.343895] exe[373614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560090519db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330598.478001] exe[411614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b882bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330598.621676] exe[411957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5f956db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330602.877653] exe[391026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e510310db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330617.102959] exe[396785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b2e2adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330617.365446] exe[411387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5f956db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330624.416625] exe[394400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5f956db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330624.630945] exe[372419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b2e2adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330747.523790] exe[391176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330747.645383] exe[389812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efcd1f4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.423111] exe[392293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b2e2adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.616693] exe[389184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.655011] exe[378291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.688152] exe[375998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.700641] exe[411145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.738524] exe[403467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.757811] exe[411395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.779430] exe[383237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.794316] exe[411395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330766.832097] exe[411151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330783.731916] warn_bad_vsyscall: 24 callbacks suppressed [21330783.731920] exe[411122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b2e2adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330784.086076] exe[395544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330811.659757] exe[396585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330812.010899] exe[396574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc9470cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330813.995960] exe[419226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbd6018db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330817.451248] exe[361852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654e84afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330823.429236] exe[396634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed19d56db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330823.626376] exe[396634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc9470cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330826.523178] exe[409752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc8e871db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330830.533405] exe[411130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330830.741934] exe[411574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed19d56db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330830.743155] exe[386129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed19d56db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330835.075361] exe[395433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70bef9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330835.359304] exe[376005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efcd1f4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330890.638912] exe[396766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632c332ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330952.347242] exe[391178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efcd1f4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330952.556444] exe[389831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56272a18bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330952.646229] exe[391122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56272a18bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330981.840142] exe[383191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56272a18bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330982.061996] exe[411620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330982.210805] exe[392122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21330982.459429] exe[392122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56272a18bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331008.540016] exe[394536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d009746db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331052.086036] exe[395450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331052.232869] exe[395450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331052.321468] exe[395440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331076.446626] exe[392264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56272a18bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331076.599655] exe[391434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331115.572515] exe[391009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ae8802237 cs:33 sp:7f0c6f8feef8 ax:2f700000 si:559ae88702f7 di:ffffffffff600000 [21331192.753718] exe[422025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560825719db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331201.287012] exe[375146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331201.534767] exe[396609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331208.340960] exe[377562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331208.491027] exe[378304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dda0ebadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331212.751650] exe[395391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331212.970995] exe[375182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dda0ebadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331214.263414] exe[396609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331214.395324] exe[420040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331214.427785] exe[377312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331215.212703] exe[375182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dda0ebadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331215.425295] exe[419944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.403611] exe[378297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.615589] exe[409988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.636380] exe[377159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.645684] exe[410033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.688428] exe[385152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.700637] exe[383163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.710795] exe[386854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.732799] exe[395458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.748302] exe[403922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331222.768392] exe[396053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ab2a4bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331241.552467] warn_bad_vsyscall: 47 callbacks suppressed [21331241.552471] exe[420381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612fb7b4ab9 cs:33 sp:7f625abed858 ax:0 si:5612fb80e062 di:ffffffffff600000 [21331324.999767] exe[383251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331325.157435] exe[383778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dda0ebadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331330.551816] exe[410487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331330.730789] exe[386137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331330.767591] exe[391153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331332.093051] exe[409988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331332.131199] exe[405697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331334.167585] exe[388113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331334.200815] exe[377466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331334.212468] exe[403929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331334.220363] exe[395545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331334.234087] exe[388113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331340.971933] warn_bad_vsyscall: 61 callbacks suppressed [21331340.971938] exe[378304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9ecfacdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331341.219808] exe[426157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331341.280648] exe[386132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea4fc6edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331416.787242] exe[386132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331416.992571] exe[388437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbf5798db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331417.039708] exe[388293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbf5798db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331463.035827] exe[368803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbf5798db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331463.242731] exe[426653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acf1adfdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331522.920203] exe[427184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331523.076474] exe[421804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331536.164993] exe[427216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331536.426840] exe[396944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331537.019488] exe[396564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331537.248911] exe[396216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331537.325282] exe[411214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331554.733766] exe[411214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331554.957775] exe[411318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331558.754676] exe[411220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331558.899070] exe[374657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331558.979595] exe[390801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb79a38db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331566.359163] exe[369900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3676e9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331566.625245] exe[391161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3676e9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331566.678546] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3676e9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331577.498420] exe[396592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331577.734350] exe[377488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331577.793387] exe[383819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331580.878417] exe[395401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331581.051600] exe[376254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331589.530066] exe[404120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d65f367db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331589.737295] exe[375216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331591.473424] exe[392139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331591.642400] exe[392162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331597.984528] exe[386850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804932cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331598.129994] exe[418271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fab9e67db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331598.162038] exe[374455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fab9e67db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331646.305400] exe[386829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d65f367db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331646.512089] exe[403887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331680.887397] exe[378304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331680.919154] exe[389207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331681.075486] exe[391452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331681.108220] exe[391128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331708.755460] exe[383769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331708.919361] exe[383819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561342ce5db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331749.900161] exe[411646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331750.096908] exe[430840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebff187db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331762.883406] exe[391113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557312bfdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331763.850631] exe[388203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331767.223205] exe[391138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557312bfdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331767.485391] exe[391198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557312bfdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331774.873285] exe[419237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560da2d8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331775.134974] exe[411616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dd67afdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21331856.179105] potentially unexpected fatal signal 11. [21331856.184425] CPU: 46 PID: 430197 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21331856.196405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21331856.206045] RIP: 0033:0x55e604790948 [21331856.207989] potentially unexpected fatal signal 5. [21331856.210090] Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 [21331856.216622] CPU: 86 PID: 430357 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21331856.216624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21331856.216628] RIP: 0033:0x7fffffffe062 [21331856.216631] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21331856.216632] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21331856.216633] RAX: 000055e604833000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21331856.216634] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 000055e604833000 [21331856.216635] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000001a165000 [21331856.216635] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21331856.216636] R13: 000000c000143008 R14: 000000c0004a0700 R15: 0000000000068e0c [21331856.216637] FS: 00007fc01fd9e6c0 GS: 0000000000000000 [21331856.340716] RSP: 002b:00007f95ef7ff440 EFLAGS: 00010202 [21331856.347792] RAX: 0000000000000725 RBX: 0000000000000000 RCX: 000055e604790dd3 [21331856.356715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [21331856.365620] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21331856.374576] R10: 000055e6053f2750 R11: 0000000000000246 R12: 0000000000000725 [21331856.383538] R13: ffffffffffffffb0 R14: 0000000000000002 R15: 0000000000000000 [21331856.392511] FS: 000055e6053f2480 GS: 0000000000000000 [21331962.432764] exe[427666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f942e3bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21332216.639312] potentially unexpected fatal signal 11. [21332216.644616] CPU: 70 PID: 451807 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21332216.656604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21332216.666221] RIP: 0033:0x55a9f07dce0f [21332216.670194] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [21332216.689382] RSP: 002b:00007f313be82438 EFLAGS: 00010246 [21332216.695014] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055a9f07dce0d [21332216.702594] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055a9f143e760 [21332216.711528] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21332216.720479] R10: 000055a9f143e750 R11: 0000000000000246 R12: 0000000000000001 [21332216.729399] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21332216.738324] FS: 000055a9f143e480 GS: 0000000000000000 [21332494.433576] exe[459777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f77386adb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20800000 [21332494.618019] exe[458182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575fce4edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20800000 [21332494.650401] exe[458139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575fce4edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20800000 [21333214.620740] exe[452553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562007291ab9 cs:33 sp:7f7f24c95ef8 ax:0 si:20000080 di:ffffffffff600000 [21333562.929125] exe[462700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5224bcab9 cs:33 sp:7f434fbeb858 ax:0 si:55f522516097 di:ffffffffff600000 [21333563.118175] exe[458863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d824e4ab9 cs:33 sp:7f7b969fe858 ax:0 si:561d8253e097 di:ffffffffff600000 [21333563.125113] exe[462807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d824e4ab9 cs:33 sp:7f7b969dd858 ax:0 si:561d8253e097 di:ffffffffff600000 [21333664.041049] potentially unexpected fatal signal 5. [21333664.046274] CPU: 61 PID: 467247 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21333664.058244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21333664.067880] RIP: 0033:0x7fffffffe062 [21333664.071869] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21333664.091043] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21333664.098047] RAX: 000055666297d000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21333664.107023] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 000055666297d000 [21333664.115915] RBP: 000000c000029c28 R08: 0000000000000009 R09: 0000000000003000 [21333664.124820] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000029c18 [21333664.133766] R13: 000000c00002eb10 R14: 000000c00017a540 R15: 00000000000703aa [21333664.142683] FS: 000000c000180898 GS: 0000000000000000 [21335008.241690] exe[498022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d834c9ab9 cs:33 sp:7f17a50e1858 ax:0 si:559d83523062 di:ffffffffff600000 [21335443.202187] exe[509300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f43d01ab9 cs:33 sp:7f3809a42858 ax:0 si:559f43d5b062 di:ffffffffff600000 [21335444.942947] potentially unexpected fatal signal 5. [21335444.948201] CPU: 27 PID: 511482 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21335444.960196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21335444.969807] RIP: 0033:0x7fffffffe062 [21335444.973786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21335444.993038] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21335444.998766] RAX: 00007f6402659000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21335445.007709] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f6402659000 [21335445.016648] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000105a0000 [21335445.025596] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21335445.034532] R13: 000000c000143008 R14: 000000c000591c00 R15: 000000000007c59b [21335445.043478] FS: 00007f657e39e6c0 GS: 0000000000000000 [21336499.672569] exe[537851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b634ffab9 cs:33 sp:7f6ad26c1858 ax:0 si:556b63559097 di:ffffffffff600000 [21336926.985574] exe[541199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55589a50fab9 cs:33 sp:7fb5f8192858 ax:0 si:55589a569097 di:ffffffffff600000 [21337479.566797] exe[540242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557834050ab9 cs:33 sp:7fd5d1c9e858 ax:0 si:5578340aa062 di:ffffffffff600000 [21337932.262267] exe[564936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558512ef0ab9 cs:33 sp:7f48cbff4858 ax:0 si:558512f4a062 di:ffffffffff600000 [21340283.935902] exe[451498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd0925ab9 cs:33 sp:7f34645f0ef8 ax:0 si:20004940 di:ffffffffff600000 [21340351.219000] potentially unexpected fatal signal 11. [21340351.224313] CPU: 3 PID: 611627 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21340351.236214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21340351.245848] RIP: 0033:0x55ae1227fa66 [21340351.249815] Code: ff 48 8d 35 6d 56 09 00 48 8b 94 24 c8 03 00 00 48 8d 3d 67 56 09 00 31 c0 e8 96 35 ff ff 66 0f 1f 44 00 00 48 89 fa 48 89 f8 <40> 88 3d 59 0c ca 00 48 d1 ea 80 25 4f 0c ca 00 01 83 e2 01 88 15 [21340351.269039] RSP: 002b:00007f44148fa538 EFLAGS: 00010287 [21340351.274683] RAX: 00000000000007c0 RBX: 00000000ffffffff RCX: 000055ae122c7a0d [21340351.282273] RDX: 00000000000007c0 RSI: 00007f44148fa5a0 RDI: 00000000000007c0 [21340351.289819] RBP: 00007f44148fa59c R08: 000000000000000a R09: 00007f44148fa287 [21340351.298747] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000032 [21340351.307677] R13: 000000000005f61e R14: 000000000005f5f1 R15: 0000000000000006 [21340351.316626] FS: 000055ae12f27480 GS: 0000000000000000 [21341052.771049] potentially unexpected fatal signal 5. [21341052.776286] CPU: 73 PID: 619335 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21341052.788272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21341052.797896] RIP: 0033:0x7fffffffe062 [21341052.801865] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21341052.821154] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21341052.826858] RAX: 00005615712db000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21341052.835771] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 00005615712db000 [21341052.844720] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000006cd0000 [21341052.853648] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21341052.862600] R13: 000000c000143808 R14: 000000c000183dc0 R15: 0000000000096feb [21341052.871481] FS: 00007f1c3899d6c0 GS: 0000000000000000 [21341337.981892] exe[630936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563047bc7ab9 cs:33 sp:7eff935ba858 ax:0 si:563047c21062 di:ffffffffff600000 [21341527.690251] exe[447277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557eab1f6ab9 cs:33 sp:7ff66eaf2858 ax:0 si:557eab250062 di:ffffffffff600000 [21341670.782283] exe[651214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558142259ab9 cs:33 sp:7ed22402d858 ax:0 si:5581422b3062 di:ffffffffff600000 [21341749.676968] exe[648746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570bf063ab9 cs:33 sp:7fe7017fe858 ax:0 si:5570bf0bd062 di:ffffffffff600000 [21342051.432341] exe[649353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618d7e15ab9 cs:33 sp:7facf76f3ef8 ax:0 si:20002440 di:ffffffffff600000 [21342135.376796] exe[663331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e813436ab9 cs:33 sp:7fca501c2858 ax:0 si:55e813490062 di:ffffffffff600000 [21342141.477132] exe[654813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6a4edcab9 cs:33 sp:7f3366627858 ax:0 si:55a6a4f36062 di:ffffffffff600000 [21342142.311179] exe[662964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f30a6ab9 cs:33 sp:7eb4a8a7d858 ax:0 si:5556f3100062 di:ffffffffff600000 [21342152.192878] exe[616953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561927553ab9 cs:33 sp:7ef9201c8858 ax:0 si:5619275ad062 di:ffffffffff600000 [21342153.703931] exe[660582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afcb312ab9 cs:33 sp:7fb8f6a3e858 ax:0 si:55afcb36c062 di:ffffffffff600000 [21342154.022892] exe[640646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560915e80ab9 cs:33 sp:7ead5d6eb858 ax:0 si:560915eda062 di:ffffffffff600000 [21342156.652855] exe[653081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970be9ab9 cs:33 sp:7efdb8c73858 ax:0 si:55c970c43062 di:ffffffffff600000 [21342236.905887] exe[652316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d800a7bab9 cs:33 sp:7f64cb621858 ax:0 si:55d800ad5062 di:ffffffffff600000 [21342278.306814] exe[616521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd94afdab9 cs:33 sp:7f1491cc8858 ax:0 si:55dd94b57062 di:ffffffffff600000 [21342279.646103] exe[644189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7ecf2bab9 cs:33 sp:7f9613236858 ax:0 si:55d7ecf85062 di:ffffffffff600000 [21342284.990711] exe[598963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559302e23ab9 cs:33 sp:7f58ec7dc858 ax:0 si:559302e7d062 di:ffffffffff600000 [21342366.804833] exe[622428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558b0e53ab9 cs:33 sp:7eab44e23858 ax:0 si:5558b0ead062 di:ffffffffff600000 [21342423.117353] exe[612997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b435d9ab9 cs:33 sp:7fb863f57858 ax:0 si:559b43633062 di:ffffffffff600000 [21342460.189534] exe[610293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578b6111ab9 cs:33 sp:7f7d3bea3858 ax:0 si:5578b616b062 di:ffffffffff600000 [21342465.224397] exe[666624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569778e1ab9 cs:33 sp:7f62bfc29858 ax:0 si:55697793b062 di:ffffffffff600000 [21342727.285361] exe[653239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576ec059ab9 cs:33 sp:7fc296723858 ax:0 si:5576ec0b3062 di:ffffffffff600000 [21342738.771149] exe[676026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556258f63ab9 cs:33 sp:7fe43a237858 ax:0 si:556258fbd097 di:ffffffffff600000 [21343300.975802] exe[637238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8d5069db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343308.666493] exe[667230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a80ea37db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343321.486702] exe[631637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d45b9d6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343330.076494] exe[670914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f6aa98db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343334.697483] exe[614791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd1be14db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343396.190268] exe[651122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0bd61bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343397.350378] exe[668531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccbe021db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343438.241320] exe[615270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55807b8bddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343441.467707] exe[639995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5499c1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343495.408828] exe[677595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564217ab6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343500.389117] exe[644679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a86f4ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343500.763052] exe[653059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae8e95edb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343522.583788] exe[675564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8ec9c4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343536.488697] exe[689620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c00e23ab9 cs:33 sp:7f68ad525858 ax:0 si:558c00e7d062 di:ffffffffff600000 [21343543.956628] exe[678694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa6bb5db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21343640.135629] exe[638777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e180eb4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21344004.497697] exe[691792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a98b87ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [21344083.578721] exe[635808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618db27d237 cs:33 sp:7fce2ee93ef8 ax:2f700000 si:5618db2eb2f7 di:ffffffffff600000 [21345341.711934] exe[713092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bd9412ab9 cs:33 sp:7f22393ee858 ax:0 si:556bd946c097 di:ffffffffff600000 [21346134.998368] exe[720787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f97a0ab9 cs:33 sp:7fb1ff6f1858 ax:0 si:55d8f97fa062 di:ffffffffff600000 [21346146.742996] exe[727099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca7c36f237 cs:33 sp:7fd0ed5feef8 ax:2f700000 si:55ca7c3dd2f7 di:ffffffffff600000 [21346146.844050] exe[718577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55880ec0f237 cs:33 sp:7f4a46b53ef8 ax:2f700000 si:55880ec7d2f7 di:ffffffffff600000 [21346146.846660] exe[718186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55880ec0f237 cs:33 sp:7f4a46b32ef8 ax:2f700000 si:55880ec7d2f7 di:ffffffffff600000 [21346147.486441] exe[734755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558443f156a2 cs:33 sp:7ffa5ab25f98 ax:7ffa5ab25fb0 si:ffffffffff600000 di:7ffa5ab25fb0 [21346638.708450] exe[736258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7278acab9 cs:33 sp:7eefa57f7858 ax:0 si:55c727906062 di:ffffffffff600000 [21346783.943126] exe[583997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f34e0d0ab9 cs:33 sp:7f39473af858 ax:0 si:55f34e12a062 di:ffffffffff600000 [21347142.015197] potentially unexpected fatal signal 5. [21347142.020418] CPU: 72 PID: 732148 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21347142.032398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21347142.042346] RIP: 0033:0x7fffffffe062 [21347142.047768] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21347142.068373] RSP: 002b:000000c0004bfb90 EFLAGS: 00000297 [21347142.075344] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21347142.084287] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21347142.093223] RBP: 000000c0004bfc28 R08: 0000000000000000 R09: 0000000000000000 [21347142.102249] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004bfc18 [21347142.111122] R13: 000000c0004c8b10 R14: 000000c00049e700 R15: 00000000000a8fca [21347142.120058] FS: 000000c000580098 GS: 0000000000000000 [21347142.121514] potentially unexpected fatal signal 5. [21347142.133625] CPU: 39 PID: 758250 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21347142.147010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21347142.158000] RIP: 0033:0x7fffffffe062 [21347142.163353] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21347142.183902] RSP: 002b:000000c0004bfb90 EFLAGS: 00000297 [21347142.190924] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21347142.199826] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21347142.208762] RBP: 000000c0004bfc28 R08: 0000000000000000 R09: 0000000000000000 [21347142.217714] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004bfc18 [21347142.226636] R13: 000000c0004c8b10 R14: 000000c00049e700 R15: 00000000000a8fca [21347142.235544] FS: 000000c000580098 GS: 0000000000000000 [21347421.431039] exe[718792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55badf8b9ab9 cs:33 sp:7f4ef907e858 ax:0 si:55badf913062 di:ffffffffff600000 [21347421.562533] exe[720301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56053b8aaab9 cs:33 sp:7f48f57fe858 ax:0 si:56053b904062 di:ffffffffff600000 [21347421.673272] exe[734822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56053b8aaab9 cs:33 sp:7f48f57fe858 ax:0 si:56053b904062 di:ffffffffff600000 [21347421.685262] exe[720226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55badf8b9ab9 cs:33 sp:7f4ef907e858 ax:0 si:55badf913062 di:ffffffffff600000 [21347421.698182] exe[734822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56053b8aaab9 cs:33 sp:7f48f57fe858 ax:0 si:56053b904062 di:ffffffffff600000 [21347421.777358] exe[720091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56053b8aaab9 cs:33 sp:7f48f57fe858 ax:0 si:56053b904062 di:ffffffffff600000 [21347421.882014] exe[720119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ae78e0ab9 cs:33 sp:7f548835a858 ax:0 si:558ae793a062 di:ffffffffff600000 [21347421.994009] exe[718249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c74e87ab9 cs:33 sp:7f6330639858 ax:0 si:564c74ee1062 di:ffffffffff600000 [21347422.092080] exe[719336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55badf8b9ab9 cs:33 sp:7f4ef907e858 ax:0 si:55badf913062 di:ffffffffff600000 [21347555.989918] exe[583959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559be1ae1ab9 cs:33 sp:7faa902e7858 ax:0 si:559be1b3b097 di:ffffffffff600000 [21347611.019581] exe[718689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b46c88ab9 cs:33 sp:7fe1bc16a858 ax:0 si:560b46ce2062 di:ffffffffff600000 [21347611.148780] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.168170] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.188071] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.208908] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.229695] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.250026] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.269797] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.290093] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347611.310051] exe[718381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2253cfab9 cs:33 sp:7f54d85fe858 ax:0 si:55d225429062 di:ffffffffff600000 [21347684.664129] warn_bad_vsyscall: 56 callbacks suppressed [21347684.664134] exe[733560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556938d9eab9 cs:33 sp:7f80c5bcf858 ax:0 si:556938df8062 di:ffffffffff600000 [21347684.753576] exe[720248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc909d7ab9 cs:33 sp:7f5fc09fe858 ax:0 si:55cc90a31062 di:ffffffffff600000 [21347851.746294] exe[764260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f252c3cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:284000 [21347851.824654] exe[764266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f252c3cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:284000 [21348621.446261] exe[794362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb157beab9 cs:33 sp:7ebbb1b45858 ax:0 si:55cb15818062 di:ffffffffff600000 [21349707.226616] potentially unexpected fatal signal 11. [21349707.231949] CPU: 3 PID: 735218 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21349707.243855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21349707.253486] RIP: 0033:0x5606ec73ed97 [21349707.257454] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21349707.276641] RSP: 002b:00007f8ce0a4ac90 EFLAGS: 00010206 [21349707.282300] RAX: 00007f8ce0a4b500 RBX: 00007f8ce0a4b1f0 RCX: 0000000000000000 [21349707.289939] RDX: 00007f8ce0a4b370 RSI: 00005606ec7c13d8 RDI: 00007f8ce0a4b1f0 [21349707.297519] RBP: 00007f8ce0a4b2e0 R08: 0000000000000000 R09: 0000000000000000 [21349707.306424] R10: 0000000000001000 R11: 0000000000000293 R12: 00005606ec7c13d8 [21349707.315345] R13: 00007f8ce0a4b370 R14: 0000000000000000 R15: 00007f8ce0a4b1f0 [21349707.324299] FS: 00005606ed3d4480 GS: 0000000000000000 [21350375.873616] exe[826872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a299c10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80100000 [21350476.954317] potentially unexpected fatal signal 5. [21350476.959688] CPU: 20 PID: 806208 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21350476.971665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21350476.981288] RIP: 0033:0x7fffffffe062 [21350476.985332] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21350477.005169] RSP: 002b:000000c000651b90 EFLAGS: 00000297 [21350477.010869] RAX: 000055a0bc646000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21350477.018432] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 000055a0bc646000 [21350477.025976] RBP: 000000c000651c28 R08: 0000000000000009 R09: 0000000017440000 [21350477.034930] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000651c18 [21350477.042497] R13: 000000c000331f50 R14: 000000c00016b340 R15: 00000000000c4756 [21350477.051459] FS: 0000000001f6c6b0 GS: 0000000000000000 [21350477.061703] potentially unexpected fatal signal 11. [21350477.067014] CPU: 59 PID: 806980 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21350477.079059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21350477.088713] RIP: 0033:0x558735dd665e [21350477.092705] Code: ff 0f 1f 00 8d 47 01 eb 16 0f 1f 00 48 83 c0 01 8b b4 85 5c 08 00 00 85 f6 0f 85 fd 00 00 00 89 c7 83 f8 04 75 e6 48 8b 4d 60 <48> 8b 41 08 48 83 e0 f8 48 39 85 88 08 00 00 0f 82 4a 02 00 00 48 [21350477.111994] RSP: 002b:00007f1d5d6922f0 EFLAGS: 00010246 [21350477.117633] RAX: 0000000000000004 RBX: 0000000000008040 RCX: 0000558736a5a7d0 [21350477.125181] RDX: 0000558735efce20 RSI: 0000000000000000 RDI: 0000000000000004 [21350477.132743] RBP: 0000558735efc660 R08: 000000001c9de85b R09: 0000000000000934 [21350477.140321] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [21350477.147885] R13: 0000000000000076 R14: 0000558735efc6c0 R15: 0000000000000000 [21350477.155464] FS: 0000558736a59480 GS: 0000000000000000 [21350522.528932] exe[775510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b5b850237 cs:33 sp:7fd358dfeef8 ax:2f700000 si:558b5b8be2f7 di:ffffffffff600000 [21350534.440196] exe[817904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f94a35237 cs:33 sp:7f0804d5cef8 ax:2f700000 si:557f94aa32f7 di:ffffffffff600000 [21350548.888919] exe[833259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562514bb9ab9 cs:33 sp:7f0b75faa858 ax:0 si:562514c13062 di:ffffffffff600000 [21350565.421441] exe[825575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575f7b96237 cs:33 sp:7edd722c8ef8 ax:2f700000 si:5575f7c042f7 di:ffffffffff600000 [21350572.437815] exe[813520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55babc0e6237 cs:33 sp:7fef5d9feef8 ax:2f700000 si:55babc1542f7 di:ffffffffff600000 [21350572.534996] exe[776395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f09ea237 cs:33 sp:7f9c579a3ef8 ax:2f700000 si:5633f0a582f7 di:ffffffffff600000 [21350573.210333] exe[835246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55585b4b8237 cs:33 sp:7ebb77afeef8 ax:2f700000 si:55585b5262f7 di:ffffffffff600000 [21350575.195694] exe[818115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594a3696237 cs:33 sp:7eab6b783ef8 ax:2f700000 si:5594a37042f7 di:ffffffffff600000 [21350575.709795] exe[835228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ce35b6237 cs:33 sp:7f5f224feef8 ax:2f700000 si:561ce36242f7 di:ffffffffff600000 [21350659.652579] exe[832790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3c3a39237 cs:33 sp:7fcf01496ef8 ax:2f700000 si:55d3c3aa72f7 di:ffffffffff600000 [21350728.070270] exe[763070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ffa220237 cs:33 sp:7f4493c55ef8 ax:2f700000 si:562ffa28e2f7 di:ffffffffff600000 [21350729.529917] exe[793151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ffa292237 cs:33 sp:7fdf3815eef8 ax:2f700000 si:559ffa3002f7 di:ffffffffff600000 [21350792.014622] exe[818785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc15270237 cs:33 sp:7fcece2d4ef8 ax:2f700000 si:55cc152de2f7 di:ffffffffff600000 [21350840.672985] exe[777183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b697502237 cs:33 sp:7eb3ad73aef8 ax:2f700000 si:55b6975702f7 di:ffffffffff600000 [21350881.494379] exe[837286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584433bc237 cs:33 sp:7f7820846ef8 ax:2f700000 si:55844342a2f7 di:ffffffffff600000 [21350957.890546] exe[803667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8512d7237 cs:33 sp:7f8e825b4ef8 ax:2f700000 si:55a8513452f7 di:ffffffffff600000 [21350958.194218] exe[838211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4bf626237 cs:33 sp:7f02c6433ef8 ax:2f700000 si:55d4bf6942f7 di:ffffffffff600000 [21351912.060449] potentially unexpected fatal signal 5. [21351912.065682] CPU: 76 PID: 785863 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21351912.077675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21351912.087297] RIP: 0033:0x7fffffffe062 [21351912.091272] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21351912.110446] RSP: 002b:000000c000665b90 EFLAGS: 00000297 [21351912.116089] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21351912.123646] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21351912.131191] RBP: 000000c000665c28 R08: 0000000000000000 R09: 0000000000000000 [21351912.138823] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000665c18 [21351912.147756] R13: 000000c0001a1950 R14: 000000c000164380 R15: 00000000000bfd26 [21351912.155354] FS: 000000c00013b098 GS: 0000000000000000 [21352858.464379] exe[887432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56297be60ab9 cs:33 sp:7eec73ce4858 ax:0 si:56297beba062 di:ffffffffff600000 [21354065.131801] potentially unexpected fatal signal 5. [21354065.137016] CPU: 5 PID: 894443 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21354065.148901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21354065.158520] RIP: 0033:0x7fffffffe062 [21354065.162474] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21354065.181684] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [21354065.187489] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21354065.196419] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21354065.205416] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [21354065.214322] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000031c18 [21354065.223252] R13: 000000c000168b10 R14: 000000c000166540 R15: 00000000000d9631 [21354065.232167] FS: 000000c000366098 GS: 0000000000000000 [21354522.385510] exe[906962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5b7f81ab9 cs:33 sp:7ff9562a9858 ax:0 si:55d5b7fdb062 di:ffffffffff600000 [21354718.912404] exe[912196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585b2940ab9 cs:33 sp:7fdecd7fe858 ax:0 si:5585b299a062 di:ffffffffff600000 [21354719.641867] exe[923074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621fdb06ab9 cs:33 sp:7f7dcda72858 ax:0 si:5621fdb60062 di:ffffffffff600000 [21354900.915004] exe[883914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555aaf017db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a1060000 [21355491.946427] exe[926036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622a6f07ab9 cs:33 sp:7edcf48a1858 ax:0 si:5622a6f61070 di:ffffffffff600000 [21355609.853715] exe[946324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c96900ab9 cs:33 sp:7f05d3152ef8 ax:0 si:20002340 di:ffffffffff600000 [21355807.483125] exe[923883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d041fd3ab9 cs:33 sp:7f785928b858 ax:0 si:55d04202d097 di:ffffffffff600000 [21355877.571807] exe[945132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c754d7ab9 cs:33 sp:7f360ed1e858 ax:0 si:563c75531070 di:ffffffffff600000 [21355947.993054] exe[950697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559908ecc237 cs:33 sp:7f1c4d0baef8 ax:2f700000 si:559908f3a2f7 di:ffffffffff600000 [21356348.735597] exe[933745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b6cf2ab9 cs:33 sp:7f291e74bef8 ax:0 si:20000140 di:ffffffffff600000 [21356534.445952] exe[942046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5341a4ab9 cs:33 sp:7f5484aca858 ax:0 si:55b5341fe097 di:ffffffffff600000 [21356562.197320] exe[943681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561da866e237 cs:33 sp:7f9f7e1e6ef8 ax:2f700000 si:561da86dc2f7 di:ffffffffff600000 [21356633.100760] exe[944811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f10670237 cs:33 sp:7f13a7cb1ef8 ax:2f700000 si:558f106de2f7 di:ffffffffff600000 [21356647.828550] exe[968092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b18a3237 cs:33 sp:7f9a1b0efef8 ax:2f700000 si:5573b19112f7 di:ffffffffff600000 [21356681.981935] exe[947536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608d089d237 cs:33 sp:7f6036ff8ef8 ax:2f700000 si:5608d090b2f7 di:ffffffffff600000 [21356691.657495] exe[963655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56546c828237 cs:33 sp:7f978daa4ef8 ax:2f700000 si:56546c8962f7 di:ffffffffff600000 [21356743.520088] exe[949412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559624ea3237 cs:33 sp:7fe5fb12eef8 ax:2f700000 si:559624f112f7 di:ffffffffff600000 [21356761.059775] exe[946001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ad6d5c237 cs:33 sp:7ecd90974ef8 ax:2f700000 si:559ad6dca2f7 di:ffffffffff600000 [21356762.125015] exe[941653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6a1782237 cs:33 sp:7f7a602acef8 ax:2f700000 si:55b6a17f02f7 di:ffffffffff600000 [21356767.138083] exe[970144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bf63eb237 cs:33 sp:7f3a3b9e3ef8 ax:2f700000 si:561bf64592f7 di:ffffffffff600000 [21356769.785850] exe[970419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604304f0237 cs:33 sp:7fb862d94ef8 ax:2f700000 si:56043055e2f7 di:ffffffffff600000 [21356770.729064] exe[926083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9c0ca8237 cs:33 sp:7eb66ebf6ef8 ax:2f700000 si:55e9c0d162f7 di:ffffffffff600000 [21356775.558253] exe[931263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a368526237 cs:33 sp:7ef96abfeef8 ax:2f700000 si:55a3685942f7 di:ffffffffff600000 [21356822.517168] exe[971651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b266717237 cs:33 sp:7f49519d9ef8 ax:2f700000 si:55b2667852f7 di:ffffffffff600000 [21356861.208625] exe[968199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3510bf237 cs:33 sp:7fe4ab02def8 ax:2f700000 si:55a35112d2f7 di:ffffffffff600000 [21356971.955055] exe[935859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55616cd36237 cs:33 sp:7f611f498ef8 ax:2f700000 si:55616cda42f7 di:ffffffffff600000 [21357067.295029] exe[976700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd2c67ab9 cs:33 sp:7ec8f29e4ef8 ax:0 si:20001c00 di:ffffffffff600000 [21357154.583708] potentially unexpected fatal signal 11. [21357154.589042] CPU: 5 PID: 973461 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21357154.600951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21357154.610589] RIP: 0033:0x56334f37da80 [21357154.614594] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21357154.633953] RSP: 002b:00007f7d89206440 EFLAGS: 00010246 [21357154.640989] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000056334f37de0d [21357154.649964] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000056334ffdf760 [21357154.658936] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21357154.667901] R10: 000056334ffdf750 R11: 0000000000000246 R12: 0000000000000000 [21357154.676836] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21357154.685752] FS: 000056334ffdf480 GS: 0000000000000000 [21357216.393962] potentially unexpected fatal signal 5. [21357216.399246] CPU: 54 PID: 986777 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21357216.411235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21357216.420868] RIP: 0033:0x7fffffffe062 [21357216.424844] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21357216.444129] RSP: 002b:000000c0005f9b90 EFLAGS: 00000297 [21357216.451124] RAX: 0000555a046a5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21357216.458687] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000555a046a5000 [21357216.466252] RBP: 000000c0005f9c28 R08: 0000000000000009 R09: 00000000041fd000 [21357216.475168] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005f9c18 [21357216.484116] R13: 000000c000631f50 R14: 000000c000164540 R15: 00000000000eddfc [21357216.493044] FS: 0000000001f6c6b0 GS: 0000000000000000 [21357537.224219] exe[990391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e75d32f237 cs:33 sp:7fdd30b3bef8 ax:2f700000 si:55e75d39d2f7 di:ffffffffff600000 [21358734.321441] exe[961016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f379caab9 cs:33 sp:7f68c9baeef8 ax:0 si:200000c0 di:ffffffffff600000 [21358880.373150] potentially unexpected fatal signal 5. [21358880.378383] CPU: 7 PID: 994570 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21358880.390271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21358880.399928] RIP: 0033:0x7fffffffe062 [21358880.403955] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21358880.423177] RSP: 002b:000000c000565b90 EFLAGS: 00000297 [21358880.430194] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21358880.439136] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21358880.448079] RBP: 000000c000565c28 R08: 0000000000000000 R09: 0000000000000000 [21358880.457023] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000565c18 [21358880.466023] R13: 000000c00055c270 R14: 000000c0001be540 R15: 00000000000f2557 [21358880.474994] FS: 000000c00013b098 GS: 0000000000000000 [21359380.170996] exe[19074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8ff957237 cs:33 sp:7f9a7795def8 ax:2f700000 si:55a8ff9c52f7 di:ffffffffff600000 [21359380.299353] exe[20303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55730e26f237 cs:33 sp:7f13b27d9ef8 ax:2f700000 si:55730e2dd2f7 di:ffffffffff600000 [21359525.213462] potentially unexpected fatal signal 11. [21359525.218772] CPU: 48 PID: 25000 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21359525.230657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21359525.240287] RIP: 0033:0x561747905fcf [21359525.244278] Code: 48 89 84 24 90 00 00 00 48 89 9c 24 98 00 00 00 4c 8b 35 c4 69 17 00 4d 8d ae 00 00 40 00 4d 39 ec 0f 83 91 06 00 00 4c 89 eb <4d> 8b 2c 24 4d 8d 7c 24 08 4c 89 bc 24 08 01 00 00 49 83 fd ff 0f [21359525.263681] RSP: 002b:00007f8a46d0b310 EFLAGS: 00010287 [21359525.269372] RAX: 00007f8a46d0b418 RBX: 00007f8d8d000000 RCX: 000000000023cff8 [21359525.278286] RDX: 00000000000003b5 RSI: 00007f8a46d0b2f0 RDI: 0000000000000000 [21359525.287291] RBP: 0000000000000001 R08: 000000003897ac83 R09: 0000000000001244 [21359525.296242] R10: 00aabd5610407b89 R11: 00000000861c4ac0 R12: 00007f8d8cc00000 [21359525.305228] R13: 00007f8d8d000000 R14: 00007f8d8cc00000 R15: 0000000000000000 [21359525.314173] FS: 00005617485ab480 GS: 0000000000000000 [21359529.012410] potentially unexpected fatal signal 5. [21359529.017653] CPU: 12 PID: 23795 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21359529.029602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21359529.039238] RIP: 0033:0x7fffffffe062 [21359529.043211] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21359529.062406] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21359529.068082] RAX: 00007fb8f346a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21359529.075612] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00007fb8f346a000 [21359529.083236] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000000002000 [21359529.092253] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21359529.101168] R13: 0000000002883b00 R14: 000000c00047da40 R15: 0000000000005883 [21359529.108706] FS: 0000000003aa63c0 GS: 0000000000000000 [21359650.608521] exe[32301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a0c23cab9 cs:33 sp:7fa06d73eef8 ax:0 si:20000040 di:ffffffffff600000 [21359650.722186] exe[27558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ce872ab9 cs:33 sp:7ffb6e24eef8 ax:0 si:20000040 di:ffffffffff600000 [21359650.759160] exe[15822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ce872ab9 cs:33 sp:7ffb6e24eef8 ax:0 si:20000040 di:ffffffffff600000 [21359853.443786] exe[23992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a22130cab9 cs:33 sp:7fd61ade9ef8 ax:0 si:20000080 di:ffffffffff600000 [21360031.194550] exe[19495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa70982ab9 cs:33 sp:7ec33891eef8 ax:0 si:20000380 di:ffffffffff600000 [21360068.393266] exe[35431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3e6bb3237 cs:33 sp:7f28bddfeef8 ax:2f700000 si:55f3e6c212f7 di:ffffffffff600000 [21360789.879795] exe[65341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b09330ab9 cs:33 sp:7f2af1dfe858 ax:0 si:560b0938a062 di:ffffffffff600000 [21361113.728789] potentially unexpected fatal signal 5. [21361113.734045] CPU: 22 PID: 37987 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21361113.745978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21361113.755634] RIP: 0033:0x7fffffffe062 [21361113.759683] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21361113.780224] RSP: 002b:000000c0005e7b90 EFLAGS: 00000297 [21361113.785851] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21361113.794870] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055f9c6a00000 [21361113.803791] RBP: 000000c0005e7c28 R08: 0000000000000000 R09: 0000000000000000 [21361113.811319] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e7c18 [21361113.820280] R13: 000000c0005f0b10 R14: 000000c0004ec700 R15: 0000000000006a84 [21361113.827833] FS: 0000000001f6c6b0 GS: 0000000000000000 [21361113.876035] potentially unexpected fatal signal 11. [21361113.881811] CPU: 69 PID: 38405 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21361113.895190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21361113.906223] RIP: 0033:0x55bfc11e2fcf [21361113.911614] Code: 48 89 84 24 90 00 00 00 48 89 9c 24 98 00 00 00 4c 8b 35 c4 69 17 00 4d 8d ae 00 00 40 00 4d 39 ec 0f 83 91 06 00 00 4c 89 eb <4d> 8b 2c 24 4d 8d 7c 24 08 4c 89 bc 24 08 01 00 00 49 83 fd ff 0f [21361113.932217] RSP: 002b:00007f2e9dc1f310 EFLAGS: 00010287 [21361113.939251] RAX: 00007f2e9dc1f418 RBX: 00007f6f86e00000 RCX: 00000000001a6da0 [21361113.948546] RDX: 0000000000000271 RSI: 00007f2e9dc1f2f0 RDI: 0000000000000000 [21361113.957451] RBP: 0000000000000001 R08: 000000002541a78e R09: 0000000000000d86 [21361113.966453] R10: 00aac09684d5b99d R11: 00000000861c4ad8 R12: 00007f6f86a00000 [21361113.975403] R13: 00007f6f86e00000 R14: 00007f6f86a00000 R15: 0000000000000000 [21361113.984377] FS: 000055bfc1e88480 GS: 0000000000000000 [21361871.326450] exe[93552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4aadc5ab9 cs:33 sp:7fed772d3858 ax:0 si:55c4aae1f097 di:ffffffffff600000 [21361871.595137] exe[92701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e80f8dab9 cs:33 sp:7ff4f975f858 ax:0 si:562e80fe7097 di:ffffffffff600000 [21361871.686628] exe[89775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e80f8dab9 cs:33 sp:7ff4f973e858 ax:0 si:562e80fe7097 di:ffffffffff600000 [21361939.101837] exe[97162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.179649] exe[97162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.238168] exe[97162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.258767] exe[97161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba2767f858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.301101] exe[97227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.401808] exe[89987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.476178] exe[97207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c86da0ab9 cs:33 sp:7ea2da8fa858 ax:0 si:564c86dfa062 di:ffffffffff600000 [21361939.536245] exe[88123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21361939.607853] exe[97207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c86da0ab9 cs:33 sp:7ea2da8fa858 ax:0 si:564c86dfa062 di:ffffffffff600000 [21361939.655108] exe[89987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88803eab9 cs:33 sp:7eba276a0858 ax:0 si:55e888098062 di:ffffffffff600000 [21362428.574192] warn_bad_vsyscall: 3 callbacks suppressed [21362428.574195] exe[67839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deead64ab9 cs:33 sp:7ff3bd991858 ax:0 si:55deeadbe062 di:ffffffffff600000 [21362428.802431] exe[93655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a19cdc3ab9 cs:33 sp:7f988e3a6858 ax:0 si:55a19ce1d062 di:ffffffffff600000 [21362428.840233] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846f08ab9 cs:33 sp:7f8523f5c858 ax:0 si:559846f62062 di:ffffffffff600000 [21362428.973228] exe[73610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a44a1ecab9 cs:33 sp:7fe87933d858 ax:0 si:55a44a246062 di:ffffffffff600000 [21362638.633714] exe[20424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d366c7bab9 cs:33 sp:7f03b8d40ef8 ax:0 si:20000040 di:ffffffffff600000 [21363018.837596] exe[65601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56193157fab9 cs:33 sp:7f0296f9b858 ax:0 si:5619315d9097 di:ffffffffff600000 [21363287.285750] exe[121072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55691d02c237 cs:33 sp:7f541d2ddef8 ax:2f700000 si:55691d09a2f7 di:ffffffffff600000 [21363366.893904] exe[126209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56553f545237 cs:33 sp:7ee215ce4ef8 ax:2f700000 si:56553f5b32f7 di:ffffffffff600000 [21363759.852517] exe[99057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3d8eeab9 cs:33 sp:7f6f58d2c858 ax:0 si:55fd3d948062 di:ffffffffff600000 [21363842.714740] exe[96690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558281899ab9 cs:33 sp:7f8bd2920858 ax:0 si:5582818f3062 di:ffffffffff600000 [21363956.402029] exe[104052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617d8e44ab9 cs:33 sp:7f9a88f59858 ax:0 si:5617d8e9e062 di:ffffffffff600000 [21364195.176639] exe[94344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c00e7bab9 cs:33 sp:7ff155f90858 ax:0 si:561c00ed5062 di:ffffffffff600000 [21364520.699018] exe[130580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e62c64237 cs:33 sp:7f6a6c86def8 ax:2f700000 si:560e62cd22f7 di:ffffffffff600000 [21364520.766574] exe[128428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.788336] exe[128428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.810306] exe[128428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.831767] exe[128437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.853797] exe[128437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.876908] exe[128432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.898766] exe[128432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.920301] exe[128432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364520.940857] exe[128432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563d343a237 cs:33 sp:7f30915ddef8 ax:2f700000 si:5563d34a82f7 di:ffffffffff600000 [21364743.523196] warn_bad_vsyscall: 24 callbacks suppressed [21364743.523201] exe[127784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651eda87ab9 cs:33 sp:7f68e6828ef8 ax:0 si:20000200 di:ffffffffff600000 [21364743.683371] exe[128316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74dadaab9 cs:33 sp:7f8b7df82ef8 ax:0 si:20000200 di:ffffffffff600000 [21364871.860992] potentially unexpected fatal signal 5. [21364871.866227] CPU: 63 PID: 136695 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21364871.878246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21364871.887930] RIP: 0033:0x7fffffffe062 [21364871.891985] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21364871.912539] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [21364871.919540] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21364871.928501] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000056503e400000 [21364871.937420] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [21364871.946332] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [21364871.953924] R13: 000000c0002a1f20 R14: 000000c0001da540 R15: 000000000001f1d8 [21364871.961488] FS: 000000c000180098 GS: 0000000000000000 [21365140.847763] potentially unexpected fatal signal 11. [21365140.853096] CPU: 84 PID: 164164 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21365140.865105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21365140.874741] RIP: 0033:0x55ae8bb0ea1f [21365140.878761] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21365140.897980] RSP: 002b:00007f7bf3919d78 EFLAGS: 00010283 [21365140.904972] RAX: 0000000000000390 RBX: 00007f7bf391a2e0 RCX: 0000000000000000 [21365140.912514] RDX: 00007f7bf391a460 RSI: 0000000000000025 RDI: 000055ae8bb6e390 [21365140.921464] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21365140.930441] R10: 0000000000000000 R11: 0000000000000246 R12: 000055ae8bb6e390 [21365140.939328] R13: 00007f7bf391a460 R14: 0000000000000000 R15: 00007f7bf391a2e0 [21365140.946871] FS: 000055ae8c780480 GS: 0000000000000000 [21365999.946987] exe[163007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564311ba1ab9 cs:33 sp:7fe032fe0858 ax:0 si:564311bfb070 di:ffffffffff600000 [21366000.161347] exe[162992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564311ba1ab9 cs:33 sp:7fe032fe0858 ax:0 si:564311bfb070 di:ffffffffff600000 [21366019.960333] exe[118362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cc283bab9 cs:33 sp:7f9f809e0858 ax:0 si:562cc2895070 di:ffffffffff600000 [21366020.329641] exe[118366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cc283bab9 cs:33 sp:7f9f809e0858 ax:0 si:562cc2895070 di:ffffffffff600000 [21366063.712825] exe[176171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557935906ab9 cs:33 sp:7f8579af8858 ax:0 si:557935960070 di:ffffffffff600000 [21366064.198832] exe[179245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6f359eab9 cs:33 sp:7f041693d858 ax:0 si:55c6f35f8070 di:ffffffffff600000 [21366123.627209] exe[157903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d0813ab9 cs:33 sp:7fc066998858 ax:0 si:5557d086d070 di:ffffffffff600000 [21366124.199641] exe[146198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f90818ab9 cs:33 sp:7f2e1c756858 ax:0 si:556f90872070 di:ffffffffff600000 [21366126.111640] exe[156435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585737cfab9 cs:33 sp:7fe485360858 ax:0 si:558573829070 di:ffffffffff600000 [21366126.130077] exe[157696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4697f9ab9 cs:33 sp:7f4b3094b858 ax:0 si:55f469853070 di:ffffffffff600000 [21366137.586392] exe[168326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caab32fab9 cs:33 sp:7ed3bc66e858 ax:0 si:55caab389070 di:ffffffffff600000 [21366138.566041] exe[168010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caab32fab9 cs:33 sp:7ed3bc66e858 ax:0 si:55caab389070 di:ffffffffff600000 [21366140.828871] exe[137969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ba693ab9 cs:33 sp:7f98fc2b8858 ax:0 si:5630ba6ed070 di:ffffffffff600000 [21366141.507149] exe[171656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ba693ab9 cs:33 sp:7f98fc2b8858 ax:0 si:5630ba6ed070 di:ffffffffff600000 [21366142.188706] exe[122442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abe0dbdab9 cs:33 sp:7eab2adc6858 ax:0 si:55abe0e17070 di:ffffffffff600000 [21366142.456928] exe[125563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559c7888ab9 cs:33 sp:7ef1dd9d8858 ax:0 si:5559c78e2070 di:ffffffffff600000 [21366168.117842] exe[122021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fde5855ab9 cs:33 sp:7f4aa458a858 ax:0 si:55fde58af070 di:ffffffffff600000 [21366168.169686] exe[154857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634cb82aab9 cs:33 sp:7f6cf40e4858 ax:0 si:5634cb884070 di:ffffffffff600000 [21366180.988158] exe[190459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab440fab9 cs:33 sp:7fb1f00bf858 ax:0 si:563ab4469070 di:ffffffffff600000 [21366181.006572] exe[193918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2eeb5ab9 cs:33 sp:7f4a523cb858 ax:0 si:564e2ef0f070 di:ffffffffff600000 [21366428.784188] exe[150774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624d52a4ab9 cs:33 sp:7f3124711858 ax:0 si:5624d52fe070 di:ffffffffff600000 [21366435.142364] exe[184966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d06474dab9 cs:33 sp:7f63d29fe858 ax:0 si:55d0647a7070 di:ffffffffff600000 [21366754.075065] exe[191850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dfe3eab9 cs:33 sp:7ed9bb1c5858 ax:0 si:5643dfe98070 di:ffffffffff600000 [21366759.696712] exe[201791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dfe3eab9 cs:33 sp:7ed9bb1c5858 ax:0 si:5643dfe98070 di:ffffffffff600000 [21367320.684362] exe[216070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abdc09bab9 cs:33 sp:7f72fdb33858 ax:0 si:55abdc0f5070 di:ffffffffff600000 [21367935.178671] exe[215393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9c98f8ab9 cs:33 sp:7fde1f24c858 ax:0 si:55a9c9952062 di:ffffffffff600000 [21368465.024143] potentially unexpected fatal signal 5. [21368465.029371] CPU: 56 PID: 222542 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21368465.041355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21368465.050988] RIP: 0033:0x7fffffffe062 [21368465.054986] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21368465.074426] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21368465.080065] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21368465.087617] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21368465.096549] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21368465.105563] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21368465.114671] R13: 000000c000331590 R14: 000000c00017ae00 R15: 000000000003588d [21368465.122241] FS: 0000000001f6c6b0 GS: 0000000000000000 [21368563.964725] exe[236054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556505632ab9 cs:33 sp:7eec0e952858 ax:0 si:55650568c070 di:ffffffffff600000 [21368564.052313] exe[237369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556505632ab9 cs:33 sp:7eec0e952858 ax:0 si:55650568c070 di:ffffffffff600000 [21368689.210003] exe[240931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c08f18ab9 cs:33 sp:7f6e33455ef8 ax:0 si:20000200 di:ffffffffff600000 [21369011.904929] exe[253192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562636d2aab9 cs:33 sp:7f6bf9069ef8 ax:0 si:20000ac0 di:ffffffffff600000 [21370147.450719] exe[260320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e7898eab9 cs:33 sp:7f689ea33858 ax:0 si:559e789e8070 di:ffffffffff600000 [21370148.117221] exe[261830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55959e81bab9 cs:33 sp:7f6674363858 ax:0 si:55959e875070 di:ffffffffff600000 [21370862.484910] potentially unexpected fatal signal 5. [21370862.490152] CPU: 38 PID: 269882 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21370862.502128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21370862.511793] RIP: 0033:0x7fffffffe062 [21370862.515835] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21370862.536418] RSP: 002b:000000c000621b90 EFLAGS: 00000297 [21370862.543449] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21370862.552400] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21370862.561334] RBP: 000000c000621c28 R08: 0000000000000000 R09: 0000000000000000 [21370862.570290] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000621c18 [21370862.579226] R13: 000000c000644ab0 R14: 000000c00052d340 R15: 0000000000041d9a [21370862.588169] FS: 000000c0004b4098 GS: 0000000000000000 [21372141.604922] exe[266467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eafd80237 cs:33 sp:7ef5955feef8 ax:2f700000 si:563eafdee2f7 di:ffffffffff600000 [21372211.432970] exe[297063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e97d11f237 cs:33 sp:7fcd557f9ef8 ax:2f700000 si:55e97d18d2f7 di:ffffffffff600000 [21372235.968621] exe[257730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a30c7eab9 cs:33 sp:7fec13171858 ax:0 si:563a30cd8070 di:ffffffffff600000 [21372237.798711] exe[306207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a76436ab9 cs:33 sp:7f9dbcb27858 ax:0 si:560a76490070 di:ffffffffff600000 [21372742.317312] exe[311316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563faaf84ab9 cs:33 sp:7f56e135b858 ax:0 si:563faafde062 di:ffffffffff600000 [21372870.487451] exe[300523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55578fa9aab9 cs:33 sp:7f6f9f5e1ef8 ax:0 si:20000080 di:ffffffffff600000 [21373079.256649] exe[339411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b387640ab9 cs:33 sp:7f93197ec858 ax:0 si:55b38769a070 di:ffffffffff600000 [21373081.315329] exe[339446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a699b23ab9 cs:33 sp:7fbf02988858 ax:0 si:55a699b7d070 di:ffffffffff600000 [21373091.118184] exe[315907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965714ab9 cs:33 sp:7f06d58e1858 ax:0 si:55d96576e062 di:ffffffffff600000 [21373091.253744] exe[317475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965714ab9 cs:33 sp:7f06d58c0858 ax:0 si:55d96576e062 di:ffffffffff600000 [21373091.253752] exe[315909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965714ab9 cs:33 sp:7f06d58e1858 ax:0 si:55d96576e062 di:ffffffffff600000 [21373583.630065] exe[325405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560e83a4ab9 cs:33 sp:7fc2711caef8 ax:0 si:200028c0 di:ffffffffff600000 [21375435.272018] exe[371268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da6b7f0ab9 cs:33 sp:7f80596ca858 ax:0 si:55da6b84a097 di:ffffffffff600000 [21376241.150158] potentially unexpected fatal signal 11. [21376241.155465] CPU: 33 PID: 384686 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21376241.167459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21376241.177130] RIP: 0033:0x7f9f679ab050 [21376241.181157] Code: Unable to access opcode bytes at RIP 0x7f9f679ab026. [21376241.188133] RSP: 002b:00007fffd34202d8 EFLAGS: 00010202 [21376241.195167] RAX: 00007f9f679ab050 RBX: 0000000000000003 RCX: 0000001b30020000 [21376241.204110] RDX: 0000001b30020004 RSI: 00007fffd34202f0 RDI: 0000000000000001 [21376241.213175] RBP: 0000000000000001 R08: 0000001b30060000 R09: 0000000000000000 [21376241.222091] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21376241.231068] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21376241.239989] FS: 000055b92dcc1480 GS: 0000000000000000 [21376411.332056] exe[393484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75e45c237 cs:33 sp:7fcbb0246ef8 ax:2f700000 si:55b75e4ca2f7 di:ffffffffff600000 [21376611.231783] exe[393193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be26522ab9 cs:33 sp:7fd4b0bc0858 ax:0 si:55be2657c070 di:ffffffffff600000 [21376611.387265] exe[391856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e0440ab9 cs:33 sp:7ff10529a858 ax:0 si:5634e049a070 di:ffffffffff600000 [21376611.417980] exe[401648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591f67aeab9 cs:33 sp:7f00261cc858 ax:0 si:5591f6808070 di:ffffffffff600000 [21376611.573160] exe[401654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56306e658ab9 cs:33 sp:7f275b4b2858 ax:0 si:56306e6b2070 di:ffffffffff600000 [21376611.710161] exe[405607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e0440ab9 cs:33 sp:7ff10529a858 ax:0 si:5634e049a070 di:ffffffffff600000 [21376611.864279] exe[401654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be26522ab9 cs:33 sp:7fd4b0bc0858 ax:0 si:55be2657c070 di:ffffffffff600000 [21376611.992846] exe[405674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e0440ab9 cs:33 sp:7ff10529a858 ax:0 si:5634e049a070 di:ffffffffff600000 [21376612.116117] exe[402874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56306e658ab9 cs:33 sp:7f275b4b2858 ax:0 si:56306e6b2070 di:ffffffffff600000 [21376647.171712] exe[404986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0faaa7db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f63ee47dfb0 [21376647.790608] exe[376001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cd3c8cdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fd13c900fb0 [21376650.516744] exe[378776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da05addb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f05ca6b4fb0 [21376691.591862] exe[381208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c069606db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f669bb71fb0 [21376692.477857] exe[368765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c03f3f3db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f429c446fb0 [21376692.527885] exe[409161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557407628db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f495057efb0 [21376693.681775] exe[397686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634cb328db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f895ea8afb0 [21376694.921455] exe[395882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3f523bdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7edae15f3fb0 [21376695.645519] exe[409447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0913f1db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fe37abfefb0 [21376697.715127] exe[352639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56369c2dddb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f8eb5126fb0 [21376700.716525] exe[405980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b9c173db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7eea6d0f8fb0 [21376704.288082] exe[312324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650e3409db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7eb9ea591fb0 [21376704.729724] exe[407931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf03625db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed7b0ef8fb0 [21376780.943161] potentially unexpected fatal signal 5. [21376780.948382] CPU: 61 PID: 408661 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21376780.960378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21376780.970029] RIP: 0033:0x7fffffffe062 [21376780.973999] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21376780.993214] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21376781.000244] RAX: 000055f40dcc0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21376781.007772] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 000055f40dcc0000 [21376781.015317] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000012915000 [21376781.022845] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21376781.031959] R13: 000000c000143808 R14: 000000c00033cfc0 R15: 00000000000631fd [21376781.039503] FS: 00007f1bad69d6c0 GS: 0000000000000000 [21376886.226747] exe[419227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bef552237 cs:33 sp:7eb595ab9ef8 ax:2f700000 si:560bef5c02f7 di:ffffffffff600000 [21376921.994411] exe[402518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b3fcedb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f659557ffb0 [21377135.835951] exe[424910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d79787db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2f45b1cfb0 [21377311.796085] exe[407977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d59422ab9 cs:33 sp:7fa339722858 ax:0 si:560d5947c097 di:ffffffffff600000 [21377475.319921] exe[378905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591f8cb3ab9 cs:33 sp:7f87ddff5858 ax:0 si:5591f8d0d070 di:ffffffffff600000 [21377480.820748] exe[372440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da317e1ab9 cs:33 sp:7fbf74db7858 ax:0 si:55da3183b070 di:ffffffffff600000 [21377482.995951] exe[398396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d64338aab9 cs:33 sp:7f0e644f9858 ax:0 si:55d6433e4070 di:ffffffffff600000 [21377641.977673] exe[387370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5c88c5ab9 cs:33 sp:7f9f1cb21858 ax:0 si:55c5c891f070 di:ffffffffff600000 [21377645.131601] exe[433570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f90222eab9 cs:33 sp:7f0f1c68a858 ax:0 si:55f902288070 di:ffffffffff600000 [21377653.760876] exe[440684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e35ab1bab9 cs:33 sp:7ebc2abd1858 ax:0 si:55e35ab75070 di:ffffffffff600000 [21377661.339975] exe[386080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576e163aab9 cs:33 sp:7f7800f60858 ax:0 si:5576e1694062 di:ffffffffff600000 [21377680.168854] exe[385156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ca650ab9 cs:33 sp:7ee92aa93858 ax:0 si:5616ca6aa070 di:ffffffffff600000 [21377686.780192] exe[444005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a6968ab9 cs:33 sp:7f0862c72858 ax:0 si:55b4a69c2070 di:ffffffffff600000 [21377689.632668] exe[443875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a39ddab9 cs:33 sp:7f70f0b01858 ax:0 si:55d6a3a37070 di:ffffffffff600000 [21377784.747937] exe[445739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559159380ab9 cs:33 sp:7f8e34e90858 ax:0 si:5591593da070 di:ffffffffff600000 [21377957.487657] exe[447477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbb871cab9 cs:33 sp:7f88bb434858 ax:0 si:55dbb8776070 di:ffffffffff600000 [21378031.356459] exe[450360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f553609ab9 cs:33 sp:7fdf7da3c858 ax:0 si:55f553663070 di:ffffffffff600000 [21378070.717109] exe[435220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3df385ab9 cs:33 sp:7eb4d39fe858 ax:0 si:55b3df3df070 di:ffffffffff600000 [21378320.151361] exe[387300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6db50a5d1 cs:33 sp:7f6957f9b4c8 ax:8 si:1 di:7f6957f9b5c0 [21378322.284516] exe[449394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1b449b5d1 cs:33 sp:7fc65f1304c8 ax:8 si:1 di:7fc65f1305c0 [21378451.603401] potentially unexpected fatal signal 11. [21378451.608715] CPU: 58 PID: 428101 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21378451.620718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21378451.630384] RIP: 0033:0x564de2739948 [21378451.634439] Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 [21378451.653629] RSP: 002b:00007f5abf59f440 EFLAGS: 00010206 [21378451.660643] RAX: 0000000000000412 RBX: 0000000000000000 RCX: 0000564de2739dd3 [21378451.668193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [21378451.677153] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21378451.686087] R10: 0000564de339b750 R11: 0000000000000246 R12: 0000000000000412 [21378451.695033] R13: ffffffffffffffb0 R14: 0000000000000002 R15: 0000000000000000 [21378451.703951] FS: 0000564de339b480 GS: 0000000000000000 [21378451.926778] potentially unexpected fatal signal 11. [21378451.932098] CPU: 51 PID: 422519 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21378451.944092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21378451.953743] RIP: 0033:0x564de2739a80 [21378451.957789] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21378451.978377] RSP: 002b:00007f5abf59f440 EFLAGS: 00010246 [21378451.985406] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000564de2739e0d [21378451.994331] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000564de339b760 [21378452.003269] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21378452.012199] R10: 0000564de339b750 R11: 0000000000000246 R12: 0000000000000000 [21378452.021121] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21378452.030050] FS: 0000564de339b480 GS: 0000000000000000 [21378597.856588] exe[402011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7dc594ab9 cs:33 sp:7f3f291fe858 ax:0 si:55e7dc5ee070 di:ffffffffff600000 [21378598.290747] exe[427688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a09750aab9 cs:33 sp:7f9454dfe858 ax:0 si:55a097564070 di:ffffffffff600000 [21378610.993550] exe[407289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97611aab9 cs:33 sp:7fc4b8b06ef8 ax:0 si:20002340 di:ffffffffff600000 [21378611.185198] exe[449017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564353b67ab9 cs:33 sp:7fe42cdc0ef8 ax:0 si:20002340 di:ffffffffff600000 [21379140.845005] exe[447597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.000585] exe[455979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.151040] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.366307] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.533101] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.651232] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.787482] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379141.910639] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379142.004039] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379142.167774] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1097 di:ffffffffff600000 [21379145.901017] warn_bad_vsyscall: 38 callbacks suppressed [21379145.901025] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379146.371378] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379146.477510] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379146.859711] exe[447597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379146.887984] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d671858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379147.001031] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379147.132493] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379147.144646] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379147.268768] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379147.388829] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d6b3858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379150.944237] warn_bad_vsyscall: 63 callbacks suppressed [21379150.944242] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379150.972198] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379150.992966] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.012561] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.033246] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.053767] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.073334] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.093589] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.113135] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379151.133385] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563652087ab9 cs:33 sp:7f822d692858 ax:0 si:5636520e1062 di:ffffffffff600000 [21379156.045407] warn_bad_vsyscall: 172 callbacks suppressed [21379156.045411] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.173605] exe[447579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.308742] exe[447579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b78858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.420524] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.822588] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.846359] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379156.931846] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379157.061066] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379157.196519] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b097 di:ffffffffff600000 [21379157.306795] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b097 di:ffffffffff600000 [21379161.120751] warn_bad_vsyscall: 57 callbacks suppressed [21379161.120755] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.247048] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b57858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.336327] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.422659] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b78858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.500343] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.598924] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.601980] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b78858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.710789] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.822339] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379161.841620] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379168.938305] warn_bad_vsyscall: 97 callbacks suppressed [21379168.938309] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b097 di:ffffffffff600000 [21379169.255868] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379177.991519] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379180.546048] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b062 di:ffffffffff600000 [21379185.248316] exe[455551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b097 di:ffffffffff600000 [21379185.983932] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be4a01ab9 cs:33 sp:7fe969b99858 ax:0 si:562be4a5b097 di:ffffffffff600000 [21379189.114563] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55564592cab9 cs:33 sp:7f484db4f858 ax:0 si:555645986097 di:ffffffffff600000 [21379198.351165] exe[447583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604e9502ab9 cs:33 sp:7f54c1cc7858 ax:0 si:5604e955c062 di:ffffffffff600000 [21379203.918895] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604e9502ab9 cs:33 sp:7f54c1cc7858 ax:0 si:5604e955c062 di:ffffffffff600000 [21379206.818571] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604e9502ab9 cs:33 sp:7f54c1cc7858 ax:0 si:5604e955c062 di:ffffffffff600000 [21379226.677866] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79097 di:ffffffffff600000 [21379233.540956] exe[455979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79062 di:ffffffffff600000 [21379236.361396] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79070 di:ffffffffff600000 [21379239.169240] exe[447679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79062 di:ffffffffff600000 [21379239.574949] exe[447679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79062 di:ffffffffff600000 [21379239.661193] exe[447590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79062 di:ffffffffff600000 [21379245.488330] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617ccc1fab9 cs:33 sp:7ff179a7c858 ax:0 si:5617ccc79062 di:ffffffffff600000 [21379254.593587] exe[455979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ead0d3ab9 cs:33 sp:7f415c297858 ax:0 si:560ead12d062 di:ffffffffff600000 [21379254.855090] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ead0d3ab9 cs:33 sp:7f415c297858 ax:0 si:560ead12d097 di:ffffffffff600000 [21379257.939764] exe[447679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ead0d3ab9 cs:33 sp:7f415c297858 ax:0 si:560ead12d062 di:ffffffffff600000 [21379262.633028] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7062 di:ffffffffff600000 [21379267.437539] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7062 di:ffffffffff600000 [21379270.392875] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7062 di:ffffffffff600000 [21379277.207508] exe[447590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7097 di:ffffffffff600000 [21379288.942358] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7062 di:ffffffffff600000 [21379297.602417] exe[447593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fb15dab9 cs:33 sp:7f33c4b1f858 ax:0 si:55b4fb1b7062 di:ffffffffff600000 [21379306.290757] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560cecf2ab9 cs:33 sp:7f76da8d0858 ax:0 si:5560ced4c062 di:ffffffffff600000 [21379307.578678] exe[447590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560cecf2ab9 cs:33 sp:7f76da8d0858 ax:0 si:5560ced4c062 di:ffffffffff600000 [21379314.497699] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560cecf2ab9 cs:33 sp:7f76da8d0858 ax:0 si:5560ced4c062 di:ffffffffff600000 [21379316.836454] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379319.922528] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379319.979986] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52097 di:ffffffffff600000 [21379325.609380] exe[447583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379332.704986] exe[447575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379336.019742] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379338.931367] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52062 di:ffffffffff600000 [21379339.777089] exe[447575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52097 di:ffffffffff600000 [21379341.229212] exe[447597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587debf8ab9 cs:33 sp:7efff87a2858 ax:0 si:5587dec52097 di:ffffffffff600000 [21379342.095186] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379344.490020] exe[447679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379347.720603] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379348.388533] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379349.693418] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379356.584820] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379365.839053] exe[447575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379376.304693] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379377.000234] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379378.824760] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379386.648179] exe[447583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379387.161843] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379388.303953] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379389.359197] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379392.812630] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379398.553564] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379404.076314] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379404.463453] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379406.619323] exe[455973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379412.745031] exe[447575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02062 di:ffffffffff600000 [21379420.546292] exe[447569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fb49a8ab9 cs:33 sp:7f4dd1bcb858 ax:0 si:560fb4a02097 di:ffffffffff600000 [21379424.520495] exe[447569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379424.981563] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379434.893470] exe[449036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379435.988149] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379440.502974] exe[447579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0097 di:ffffffffff600000 [21379440.783322] exe[447593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379443.916261] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379446.143301] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0097 di:ffffffffff600000 [21379449.120598] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0097 di:ffffffffff600000 [21379449.798334] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb0f076ab9 cs:33 sp:7f0fb3a33858 ax:0 si:55cb0f0d0062 di:ffffffffff600000 [21379450.883100] exe[447581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51097 di:ffffffffff600000 [21379468.398455] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379486.279935] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379495.575037] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379495.694050] exe[447584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379497.508936] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379501.256572] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379502.391168] exe[447593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379503.953441] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612edf7ab9 cs:33 sp:7f8e9282b858 ax:0 si:55612ee51062 di:ffffffffff600000 [21379506.864919] exe[447575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56108710fab9 cs:33 sp:7f320390b858 ax:0 si:561087169097 di:ffffffffff600000 [21379508.911583] exe[447569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56108710fab9 cs:33 sp:7f320390b858 ax:0 si:561087169097 di:ffffffffff600000 [21379510.278884] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56108710fab9 cs:33 sp:7f320390b858 ax:0 si:561087169062 di:ffffffffff600000 [21379519.781867] exe[447579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56108710fab9 cs:33 sp:7f320390b858 ax:0 si:561087169062 di:ffffffffff600000 [21379524.672087] exe[447581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4097 di:ffffffffff600000 [21379526.003248] exe[447579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4097 di:ffffffffff600000 [21379528.140072] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4062 di:ffffffffff600000 [21379536.118174] exe[447574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4062 di:ffffffffff600000 [21379539.793669] exe[448540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4062 di:ffffffffff600000 [21379544.987882] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4062 di:ffffffffff600000 [21379545.961972] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4097 di:ffffffffff600000 [21379552.042056] exe[447679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4062 di:ffffffffff600000 [21379553.044991] exe[447598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4070 di:ffffffffff600000 [21379553.172083] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633f935aab9 cs:33 sp:7f1bdff76858 ax:0 si:5633f93b4097 di:ffffffffff600000 [21379564.940613] potentially unexpected fatal signal 5. [21379564.945858] CPU: 74 PID: 484166 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21379564.957864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21379564.967488] RIP: 0033:0x7fffffffe062 [21379564.971448] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21379564.990657] RSP: 002b:000000c000527b90 EFLAGS: 00000297 [21379564.996339] RAX: 00007fe615f84000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21379565.005285] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fe615f84000 [21379565.014197] RBP: 000000c000527c28 R08: 0000000000000009 R09: 000000000c5a6000 [21379565.023126] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000527c18 [21379565.032050] R13: 000000c000548ab0 R14: 000000c000500e00 R15: 0000000000075904 [21379565.040988] FS: 0000000001f6c6b0 GS: 0000000000000000 [21379566.445392] exe[447598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c69759ab9 cs:33 sp:7fbe0bdfe858 ax:0 si:558c697b3062 di:ffffffffff600000 [21379568.520087] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c69759ab9 cs:33 sp:7fbe0bdfe858 ax:0 si:558c697b3062 di:ffffffffff600000 [21379571.984504] exe[447589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c69759ab9 cs:33 sp:7fbe0bdfe858 ax:0 si:558c697b3062 di:ffffffffff600000 [21379572.915756] exe[455551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c69759ab9 cs:33 sp:7fbe0bdfe858 ax:0 si:558c697b3097 di:ffffffffff600000 [21379576.625009] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c69759ab9 cs:33 sp:7fbe0bdfe858 ax:0 si:558c697b3062 di:ffffffffff600000 [21379587.132692] exe[447678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379587.329042] exe[455551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2097 di:ffffffffff600000 [21379591.083521] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379591.212801] exe[447654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379601.967192] exe[447587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379606.281361] exe[455979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379615.398734] exe[475683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379619.808255] exe[447571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379624.164336] exe[447581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379624.943480] exe[448530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21379630.641389] exe[447581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c321458ab9 cs:33 sp:7f9c3d305858 ax:0 si:55c3214b2062 di:ffffffffff600000 [21380843.722592] potentially unexpected fatal signal 11. [21380843.727936] CPU: 86 PID: 521331 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21380843.739909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21380843.749623] RIP: 0033:0x55cd2e737d97 [21380843.753612] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21380843.772817] RSP: 002b:00007fffdd101c90 EFLAGS: 00010206 [21380843.778509] RAX: 00007fffdd102500 RBX: 00007fffdd1021f0 RCX: 0000000000000000 [21380843.786069] RDX: 00007fffdd102370 RSI: 000055cd2e7ba3d8 RDI: 00007fffdd1021f0 [21380843.795107] RBP: 00007fffdd1022e0 R08: 0000000000000000 R09: 0000000000000000 [21380843.804124] R10: 0000000000001000 R11: 0000000000000293 R12: 000055cd2e7ba3d8 [21380843.813058] R13: 00007fffdd102370 R14: 0000000000000000 R15: 00007fffdd1021f0 [21380843.820590] FS: 000055cd2f3cd480 GS: 0000000000000000 [21381428.355028] exe[539718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d7f225ab9 cs:33 sp:7edf525af858 ax:0 si:561d7f27f062 di:ffffffffff600000 [21381428.431369] exe[539720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d7f225ab9 cs:33 sp:7edf525af858 ax:0 si:561d7f27f062 di:ffffffffff600000 [21381428.455621] exe[539688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d7f225ab9 cs:33 sp:7edf525af858 ax:0 si:561d7f27f062 di:ffffffffff600000 [21381713.990623] exe[546532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f11edab9 cs:33 sp:7ea276324858 ax:0 si:55f2f1247070 di:ffffffffff600000 [21381862.696427] exe[553694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563313522ab9 cs:33 sp:7ec9180ba858 ax:0 si:56331357c062 di:ffffffffff600000 [21382248.638391] exe[563403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2547deab9 cs:33 sp:7f2c6c827858 ax:0 si:55f254838097 di:ffffffffff600000 [21382679.482951] exe[552811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5964bdab9 cs:33 sp:7fda3f742858 ax:0 si:55f596517062 di:ffffffffff600000 [21382679.564005] exe[552692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55576db72ab9 cs:33 sp:7f7b303ef858 ax:0 si:55576dbcc062 di:ffffffffff600000 [21382679.629774] exe[560915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5964bdab9 cs:33 sp:7fda3f742858 ax:0 si:55f596517062 di:ffffffffff600000 [21382679.687692] exe[554217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55576db72ab9 cs:33 sp:7f7b303ef858 ax:0 si:55576dbcc062 di:ffffffffff600000 [21382679.793548] exe[555816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5964bdab9 cs:33 sp:7fda3f742858 ax:0 si:55f596517062 di:ffffffffff600000 [21382680.208204] exe[552832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56235871aab9 cs:33 sp:7f645e5f4858 ax:0 si:562358774062 di:ffffffffff600000 [21382680.237218] exe[548818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560996588ab9 cs:33 sp:7f313d388858 ax:0 si:5609965e2062 di:ffffffffff600000 [21382680.260203] exe[554215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560996588ab9 cs:33 sp:7f313d388858 ax:0 si:5609965e2062 di:ffffffffff600000 [21382680.277717] exe[565973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55576db72ab9 cs:33 sp:7f7b303ef858 ax:0 si:55576dbcc062 di:ffffffffff600000 [21382680.365752] exe[566005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560996588ab9 cs:33 sp:7f313d388858 ax:0 si:5609965e2062 di:ffffffffff600000 [21382881.256717] potentially unexpected fatal signal 5. [21382881.261936] CPU: 35 PID: 560145 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21382881.273958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21382881.283590] RIP: 0033:0x7fffffffe062 [21382881.287562] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21382881.306739] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21382881.312382] RAX: 0000556ab5d9f000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21382881.319901] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000556ab5d9f000 [21382881.327440] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000ee00000 [21382881.334973] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21382881.342540] R13: 000000c000143808 R14: 000000c000592700 R15: 00000000000885fb [21382881.350135] FS: 00007fc27a89c6c0 GS: 0000000000000000 [21383018.522637] exe[548054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdd7ededb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:900a000 [21383317.110899] potentially unexpected fatal signal 5. [21383317.116121] CPU: 45 PID: 498793 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21383317.128104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21383317.137734] RIP: 0033:0x7fffffffe062 [21383317.141750] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21383317.162339] RSP: 002b:000000c0006a7b90 EFLAGS: 00000297 [21383317.169376] RAX: 000000000008f76b RBX: 0000000000000000 RCX: 00007fffffffe05a [21383317.178317] RDX: 0000000000000000 RSI: 000000c0006a8000 RDI: 0000000000012f00 [21383317.187252] RBP: 000000c0006a7c28 R08: 000000c00061a4c0 R09: 0000000000000000 [21383317.196155] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006a7c18 [21383317.205115] R13: 000000c0006dcab0 R14: 000000c000503a40 R15: 0000000000079c45 [21383317.214066] FS: 000000c000180898 GS: 0000000000000000 [21383500.359230] exe[576772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9bfcfb237 cs:33 sp:7ff3f046aef8 ax:2f700000 si:55b9bfd692f7 di:ffffffffff600000 [21383605.655343] exe[526117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a2900ab9 cs:33 sp:7eef16efd858 ax:0 si:55b4a295a062 di:ffffffffff600000 [21383655.672803] exe[590668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d827c19ab9 cs:33 sp:7fd65d248858 ax:0 si:55d827c73062 di:ffffffffff600000 [21383935.818137] exe[601580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a2975bab9 cs:33 sp:7f3d55bf8858 ax:0 si:556a297b5062 di:ffffffffff600000 [21383957.949911] exe[599236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8bfb08ab9 cs:33 sp:7fec3449c858 ax:0 si:55a8bfb62062 di:ffffffffff600000 [21383970.239346] exe[570274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7964c5ab9 cs:33 sp:7f38478f4858 ax:0 si:55e79651f062 di:ffffffffff600000 [21384072.522156] exe[546975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588a2dd3ab9 cs:33 sp:7ed1cd1ad858 ax:0 si:5588a2e2d062 di:ffffffffff600000 [21384073.811415] exe[597998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e60bd43ab9 cs:33 sp:7f9410bfe858 ax:0 si:55e60bd9d062 di:ffffffffff600000 [21384078.110583] exe[583414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c88309ab9 cs:33 sp:7fce576df858 ax:0 si:557c88363062 di:ffffffffff600000 [21384125.015202] exe[607321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a191dfab9 cs:33 sp:7f2916128858 ax:0 si:556a19239062 di:ffffffffff600000 [21384260.203318] exe[574131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c860cdaab9 cs:33 sp:7f69e3359858 ax:0 si:55c860d34062 di:ffffffffff600000 [21384402.446501] exe[565412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594e9305ab9 cs:33 sp:7eb0d06ba858 ax:0 si:5594e935f062 di:ffffffffff600000 [21384460.639677] exe[592099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614dc077ab9 cs:33 sp:7f9871f5e858 ax:0 si:5614dc0d1062 di:ffffffffff600000 [21384521.299113] potentially unexpected fatal signal 5. [21384521.304379] CPU: 46 PID: 531723 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21384521.316375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21384521.326025] RIP: 0033:0x7fffffffe062 [21384521.330103] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21384521.350761] RSP: 002b:000000c000251b90 EFLAGS: 00000297 [21384521.357746] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21384521.366673] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21384521.375560] RBP: 000000c000251c28 R08: 0000000000000000 R09: 0000000000000000 [21384521.383115] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000251c18 [21384521.392059] R13: 000000c000203dd0 R14: 000000c0002e8700 R15: 0000000000080f3b [21384521.400978] FS: 000000c000180098 GS: 0000000000000000 [21384534.096824] exe[589578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d19fca0ab9 cs:33 sp:7f32696d8858 ax:0 si:55d19fcfa062 di:ffffffffff600000 [21384653.944439] exe[572635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa610eab9 cs:33 sp:7f98feedd858 ax:0 si:55dfa6168062 di:ffffffffff600000 [21385069.822820] exe[622961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb7ea2eab9 cs:33 sp:7eb7de06d858 ax:0 si:55eb7ea88062 di:ffffffffff600000 [21385069.955739] exe[626309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb7ea2eab9 cs:33 sp:7eb7de06d858 ax:0 si:55eb7ea88062 di:ffffffffff600000 [21385086.582981] exe[626529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f19087aab9 cs:33 sp:7ef455a91858 ax:0 si:55f1908d4062 di:ffffffffff600000 [21385175.901687] exe[623248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e38971fab9 cs:33 sp:7ef3dd750858 ax:0 si:55e389779097 di:ffffffffff600000 [21385489.126251] potentially unexpected fatal signal 11. [21385489.131565] CPU: 77 PID: 630773 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21385489.143557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21385489.153184] RIP: 0033:0x55a8b4240a66 [21385489.157177] Code: ff 48 8d 35 6d 56 09 00 48 8b 94 24 c8 03 00 00 48 8d 3d 67 56 09 00 31 c0 e8 96 35 ff ff 66 0f 1f 44 00 00 48 89 fa 48 89 f8 <40> 88 3d 59 0c ca 00 48 d1 ea 80 25 4f 0c ca 00 01 83 e2 01 88 15 [21385489.176380] RSP: 002b:00007ff5aa6cd538 EFLAGS: 00010287 [21385489.182035] RAX: 00000000000007c0 RBX: 00000000ffffffff RCX: 000055a8b4288a0d [21385489.190975] RDX: 00000000000007c0 RSI: 00007ff5aa6cd5a0 RDI: 00000000000007c0 [21385489.199921] RBP: 00007ff5aa6cd59c R08: 000000000000000a R09: 00007ff5aa6cd287 [21385489.208855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000032 [21385489.217815] R13: 000000000002ffd2 R14: 000000000002ffc1 R15: 0000000000000001 [21385489.226764] FS: 000055a8b4ee8480 GS: 0000000000000000 [21385564.189948] potentially unexpected fatal signal 5. [21385564.195195] CPU: 90 PID: 628260 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21385564.207186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21385564.216818] RIP: 0033:0x7fffffffe062 [21385564.220862] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21385564.241420] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21385564.247043] RAX: 000055b6b9821000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21385564.254583] RDX: 0000000000000001 RSI: 00000000001df000 RDI: 000055b6b9821000 [21385564.262136] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000eadc000 [21385564.271043] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21385564.278623] R13: 000000c000143808 R14: 000000c000182fc0 R15: 0000000000096c24 [21385564.287542] FS: 00007f7ace09d6c0 GS: 0000000000000000 [21385673.074007] potentially unexpected fatal signal 5. [21385673.079243] CPU: 50 PID: 640630 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21385673.091236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21385673.100898] RIP: 0033:0x7fffffffe062 [21385673.104928] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21385673.124164] RSP: 002b:000000c00065db90 EFLAGS: 00000297 [21385673.131255] RAX: 000055a9e3123000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21385673.140142] RDX: 0000000000000001 RSI: 00000000000dd000 RDI: 000055a9e3123000 [21385673.149042] RBP: 000000c00065dc28 R08: 0000000000000009 R09: 00000000139e6000 [21385673.158018] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00065dc18 [21385673.166883] R13: 000000c000663f50 R14: 000000c000295180 R15: 000000000009c2c9 [21385673.175785] FS: 000000c000180898 GS: 0000000000000000 [21386610.189335] potentially unexpected fatal signal 11. [21386610.194669] CPU: 19 PID: 678248 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21386610.206661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21386610.216311] RIP: 0033:0x562c56cfc37b [21386610.220381] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21386610.239578] RSP: 002b:00007f4baf2ee310 EFLAGS: 00010246 [21386610.245223] RAX: 00007f4baf2ee470 RBX: 00007f4baf2ee470 RCX: 0000000000000000 [21386610.252782] RDX: 00007f8cec400078 RSI: 00007f4baf2ee4d0 RDI: 00007f4baf2ee4f0 [21386610.260368] RBP: 0000000000000000 R08: 00007f8cec400078 R09: 0000562c56e70f8c [21386610.269292] R10: 0000000000000004 R11: 00000000861c4aa3 R12: 0000562c56e70f80 [21386610.276853] R13: 0000000000000b0a R14: 0000562c56e70f80 R15: 00007f4baf2ee418 [21386610.285765] FS: 0000562c579a1480 GS: 0000000000000000 [21386764.559102] exe[624506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a58e55ab9 cs:33 sp:7ea55e4c2858 ax:0 si:562a58eaf062 di:ffffffffff600000 [21387173.817368] exe[684977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d9833ab9 cs:33 sp:7f125834b858 ax:0 si:55d1d988d062 di:ffffffffff600000 [21387565.644772] exe[699915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55599ffcbab9 cs:33 sp:7f09812bd858 ax:0 si:5559a0025062 di:ffffffffff600000 [21387668.256384] potentially unexpected fatal signal 5. [21387668.261613] CPU: 43 PID: 672449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21387668.273610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21387668.283260] RIP: 0033:0x7fffffffe062 [21387668.287403] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21387668.307976] RSP: 002b:000000c0002dbb90 EFLAGS: 00000297 [21387668.308578] potentially unexpected fatal signal 5. [21387668.315037] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21387668.320220] CPU: 26 PID: 686088 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21387668.320222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21387668.320226] RIP: 0033:0x7fffffffe062 [21387668.320229] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21387668.320230] RSP: 002b:000000c0002dbb90 EFLAGS: 00000297 [21387668.320231] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21387668.320232] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000561ab9200000 [21387668.320235] RBP: 000000c0002dbc28 R08: 0000000000000000 R09: 0000000000000000 [21387668.329132] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21387668.329133] RBP: 000000c0002dbc28 R08: 0000000000000000 R09: 0000000000000000 [21387668.329135] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002dbc18 [21387668.329135] R13: 000000c00051ff20 R14: 000000c000500a80 R15: 00000000000a3dd4 [21387668.329136] FS: 000000c00013b098 GS: 0000000000000000 [21387668.341325] potentially unexpected fatal signal 5. [21387668.342492] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002dbc18 [21387668.352162] CPU: 24 PID: 686835 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21387668.352164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21387668.357494] R13: 000000c00051ff20 R14: 000000c000500a80 R15: 00000000000a3dd4 [21387668.357496] FS: 000000c00013b098 GS: 0000000000000000 [21387668.506097] RIP: 0033:0x7fffffffe062 [21387668.510102] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21387668.530718] RSP: 002b:000000c0002dbb90 EFLAGS: 00000297 [21387668.537737] RAX: 00007f452004c000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21387668.546701] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f452004c000 [21387668.555636] RBP: 000000c0002dbc28 R08: 0000000000000009 R09: 000000000d028000 [21387668.564585] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0002dbc18 [21387668.573527] R13: 000000c00051ff20 R14: 000000c000500a80 R15: 00000000000a3dd4 [21387668.582465] FS: 000000c00013b098 GS: 0000000000000000 [21387815.755406] exe[691106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55915ad20ab9 cs:33 sp:7f7cbc1feef8 ax:0 si:20004480 di:ffffffffff600000 [21387819.364765] exe[710664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55587b188ab9 cs:33 sp:7f936512bef8 ax:0 si:20004580 di:ffffffffff600000 [21387829.154794] exe[695199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562ec067237 cs:33 sp:7fb8d052def8 ax:2f700000 si:5562ec0d52f7 di:ffffffffff600000 [21387829.311174] exe[695493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564290c08237 cs:33 sp:7f6e5c354ef8 ax:2f700000 si:564290c762f7 di:ffffffffff600000 [21388171.969485] potentially unexpected fatal signal 5. [21388171.974711] CPU: 65 PID: 710168 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21388171.986693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21388171.996312] RIP: 0033:0x7fffffffe062 [21388172.000270] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21388172.019469] RSP: 002b:000000c000671b90 EFLAGS: 00000297 [21388172.025122] RAX: 00007f807aad5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21388172.032905] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f807aad5000 [21388172.041834] RBP: 000000c000671c28 R08: 0000000000000009 R09: 000000000d63d000 [21388172.050761] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000671c18 [21388172.059674] R13: 000000c00067ab10 R14: 000000c00047ea80 R15: 00000000000ac981 [21388172.069105] FS: 000000c000181098 GS: 0000000000000000 [21389346.387962] exe[693084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e593cdab9 cs:33 sp:7f02faf9f858 ax:0 si:561e59427070 di:ffffffffff600000 [21389346.503808] exe[705178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557135a70ab9 cs:33 sp:7f530fa52858 ax:0 si:557135aca070 di:ffffffffff600000 [21389346.539603] exe[729531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557135a70ab9 cs:33 sp:7f530fa31858 ax:0 si:557135aca070 di:ffffffffff600000 [21389346.568046] exe[692386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ab6822ab9 cs:33 sp:7efed2d51858 ax:0 si:556ab687c070 di:ffffffffff600000 [21389346.745593] exe[705180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557135a70ab9 cs:33 sp:7f530fa52858 ax:0 si:557135aca070 di:ffffffffff600000 [21389346.853475] exe[738441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55712a494ab9 cs:33 sp:7f40a21e6858 ax:0 si:55712a4ee070 di:ffffffffff600000 [21389346.994295] exe[692597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e593cdab9 cs:33 sp:7f02faf9f858 ax:0 si:561e59427070 di:ffffffffff600000 [21389366.797139] exe[744834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55682b60b237 cs:33 sp:7eaf72ecfef8 ax:2f700000 si:55682b6792f7 di:ffffffffff600000 [21389824.624847] exe[695056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568ed48aab9 cs:33 sp:7ecf5d690858 ax:0 si:5568ed4e4097 di:ffffffffff600000 [21389829.776297] exe[695086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a674fe6ab9 cs:33 sp:7eedf40f9858 ax:0 si:55a675040097 di:ffffffffff600000 [21390066.864258] potentially unexpected fatal signal 5. [21390066.869515] CPU: 55 PID: 745494 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21390066.881638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21390066.891438] RIP: 0033:0x7fffffffe062 [21390066.895421] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21390066.914643] RSP: 002b:000000c00062db90 EFLAGS: 00000297 [21390066.920323] RAX: 000055b20b8c2000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21390066.927878] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055b20b8c2000 [21390066.936817] RBP: 000000c00062dc28 R08: 0000000000000009 R09: 0000000006fff000 [21390066.945742] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00062dc18 [21390066.953295] R13: 000000c000018b10 R14: 000000c00048d340 R15: 00000000000b2758 [21390066.962213] FS: 000000c000180098 GS: 0000000000000000 [21390067.021566] potentially unexpected fatal signal 5. [21390067.027222] CPU: 73 PID: 741311 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21390067.040677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21390067.051632] RIP: 0033:0x7fffffffe062 [21390067.056984] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21390067.077621] RSP: 002b:000000c00062db90 EFLAGS: 00000297 [21390067.084666] RAX: 00005645c28d9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21390067.093594] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00005645c28d9000 [21390067.102547] RBP: 000000c00062dc28 R08: 0000000000000009 R09: 000000000b9a8000 [21390067.111519] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00062dc18 [21390067.120455] R13: 000000c000018b10 R14: 000000c00048d340 R15: 00000000000b2758 [21390067.128026] FS: 000000c000180098 GS: 0000000000000000 [21390248.993256] exe[761475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4e55f4db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:100000 [21390303.914413] exe[710356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642180eaab9 cs:33 sp:7f75db193ef8 ax:0 si:200013c0 di:ffffffffff600000 [21390304.060056] exe[740055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d17bddab9 cs:33 sp:7fb1ea362ef8 ax:0 si:200013c0 di:ffffffffff600000 [21390562.557218] exe[756449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b200bb4ab9 cs:33 sp:7fe9438dc858 ax:0 si:55b200c0e062 di:ffffffffff600000 [21391049.307593] exe[760813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e3a7faab9 cs:33 sp:7f6a4477f858 ax:0 si:555e3a854070 di:ffffffffff600000 [21391514.966789] potentially unexpected fatal signal 5. [21391514.972034] CPU: 55 PID: 776246 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21391514.984014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21391514.993750] RIP: 0033:0x7fffffffe062 [21391514.997733] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21391515.016976] RSP: 002b:000000c00065db90 EFLAGS: 00000297 [21391515.022662] RAX: 0000557af2c9a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21391515.031602] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000557af2c9a000 [21391515.039128] RBP: 000000c00065dc28 R08: 0000000000000009 R09: 0000000003df4000 [21391515.048173] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00065dc18 [21391515.057067] R13: 000000c000663f50 R14: 000000c0004cd6c0 R15: 00000000000b8ec2 [21391515.066005] FS: 0000000001f6c6b0 GS: 0000000000000000 [21391719.362230] exe[792894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c66f45237 cs:33 sp:7f37d3ef3ef8 ax:2f700000 si:564c66fb32f7 di:ffffffffff600000 [21391719.439260] exe[792894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56479f863237 cs:33 sp:7f31f009bef8 ax:2f700000 si:56479f8d12f7 di:ffffffffff600000 [21392018.321355] exe[784190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544c01eab9 cs:33 sp:7f74d54a2858 ax:0 si:56544c078062 di:ffffffffff600000 [21392018.791204] exe[784061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7fe66ab9 cs:33 sp:7f533e1f2858 ax:0 si:555a7fec0062 di:ffffffffff600000 [21392018.817056] exe[784221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544c01eab9 cs:33 sp:7f74d54a2858 ax:0 si:56544c078062 di:ffffffffff600000 [21392018.850165] exe[784222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556facdc4ab9 cs:33 sp:7f7f382b1858 ax:0 si:556face1e062 di:ffffffffff600000 [21392018.904906] exe[793032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544c01eab9 cs:33 sp:7f74d54a2858 ax:0 si:56544c078062 di:ffffffffff600000 [21392018.970662] exe[784208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3d89dcab9 cs:33 sp:7fba9f171858 ax:0 si:55b3d8a36062 di:ffffffffff600000 [21392019.038801] exe[783971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544c01eab9 cs:33 sp:7f74d54a2858 ax:0 si:56544c078062 di:ffffffffff600000 [21392019.106223] exe[784514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556facdc4ab9 cs:33 sp:7f7f382b1858 ax:0 si:556face1e062 di:ffffffffff600000 [21392019.178171] exe[783934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7fe66ab9 cs:33 sp:7f533e1f2858 ax:0 si:555a7fec0062 di:ffffffffff600000 [21392066.706700] exe[802655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55834744eab9 cs:33 sp:7eaf6b85d858 ax:0 si:5583474a8097 di:ffffffffff600000 [21392335.002223] potentially unexpected fatal signal 11. [21392335.007648] CPU: 12 PID: 787871 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21392335.019699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21392335.029333] RIP: 0033:0x7ff0986c3050 [21392335.033310] Code: Unable to access opcode bytes at RIP 0x7ff0986c3026. [21392335.040275] RSP: 002b:00007f92ddb472d8 EFLAGS: 00010202 [21392335.047296] RAX: 00007ff0986c3050 RBX: 0000000000000003 RCX: 0000001b2c920000 [21392335.056228] RDX: 0000001b2c920004 RSI: 00007f92ddb472f0 RDI: 0000000000000001 [21392335.065175] RBP: 0000000000000001 R08: 0000001b2c960000 R09: 0000000000000000 [21392335.074101] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21392335.083054] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21392335.091968] FS: 000055f8b06a4480 GS: 0000000000000000 [21392622.682676] potentially unexpected fatal signal 5. [21392622.687907] CPU: 78 PID: 762448 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21392622.699918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21392622.709568] RIP: 0033:0x7fffffffe062 [21392622.713605] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21392622.734178] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21392622.741212] RAX: 000055f2eac00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21392622.750108] RDX: 0000000000000001 RSI: 00000000001eb000 RDI: 000055f2eac00000 [21392622.759039] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000169ef000 [21392622.767937] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21392622.776856] R13: 000000c000180008 R14: 000000c0001b1dc0 R15: 00000000000b9799 [21392622.785778] FS: 00007f547239c6c0 GS: 0000000000000000 [21393108.665324] exe[790449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c53838ab9 cs:33 sp:7f69d71f9858 ax:0 si:557c53892062 di:ffffffffff600000 [21393108.769743] exe[784612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e7b902ab9 cs:33 sp:7f573c4a5858 ax:0 si:559e7b95c062 di:ffffffffff600000 [21393108.840971] exe[790416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbf5b00ab9 cs:33 sp:7fa19e3b8858 ax:0 si:55dbf5b5a062 di:ffffffffff600000 [21393108.931900] exe[784616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562702ff0ab9 cs:33 sp:7f39641b5858 ax:0 si:56270304a062 di:ffffffffff600000 [21393108.950624] exe[790479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c53838ab9 cs:33 sp:7f69d71f9858 ax:0 si:557c53892062 di:ffffffffff600000 [21393109.009326] exe[789916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e7b902ab9 cs:33 sp:7f573c4a5858 ax:0 si:559e7b95c062 di:ffffffffff600000 [21393109.096902] exe[784410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c53838ab9 cs:33 sp:7f69d71f9858 ax:0 si:557c53892062 di:ffffffffff600000 [21393109.181293] exe[790449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbf5b00ab9 cs:33 sp:7fa19e3b8858 ax:0 si:55dbf5b5a062 di:ffffffffff600000 [21393720.344233] exe[794586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588edbcbab9 cs:33 sp:7f5bebdbe858 ax:0 si:5588edc25062 di:ffffffffff600000 [21393721.579953] exe[784192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bcce66ab9 cs:33 sp:7f690de88858 ax:0 si:557bccec0062 di:ffffffffff600000 [21394201.754301] exe[784493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bf2e2aab9 cs:33 sp:7f9f02329858 ax:0 si:556bf2e84062 di:ffffffffff600000 [21394202.282925] exe[783616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c91233ab9 cs:33 sp:7f8e06272858 ax:0 si:558c9128d062 di:ffffffffff600000 [21394943.776976] exe[838791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a4098dab9 cs:33 sp:7fa919190858 ax:0 si:555a409e7062 di:ffffffffff600000 [21395180.152973] potentially unexpected fatal signal 5. [21395180.158207] CPU: 7 PID: 870003 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21395180.170123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21395180.179796] RIP: 0033:0x7fffffffe062 [21395180.183829] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21395180.204403] RSP: 002b:000000c000173b90 EFLAGS: 00000297 [21395180.211401] RAX: 000055de65c00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21395180.220332] RDX: 0000000000000003 RSI: 0000000000039000 RDI: 000055de65c00000 [21395180.229264] RBP: 000000c000173c28 R08: 0000000000000009 R09: 0000000013066000 [21395180.236879] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000173c18 [21395180.245757] R13: 000000c0001a6150 R14: 000000c000500540 R15: 00000000000d2e96 [21395180.254690] FS: 000000c0004ba098 GS: 0000000000000000 [21395308.916059] exe[811550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c35c5aab9 cs:33 sp:7f342d709858 ax:0 si:564c35cb4097 di:ffffffffff600000 [21395308.976088] exe[809453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55570cfeeab9 cs:33 sp:7fba1aca0858 ax:0 si:55570d048097 di:ffffffffff600000 [21395309.005033] exe[809453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55570cfeeab9 cs:33 sp:7fba1ac7f858 ax:0 si:55570d048097 di:ffffffffff600000 [21395846.546462] exe[874073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560e78db237 cs:33 sp:7fe1493afef8 ax:2f700000 si:5560e79492f7 di:ffffffffff600000 [21396182.524322] potentially unexpected fatal signal 5. [21396182.529540] CPU: 66 PID: 892728 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21396182.541535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21396182.551169] RIP: 0033:0x7fffffffe062 [21396182.555133] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21396182.574388] RSP: 002b:000000c000579b90 EFLAGS: 00000297 [21396182.579995] RAX: 00007f4b2ffd9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21396182.587543] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f4b2ffd9000 [21396182.595146] RBP: 000000c000579c28 R08: 0000000000000009 R09: 00000000015f7000 [21396182.602682] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000579c18 [21396182.610207] R13: 000000c00057ff50 R14: 000000c00017f6c0 R15: 00000000000d9244 [21396182.617722] FS: 0000000001f6c6b0 GS: 0000000000000000 [21396187.762548] exe[888176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e5858237 cs:33 sp:7f3bfb763ef8 ax:2f700000 si:5590e58c62f7 di:ffffffffff600000 [21396187.836975] exe[889115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de21fff237 cs:33 sp:7f3583f7def8 ax:2f700000 si:55de2206d2f7 di:ffffffffff600000 [21396187.896349] exe[889827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e5858237 cs:33 sp:7f3bfb763ef8 ax:2f700000 si:5590e58c62f7 di:ffffffffff600000 [21396187.915740] exe[887939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559ad412237 cs:33 sp:7fe8eb8a2ef8 ax:2f700000 si:5559ad4802f7 di:ffffffffff600000 [21396187.991342] exe[888047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de21fff237 cs:33 sp:7f3583f7def8 ax:2f700000 si:55de2206d2f7 di:ffffffffff600000 [21396188.180168] exe[888099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de21fff237 cs:33 sp:7f3583f7def8 ax:2f700000 si:55de2206d2f7 di:ffffffffff600000 [21396188.237201] exe[889204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e5858237 cs:33 sp:7f3bfb763ef8 ax:2f700000 si:5590e58c62f7 di:ffffffffff600000 [21396188.295861] exe[888359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55baa5445237 cs:33 sp:7f051b764ef8 ax:2f700000 si:55baa54b32f7 di:ffffffffff600000 [21396188.355156] exe[888240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e5858237 cs:33 sp:7f3bfb763ef8 ax:2f700000 si:5590e58c62f7 di:ffffffffff600000 [21396188.529014] exe[887914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559ad412237 cs:33 sp:7fe8eb8a2ef8 ax:2f700000 si:5559ad4802f7 di:ffffffffff600000 [21396212.455132] potentially unexpected fatal signal 11. [21396212.460438] CPU: 30 PID: 893660 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21396212.472539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21396212.482193] RIP: 0033:0x564796e652f8 [21396212.486198] Code: ff 48 8d 3d 6a f5 c5 00 e8 45 6a fd ff e9 1f ff ff ff 41 57 89 f1 49 89 d7 41 56 41 89 fe 41 55 41 54 55 53 31 db 48 83 ec 18 <48> 8b 3d 61 f5 c5 00 48 8b 15 6a f5 c5 00 48 85 ff 0f 84 a1 01 00 [21396212.505435] RSP: 002b:00007f209c5653f0 EFLAGS: 00010206 [21396212.512500] RAX: 00000000000001a6 RBX: 0000000000000000 RCX: 0000000000000000 [21396212.521429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [21396212.530389] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21396212.539344] R10: 0000564797ac6750 R11: 0000000000000246 R12: 00000000000001a6 [21396212.548272] R13: ffffffffffffffb0 R14: 0000000000000002 R15: 0000000000000000 [21396212.557198] FS: 0000564797ac6480 GS: 0000000000000000 [21396276.012442] warn_bad_vsyscall: 4 callbacks suppressed [21396276.012446] exe[895921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd4c90f237 cs:33 sp:7f0c49cd8ef8 ax:2f700000 si:55bd4c97d2f7 di:ffffffffff600000 [21396276.115012] exe[898132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f281850237 cs:33 sp:7f721f9feef8 ax:2f700000 si:55f2818be2f7 di:ffffffffff600000 [21396284.473687] exe[888357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5ac2e4237 cs:33 sp:7fdc7d0b9ef8 ax:2f700000 si:55a5ac3522f7 di:ffffffffff600000 [21396284.550247] exe[887915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566f4c37237 cs:33 sp:7f49c8523ef8 ax:2f700000 si:5566f4ca52f7 di:ffffffffff600000 [21396334.345202] potentially unexpected fatal signal 5. [21396334.350422] CPU: 1 PID: 875973 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21396334.362322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21396334.371966] RIP: 0033:0x7fffffffe062 [21396334.375954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21396334.395166] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [21396334.400841] RAX: 000055942e800000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21396334.408434] RDX: 0000000000000003 RSI: 0000000000032000 RDI: 000055942e800000 [21396334.417393] RBP: 000000c00002bc28 R08: 0000000000000009 R09: 000000000d825000 [21396334.426314] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00002bc18 [21396334.435247] R13: 000000c00016cb10 R14: 000000c000528c40 R15: 00000000000d4db0 [21396334.442816] FS: 0000000001f6c6b0 GS: 0000000000000000 [21396526.195514] potentially unexpected fatal signal 5. [21396526.200774] CPU: 46 PID: 903835 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21396526.212815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21396526.222454] RIP: 0033:0x7fffffffe062 [21396526.226455] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21396526.245736] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21396526.252720] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21396526.261671] RDX: 0000000000000000 RSI: 000000000002b000 RDI: 000055ab26800000 [21396526.270612] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21396526.279539] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21396526.288466] R13: 0000000002883b00 R14: 000000c000007dc0 R15: 00000000000db4f5 [21396526.297409] FS: 00000000042423c0 GS: 0000000000000000 [21396821.589098] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68097 di:ffffffffff600000 [21396821.706285] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68097 di:ffffffffff600000 [21396821.810068] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68097 di:ffffffffff600000 [21396821.906388] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68097 di:ffffffffff600000 [21396821.979262] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68097 di:ffffffffff600000 [21396822.055847] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68062 di:ffffffffff600000 [21396822.132411] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68062 di:ffffffffff600000 [21396822.199404] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68062 di:ffffffffff600000 [21396822.276907] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68062 di:ffffffffff600000 [21396822.360993] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576cde0eab9 cs:33 sp:7f8988f28858 ax:0 si:5576cde68062 di:ffffffffff600000 [21397094.762596] warn_bad_vsyscall: 1 callbacks suppressed [21397094.762599] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397094.849401] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397094.877754] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502eff858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397094.947180] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.045718] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.068322] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.145867] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.241481] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.672281] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397095.784211] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397099.831803] warn_bad_vsyscall: 24 callbacks suppressed [21397099.831808] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397099.934454] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.009234] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.086971] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.160580] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.227179] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.228319] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502eff858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.313866] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.387454] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397100.471481] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397104.852135] warn_bad_vsyscall: 196 callbacks suppressed [21397104.852139] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502eff858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397104.919676] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397104.986839] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397105.051006] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397105.127704] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6097 di:ffffffffff600000 [21397105.214494] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397105.338978] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397105.362740] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397105.459981] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397105.542668] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397109.893892] warn_bad_vsyscall: 125 callbacks suppressed [21397109.893896] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397109.985303] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.053766] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.142537] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.168879] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.397810] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.481488] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.570758] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.653198] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397110.950514] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745ec8cab9 cs:33 sp:7f2502f20858 ax:0 si:55745ece6062 di:ffffffffff600000 [21397283.626303] warn_bad_vsyscall: 13 callbacks suppressed [21397283.626307] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e062 di:ffffffffff600000 [21397298.198034] exe[906359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e097 di:ffffffffff600000 [21397298.435463] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e097 di:ffffffffff600000 [21397304.271342] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e097 di:ffffffffff600000 [21397323.488930] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e062 di:ffffffffff600000 [21397329.606184] exe[906367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e062 di:ffffffffff600000 [21397331.171779] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e097 di:ffffffffff600000 [21397333.479599] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e097 di:ffffffffff600000 [21397334.563848] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e062 di:ffffffffff600000 [21397335.678103] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060eed4ab9 cs:33 sp:7f655ed7e858 ax:0 si:56060ef2e062 di:ffffffffff600000 [21397339.957745] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397341.069256] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397342.297754] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397342.643798] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397344.754110] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397344.975894] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092097 di:ffffffffff600000 [21397345.122214] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397345.735612] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561337038ab9 cs:33 sp:7f60ebdfe858 ax:0 si:561337092062 di:ffffffffff600000 [21397359.980383] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397361.280075] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397363.164778] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397366.896408] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397379.745904] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397381.113227] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397388.631320] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232097 di:ffffffffff600000 [21397388.963169] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232097 di:ffffffffff600000 [21397389.344571] exe[915443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397389.773215] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397390.265759] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397393.152086] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397397.103445] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397397.548452] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397398.425986] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232097 di:ffffffffff600000 [21397398.534247] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641171d8ab9 cs:33 sp:7eff82296858 ax:0 si:564117232062 di:ffffffffff600000 [21397406.294633] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b88388ab9 cs:33 sp:7f27fdecf858 ax:0 si:556b883e2097 di:ffffffffff600000 [21397411.546578] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b88388ab9 cs:33 sp:7f27fdecf858 ax:0 si:556b883e2062 di:ffffffffff600000 [21397411.719137] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b88388ab9 cs:33 sp:7f27fdecf858 ax:0 si:556b883e2062 di:ffffffffff600000 [21397427.292539] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397429.554317] exe[915443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397435.432609] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397435.859168] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397439.271902] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397442.631640] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397442.881894] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920097 di:ffffffffff600000 [21397448.166521] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397455.253153] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56349d8c6ab9 cs:33 sp:7fcc3d336858 ax:0 si:56349d920062 di:ffffffffff600000 [21397456.760607] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9097 di:ffffffffff600000 [21397458.836791] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397459.643793] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397459.762694] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397461.013446] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397462.402563] exe[915443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397465.163337] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397469.553591] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9097 di:ffffffffff600000 [21397471.534023] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397472.530191] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397473.899009] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397479.437931] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9097 di:ffffffffff600000 [21397479.715485] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397480.047658] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55695969fab9 cs:33 sp:7f307976e858 ax:0 si:5569596f9062 di:ffffffffff600000 [21397482.179601] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397484.995688] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397486.694881] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397490.980154] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0097 di:ffffffffff600000 [21397491.510091] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397491.820692] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0097 di:ffffffffff600000 [21397494.682713] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397497.574031] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397501.137811] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dcd386ab9 cs:33 sp:7fdd96865858 ax:0 si:555dcd3e0062 di:ffffffffff600000 [21397507.574337] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397507.692675] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397507.971896] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397509.159245] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397510.327810] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397510.819147] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397513.530770] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397514.142402] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397514.637373] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397515.506797] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397516.921129] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557284f3ab9 cs:33 sp:7fa4173f0858 ax:0 si:55572854d062 di:ffffffffff600000 [21397517.922875] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e32fa4ab9 cs:33 sp:7f39436e9858 ax:0 si:556e32ffe062 di:ffffffffff600000 [21397519.395875] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e32fa4ab9 cs:33 sp:7f39436e9858 ax:0 si:556e32ffe062 di:ffffffffff600000 [21397519.885315] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e32fa4ab9 cs:33 sp:7f39436e9858 ax:0 si:556e32ffe062 di:ffffffffff600000 [21397520.226275] exe[906359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e32fa4ab9 cs:33 sp:7f39436e9858 ax:0 si:556e32ffe062 di:ffffffffff600000 [21397523.543679] exe[906367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e32fa4ab9 cs:33 sp:7f39436e9858 ax:0 si:556e32ffe062 di:ffffffffff600000 [21397524.882955] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397529.802763] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397530.804519] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397535.018470] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397536.669690] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397538.900234] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397540.482087] exe[906367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397541.993272] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397543.232341] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397543.867049] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397544.883920] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397546.977873] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397547.756169] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397548.526309] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397549.111113] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397549.486273] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397552.087887] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397554.961882] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397556.169020] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397557.203208] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397559.099106] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397559.586906] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397560.050761] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397562.824354] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397566.115073] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397566.536847] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397568.568276] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397571.268345] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397571.444754] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397573.483744] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397578.888632] exe[906359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397579.961621] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397587.977227] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397591.390203] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397591.874304] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397592.896252] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397593.097411] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397593.626821] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397596.607392] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397600.356172] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397602.364503] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397604.181099] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397604.315600] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397605.146306] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397606.820538] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397611.425877] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b097 di:ffffffffff600000 [21397623.771139] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397629.286452] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d218341ab9 cs:33 sp:7f98a1066858 ax:0 si:55d21839b062 di:ffffffffff600000 [21397637.830758] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36062 di:ffffffffff600000 [21397637.929112] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36062 di:ffffffffff600000 [21397639.788957] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36062 di:ffffffffff600000 [21397640.507899] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36062 di:ffffffffff600000 [21397640.892271] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36062 di:ffffffffff600000 [21397642.762229] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36097 di:ffffffffff600000 [21397645.742929] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56151fddcab9 cs:33 sp:7ff9b8699858 ax:0 si:56151fe36097 di:ffffffffff600000 [21397648.244563] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397651.598603] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397657.040444] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397668.550249] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397668.660519] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2097 di:ffffffffff600000 [21397678.179836] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397681.274615] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397687.128722] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397688.213632] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdeca88ab9 cs:33 sp:7fe0ddffe858 ax:0 si:55bdecae2062 di:ffffffffff600000 [21397688.925474] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397695.994190] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397697.162891] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397699.350228] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397706.040931] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397708.451138] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826097 di:ffffffffff600000 [21397710.196455] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397710.315818] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826070 di:ffffffffff600000 [21397713.012832] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397716.241600] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397718.509967] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826097 di:ffffffffff600000 [21397720.008496] exe[915402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397721.471218] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397739.482057] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397741.801336] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397742.215817] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397744.960821] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397746.493784] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397749.487420] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397751.903141] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397761.006696] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397761.562035] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397762.934328] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397763.106263] exe[909345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561194257ab9 cs:33 sp:7f5e8f15f858 ax:0 si:5611942b1062 di:ffffffffff600000 [21397765.351439] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397766.121406] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397771.920714] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826097 di:ffffffffff600000 [21397776.639037] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397780.822094] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397781.374624] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397800.313757] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98097 di:ffffffffff600000 [21397802.851844] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397810.655752] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397821.019555] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12097 di:ffffffffff600000 [21397831.948269] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397855.428454] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397862.965047] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397863.030160] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397865.652612] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397865.704976] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397866.165339] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12097 di:ffffffffff600000 [21397873.019651] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.077431] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.499066] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.662074] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397876.157394] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397877.640542] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a097 di:ffffffffff600000 [21397878.604339] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397880.854365] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397890.731469] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a097 di:ffffffffff600000 [21397895.207596] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397895.394418] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397896.846851] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397899.332168] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397904.224804] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397909.260467] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397912.900116] exe[906367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f097 di:ffffffffff600000 [21397914.458931] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397918.676248] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f097 di:ffffffffff600000 [21397926.791966] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397929.764076] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ce1a3ab9 cs:33 sp:7f988bb68858 ax:0 si:5630ce1fd062 di:ffffffffff600000 [21397932.691532] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ce1a3ab9 cs:33 sp:7f988bb68858 ax:0 si:5630ce1fd062 di:ffffffffff600000 [21397936.741892] exe[906359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc0c46aab9 cs:33 sp:7fb44efaf858 ax:0 si:55cc0c4c4062 di:ffffffffff600000 [21397959.088116] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397959.479077] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529097 di:ffffffffff600000 [21397961.092137] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397961.141677] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397965.472293] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397965.794524] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397970.316847] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397977.303954] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397988.856525] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397992.895246] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397993.474018] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397994.672182] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397995.370586] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397998.509114] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397999.097402] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398004.652367] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398005.822769] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398010.233407] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398019.816600] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398024.560947] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398027.082538] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398029.995529] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398031.415068] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeebffe858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398036.504710] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398038.692880] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398041.310780] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398042.807549] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398050.278331] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398053.328506] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398056.078518] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398056.591283] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398057.324940] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398059.468670] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398060.452820] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.122231] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.422229] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398064.120038] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398065.323679] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.568477] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.699841] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.133494] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.245468] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.611918] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398070.653220] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398071.929764] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398075.354630] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398078.375672] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398084.365188] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.503944] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.975525] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398089.660740] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398100.814762] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398103.149891] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398108.126400] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398109.727655] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398114.926120] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398115.326643] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398116.464738] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398117.363072] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398118.107760] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398119.056651] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b070 di:ffffffffff600000 [21398122.811183] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398126.709936] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398128.976124] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398134.017772] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398138.986826] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398144.595270] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398147.740445] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398153.836628] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe097 di:ffffffffff600000 [21398154.429724] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398170.354252] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398178.833978] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398179.226311] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398194.626602] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae097 di:ffffffffff600000 [21398200.237249] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398201.652049] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398207.656925] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.429069] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.585670] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.999123] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398213.090744] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398234.875538] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398236.383763] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.310888] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.880938] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398250.215371] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398250.957948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398254.226072] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398255.486365] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398260.434278] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398265.469418] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398269.051341] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398269.513840] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398271.673795] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398272.616789] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398273.924585] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398277.831892] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398286.091207] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398286.137692] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398288.818879] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398291.251585] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398292.528986] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398293.177860] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398296.876293] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398297.547492] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398303.631253] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398307.056962] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398309.191658] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398309.256834] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398310.586312] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398316.366362] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398317.114740] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398318.757589] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398321.659757] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.031872] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.950021] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398326.802881] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398330.243521] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.305590] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.625216] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398336.307442] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398338.072993] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.348139] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.998434] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398344.165955] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398347.141159] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398347.996114] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398350.871793] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398351.358950] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398352.559626] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398355.862755] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398357.894524] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398359.037982] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398361.795239] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398365.856348] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.587949] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.853704] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398371.898448] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398372.115864] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398373.950137] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398380.153091] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398382.247312] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398388.417898] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398390.819601] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398391.851429] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398392.556223] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398395.937836] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398397.879860] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86097 di:ffffffffff600000 [21398410.692769] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398410.873139] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398414.429586] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398416.832172] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.769695] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.823843] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398418.987019] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398419.473838] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398420.029058] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398420.590705] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398421.664358] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398422.062997] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398423.355332] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d070 di:ffffffffff600000 [21398423.399659] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398435.438023] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.342008] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.775508] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398442.909284] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398447.142962] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398449.414905] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398449.675703] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398452.943792] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398457.970324] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398458.895332] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398459.102871] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398460.653358] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398461.032711] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398469.852084] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398470.306389] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398471.635083] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398473.905666] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398482.377237] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398483.473645] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398490.798263] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398491.655735] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398493.644298] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b097 di:ffffffffff600000 [21398495.354436] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398495.575138] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.144003] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.384895] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398498.502754] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.566138] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.792158] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d097 di:ffffffffff600000 [21398512.025224] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398531.302715] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398534.970820] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398535.280932] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398543.585555] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398545.214698] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398546.360752] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398560.002814] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398561.384622] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398566.765734] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398568.382722] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398573.910780] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.592856] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.729631] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398585.216202] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398585.367089] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398587.445412] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398592.713622] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398595.091456] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398596.476278] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398597.609836] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398598.430066] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398605.961078] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398607.712645] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398609.806570] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398610.415356] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.477826] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.705753] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.445433] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.690695] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398621.232556] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398626.661156] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df1f57fab9 cs:33 sp:7f8da8a50858 ax:0 si:55df1f5d9062 di:ffffffffff600000 [21398630.483392] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398630.892451] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398639.672951] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398641.355657] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398642.977955] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398649.503938] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c097 di:ffffffffff600000 [21398654.613690] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398656.518746] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398666.979397] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398672.940849] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398673.373469] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398681.792107] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564701ea5ab9 cs:33 sp:7f8aaa8b5858 ax:0 si:564701eff062 di:ffffffffff600000 [21398682.106959] potentially unexpected fatal signal 11. [21398682.112304] CPU: 28 PID: 909380 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21398682.124303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21398682.133947] RIP: 0033:0x55681398537b [21398682.137962] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21398682.158516] RSP: 002b:00007f8b97ad7310 EFLAGS: 00010246 [21398682.165529] RAX: 00007f8b97ad7470 RBX: 00007f8b97ad7470 RCX: 0000000000000000 [21398682.174464] RDX: 00007f8036200060 RSI: 00007f8b97ad74c8 RDI: 00007f8b97ad74f0 [21398682.183403] RBP: 0000000000000000 R08: 00007f8036200060 R09: 0000556813af9f8c [21398682.192347] R10: 0000000000000003 R11: 00000000861c4acb R12: 0000556813af9f80 [21398682.201251] R13: 0000000000000fb1 R14: 0000556813af9f80 R15: 00007f8b97ad7418 [21398682.208818] FS: 000055681462a480 GS: 0000000000000000 [21398688.469808] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398693.037605] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398702.194713] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398710.043239] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398720.138552] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.118726] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.189979] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.646165] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398727.364473] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398730.909567] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398732.822003] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398738.484195] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398753.504467] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398755.454272] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.693842] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.876725] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c070 di:ffffffffff600000 [21398761.144052] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398766.354293] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398766.948637] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398770.526159] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398772.258971] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.267631] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.936585] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398777.605674] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398785.006056] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398787.272278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398790.315248] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398795.006207] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398802.709150] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398803.152280] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398806.960399] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.442765] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398813.543113] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.588291] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398816.108351] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e070 di:ffffffffff600000 [21398819.510701] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398822.086794] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398825.279353] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398827.875294] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398833.471502] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398834.007493] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398838.257933] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.568493] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.736517] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398844.289394] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398844.478750] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398845.084800] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398847.776510] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398852.854948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398853.662208] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398855.796453] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.306851] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.992590] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398860.047102] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398867.837647] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398868.157084] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398869.159569] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.276511] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.516084] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398872.871370] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398880.544066] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad93f858 ax:0 si:56036391d062 di:ffffffffff600000 [21398882.615843] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398889.278068] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398891.327216] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d070 di:ffffffffff600000 [21398898.351531] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398899.643748] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398900.387933] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398905.131201] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398906.568340] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398907.062596] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398908.887368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398910.039620] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398918.651580] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398922.763615] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398926.051639] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398926.965741] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398931.233754] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398933.516824] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398938.282766] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398938.510930] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398941.718603] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398951.421801] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398955.367753] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398964.774783] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.270411] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.793308] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.486799] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.748600] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398973.815991] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398973.974935] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398977.339076] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398981.906985] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398987.076348] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398989.808064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398998.778280] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.038186] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.609367] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399007.952091] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399014.293434] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.195113] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.993219] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399022.538759] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399023.539016] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d070 di:ffffffffff600000 [21399024.064283] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399032.398231] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399038.736236] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399040.711896] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.141077] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.320658] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.365757] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.528291] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399054.209238] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399057.839233] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.242500] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399059.305399] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.835945] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399060.302776] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399062.273940] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399062.412432] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.348920] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.836985] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399068.992600] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399069.248037] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399077.389152] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399086.551390] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399087.302079] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399089.269778] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399090.747161] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399093.678934] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399104.558244] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399105.486050] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399107.430062] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399110.506404] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399130.767649] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399134.325405] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399134.630746] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399136.972718] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399137.143270] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399139.500776] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.308162] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.436491] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399149.607720] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399151.351347] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399153.803069] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399154.225697] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.047011] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.833942] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399165.845832] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399173.464281] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399177.155108] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399180.613675] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399186.980096] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399189.987004] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399190.754030] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399191.095139] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399192.116478] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399196.294677] potentially unexpected fatal signal 5. [21399196.299912] CPU: 28 PID: 885408 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399196.311911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399196.321541] RIP: 0033:0x7fffffffe062 [21399196.325616] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399196.345046] RSP: 002b:000000c00079fb90 EFLAGS: 00000297 [21399196.350665] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399196.358215] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399196.365800] RBP: 000000c00079fc28 R08: 0000000000000000 R09: 0000000000000000 [21399196.374738] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00079fc18 [21399196.383691] R13: 000000c0006b5f20 R14: 000000c000183dc0 R15: 00000000000d5f38 [21399196.392621] FS: 000000c00013b098 GS: 0000000000000000 [21399200.924914] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399201.041167] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399203.423036] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399212.866385] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399217.630931] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399218.390790] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.650383] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.915711] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399221.518377] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399223.339394] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.488421] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f456858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.998793] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399227.546945] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2097 di:ffffffffff600000 [21399229.460700] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399234.888808] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399236.072167] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399240.012586] exe[956779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9966f4ab9 cs:33 sp:7ea3b8555858 ax:0 si:55c99674e062 di:ffffffffff600000 [21399240.663828] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399249.645510] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399253.931457] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399254.731181] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399260.717195] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399261.115293] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399268.721351] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399270.122457] potentially unexpected fatal signal 11. [21399270.127758] CPU: 26 PID: 951648 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399270.139748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399270.149372] RIP: 0033:0x5557bcd52a80 [21399270.153350] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21399270.172558] RSP: 002b:00007f8d9e0d4440 EFLAGS: 00010246 [21399270.178223] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005557bcd52e0d [21399270.185811] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00005557bd9b4760 [21399270.194743] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21399270.203702] R10: 00005557bd9b4750 R11: 0000000000000246 R12: 0000000000000000 [21399270.212626] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21399270.221553] FS: 00005557bd9b4480 GS: 0000000000000000 [21399276.420819] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399278.667253] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.685345] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.851553] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399280.137711] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.695975] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.940461] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.616527] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.667318] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399302.127576] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399302.964924] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399306.096773] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399307.520031] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399308.341015] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399317.260377] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399319.791665] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399321.164678] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399322.882547] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399323.140915] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3070 di:ffffffffff600000 [21399323.875742] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399324.072451] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399325.346682] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399329.463261] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399335.923837] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399336.311887] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebdb858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399344.961236] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399347.269115] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399349.967714] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399355.310746] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399370.633200] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399372.575499] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399393.829970] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399394.009671] exe[905356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399395.887831] exe[928043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399410.451276] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399417.878270] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399418.189927] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399428.562115] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399431.170662] exe[915411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399431.903956] exe[905597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399435.570559] exe[905565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399445.928136] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399447.329820] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399457.831724] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399460.681308] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399465.454483] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399471.470256] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399471.957576] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399481.118974] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399482.331198] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399484.263582] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399488.709041] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d097 di:ffffffffff600000 [21399491.094927] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399494.307349] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399495.569879] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399501.295848] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399508.951979] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399511.721391] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399517.796815] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399519.663252] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d070 di:ffffffffff600000 [21399524.464590] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399525.817562] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399531.992311] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399534.946173] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399535.794097] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399538.995823] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399541.298332] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399542.939719] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399543.525277] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.064117] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.611028] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399549.323477] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399552.156071] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399559.043889] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399569.932242] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399580.245121] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399582.416356] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba097 di:ffffffffff600000 [21399582.692839] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399585.863069] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399595.342932] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399601.139307] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399603.729357] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399611.049638] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399613.219724] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399616.521352] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399625.870233] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399627.339355] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399628.622866] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399629.820018] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399630.096202] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399633.755013] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399638.321565] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399639.606616] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399642.078994] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399645.440263] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399648.464012] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399653.127322] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399661.414583] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399665.892639] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399667.731240] potentially unexpected fatal signal 5. [21399667.736591] CPU: 48 PID: 943669 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399667.748584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399667.758195] RIP: 0033:0x7fffffffe062 [21399667.762158] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399667.781400] RSP: 002b:000000c0001dfb90 EFLAGS: 00000297 [21399667.787068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399667.796019] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399667.804946] RBP: 000000c0001dfc28 R08: 0000000000000000 R09: 0000000000000000 [21399667.813874] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001dfc18 [21399667.822803] R13: 000000c0001cdf20 R14: 000000c0002d2540 R15: 00000000000e602b [21399667.830365] FS: 000000c000580098 GS: 0000000000000000 [21399670.736599] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399672.299353] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b55888858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.175869] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.338143] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399680.790774] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.258589] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.695687] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399696.346278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399696.424588] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399697.722008] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399699.115785] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6097 di:ffffffffff600000 [21399700.269625] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399709.360394] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399711.609643] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399714.276681] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399717.935817] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.258943] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.913226] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399730.481543] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399731.830888] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399734.760199] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.828482] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.877164] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399738.159386] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399747.593790] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399748.864602] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399749.389031] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399755.306022] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399760.273045] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399761.678984] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399762.194726] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399769.639869] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.176304] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.568845] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399775.876698] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399780.700260] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399781.439600] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29070 di:ffffffffff600000 [21399781.574301] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399781.889933] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399784.328506] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399788.282433] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399800.444940] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399810.764150] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399810.872863] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399811.258678] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399813.396152] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399823.666158] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399824.943269] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399825.002685] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727097 di:ffffffffff600000 [21399825.785587] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399827.998037] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399831.811778] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399832.496978] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736097 di:ffffffffff600000 [21399833.890697] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399841.854827] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399842.557399] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399847.198660] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399848.680239] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399849.719862] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399850.761088] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399852.118759] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399852.869143] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399854.091810] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399855.394587] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399857.283340] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399860.654064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399867.652385] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399868.959124] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399871.210482] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399879.120138] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399882.745559] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399886.157885] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399891.386825] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399902.067359] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399912.170315] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399912.238663] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.103314] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.209832] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399929.912955] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399929.968328] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399931.265499] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399934.705360] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399935.210167] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399944.679296] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399945.836845] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399949.510426] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399949.617116] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399952.777859] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399953.117078] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.580339] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.976693] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.757684] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.846057] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399958.660140] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5097 di:ffffffffff600000 [21399961.334210] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399962.566470] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399963.181402] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399968.101729] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399969.550254] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399971.611650] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399976.495031] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399978.395878] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399980.162700] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399983.441542] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.490085] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.918294] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399992.365538] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399996.829233] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21400006.028020] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30097 di:ffffffffff600000 [21400006.386534] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400006.436553] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400010.090497] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.048368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.682588] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.049570] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.367599] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.497971] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400025.498886] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400027.014174] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.553012] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.944828] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400034.182832] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400036.973661] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400039.319684] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400107.653737] exe[959279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce0cacb237 cs:33 sp:7edbf24d5ef8 ax:2f700000 si:55ce0cb392f7 di:ffffffffff600000 [21400267.948866] potentially unexpected fatal signal 11. [21400267.954192] CPU: 82 PID: 980016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400267.966192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400267.975839] RIP: 0033:0x55fa6b33e0e9 [21400267.979819] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21400267.999085] RSP: 002b:00007f894adaf448 EFLAGS: 00010213 [21400268.004733] RAX: 0000000000000016 RBX: 000055fa6b3883b9 RCX: 000055fa6b33e0d7 [21400268.012291] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f894adb05c0 [21400268.019860] RBP: 00007f894adb059c R08: 0000000027927554 R09: 00000000000000c8 [21400268.029415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f894adb05c0 [21400268.038331] R13: 000055fa6b3883b9 R14: 0000000000018912 R15: 0000000000000002 [21400268.045910] FS: 000055fa6bf9b480 GS: 0000000000000000 [21400358.896744] exe[963136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558de269ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400359.036532] exe[961057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c262addb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400919.035079] potentially unexpected fatal signal 5. [21400919.040305] CPU: 48 PID: 995945 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400919.052327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400919.061978] RIP: 0033:0x7fffffffe062 [21400919.066018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21400919.086641] RSP: 002b:000000c0004cdb90 EFLAGS: 00000297 [21400919.093604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21400919.102531] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000555d07c00000 [21400919.111559] RBP: 000000c0004cdc28 R08: 0000000000000000 R09: 0000000000000000 [21400919.120474] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004cdc18 [21400919.129433] R13: 000000c0004f2ab0 R14: 000000c0004ada40 R15: 00000000000f2a59 [21400919.138346] FS: 000000c000180098 GS: 0000000000000000 [21401651.886459] exe[988289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e64d9ab9 cs:33 sp:7f53882d6858 ax:0 si:5589e6533062 di:ffffffffff600000 [21401950.865701] potentially unexpected fatal signal 5. [21401950.870946] CPU: 30 PID: 948115 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21401950.882962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21401950.892637] RIP: 0033:0x7fffffffe062 [21401950.896637] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21401950.917247] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [21401950.924235] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21401950.933191] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21401950.942095] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [21401950.951037] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [21401950.959929] R13: 000000c0005d3f50 R14: 000000c0001656c0 R15: 00000000000e4c60 [21401950.968874] FS: 000000c00013b098 GS: 0000000000000000 [21402267.266628] exe[928606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6abc2aab9 cs:33 sp:7f011d6f7ef8 ax:0 si:20000100 di:ffffffffff600000 [21402894.686778] exe[30428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b014ec1ab9 cs:33 sp:7fabd77fe858 ax:0 si:55b014f1b062 di:ffffffffff600000 [21402979.388559] exe[30319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e4e10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80800000 [21403385.838442] exe[40126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc43c9ab9 cs:33 sp:7f88a3b75858 ax:0 si:560fc4423062 di:ffffffffff600000 [21404179.602119] exe[981064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563962c30ab9 cs:33 sp:7f8e9e0baef8 ax:0 si:20000100 di:ffffffffff600000 [21404468.042989] potentially unexpected fatal signal 11. [21404468.048308] CPU: 11 PID: 39799 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.060392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.070041] RIP: 0033:0x56451ecab0d0 [21404468.074091] Code: 68 05 00 00 00 e9 70 ff ff ff ff 25 8a 3f 15 00 68 18 00 00 00 e9 60 ff ff ff ff 25 82 3f 15 00 68 04 00 00 00 e9 50 ff ff ff 25 7a 3f 15 00 68 03 00 00 00 e9 40 ff ff ff ff 25 72 3f 15 00 [21404468.093328] RSP: 002b:00007feeb4061d78 EFLAGS: 00010246 [21404468.100893] RAX: 00007feeb4062480 RBX: 00007feeb40622e0 RCX: 0000000000000000 [21404468.109813] RDX: 00007feeb4062460 RSI: 0000000000000025 RDI: 000056451ed50390 [21404468.118817] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.127801] R10: 0000000000000000 R11: 0000000000000246 R12: 000056451ed50390 [21404468.137074] R13: 00007feeb4062460 R14: 0000000000000000 R15: 00007feeb40622e0 [21404468.145984] FS: 000056451f962480 GS: 0000000000000000 [21404468.166362] potentially unexpected fatal signal 11. [21404468.173256] CPU: 75 PID: 46770 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.186581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.197641] RIP: 0033:0x55dd5d726a1f [21404468.203080] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21404468.223654] RSP: 002b:00007f96ce12ed78 EFLAGS: 00010283 [21404468.230713] RAX: 0000000000000390 RBX: 00007f96ce12f2e0 RCX: 0000000000000000 [21404468.239683] RDX: 00007f96ce12f460 RSI: 0000000000000025 RDI: 000055dd5d786390 [21404468.248621] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.257566] R10: 0000000000000000 R11: 0000000000000246 R12: 000055dd5d786390 [21404468.266491] R13: 00007f96ce12f460 R14: 0000000000000000 R15: 00007f96ce12f2e0 [21404468.275462] FS: 000055dd5e398480 GS: 0000000000000000 [21404584.235595] potentially unexpected fatal signal 5. [21404584.240865] CPU: 82 PID: 66986 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404584.252794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404584.262434] RIP: 0033:0x7fffffffe062 [21404584.266472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21404584.285669] RSP: 002b:000000c0004a7b90 EFLAGS: 00000297 [21404584.291344] RAX: 0000563b2a8f9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21404584.300259] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000563b2a8f9000 [21404584.309268] RBP: 000000c0004a7c28 R08: 0000000000000009 R09: 000000000d2a5000 [21404584.318194] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0004a7c18 [21404584.327116] R13: 000000c000300f60 R14: 000000c000516540 R15: 000000000000ff63 [21404584.336066] FS: 000000c0004da098 GS: 0000000000000000 [21405224.403174] exe[72601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d1dbaab9 cs:33 sp:7f81d8c3fef8 ax:0 si:200013c0 di:ffffffffff600000 [21405505.198744] exe[71092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.350332] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.430998] exe[70529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.467104] exe[71643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377bc858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.470001] exe[70642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.590081] exe[72792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.695080] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.910677] exe[72607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.994240] exe[70639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405506.075811] exe[70772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405671.605990] potentially unexpected fatal signal 5. [21405671.611224] CPU: 20 PID: 71114 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21405671.623132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21405671.632781] RIP: 0033:0x7fffffffe062 [21405671.636809] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21405671.656007] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [21405671.663037] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21405671.670588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21405671.678139] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [21405671.685678] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [21405671.693331] R13: 000000c00002ab10 R14: 000000c000165a40 R15: 00000000000112ac [21405671.702265] FS: 000000c000180098 GS: 0000000000000000 [21406247.479852] warn_bad_vsyscall: 1 callbacks suppressed [21406247.479857] exe[61396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a0d745db1 cs:33 sp:ffffffffff600010 ax:0 si:ffffffffff600010 di:0 [21406672.952160] exe[109753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5927a6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:e8902000 [21406828.467490] exe[80436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a2365237 cs:33 sp:7ea7c4160ef8 ax:2f700000 si:55e2a23d32f7 di:ffffffffff600000 [21406828.550975] exe[74205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fc2c8a237 cs:33 sp:7ec91270aef8 ax:2f700000 si:557fc2cf82f7 di:ffffffffff600000 [21407145.638672] potentially unexpected fatal signal 5. [21407145.643918] CPU: 20 PID: 117093 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21407145.655893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21407145.665526] RIP: 0033:0x7fffffffe062 [21407145.669556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21407145.690119] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21407145.697155] RAX: 000055b7f414a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21407145.706062] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000055b7f414a000 [21407145.714973] RBP: 000000c0005fbc28 R08: 0000000000000009 R09: 000000000b0da000 [21407145.723881] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005fbc18 [21407145.732799] R13: 000000c00063ff50 R14: 000000c0004ae700 R15: 000000000001bf17 [21407145.741700] FS: 0000000001f6c6b0 GS: 0000000000000000 [21407309.151218] exe[93818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631cc65bab9 cs:33 sp:7f56ce496858 ax:0 si:5631cc6b5097 di:ffffffffff600000 [21407504.435163] exe[80267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b9755237 cs:33 sp:7fe0fc55eef8 ax:2f700000 si:55c5b97c32f7 di:ffffffffff600000 [21407609.119472] exe[74196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169a068ab9 cs:33 sp:7eb34fbfe858 ax:0 si:56169a0c2097 di:ffffffffff600000 [21407609.185560] exe[79066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a21cab9 cs:33 sp:7ecb9a4ae858 ax:0 si:55f03a276097 di:ffffffffff600000 [21408173.940746] exe[144391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abfdfe2ab9 cs:33 sp:7ebf70245ef8 ax:0 si:20006dc0 di:ffffffffff600000 [21408233.874309] exe[108817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a41c6ab9 cs:33 sp:7f76f606e858 ax:0 si:5623a4220062 di:ffffffffff600000 [21408238.236050] exe[152198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581b2b6fab9 cs:33 sp:7fe655250858 ax:0 si:5581b2bc9062 di:ffffffffff600000 [21409098.156763] potentially unexpected fatal signal 5. [21409098.161987] CPU: 11 PID: 163726 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.173956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.183568] RIP: 0033:0x7fffffffe062 [21409098.187566] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409098.206771] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21409098.213816] RAX: 000055b2570a1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409098.222708] RDX: 0000000000000003 RSI: 000000000015f000 RDI: 000055b2570a1000 [21409098.231691] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000e258000 [21409098.240563] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21409098.249493] R13: 000000c000181008 R14: 000000c00058a380 R15: 00000000000152f5 [21409098.258406] FS: 00007f44d4ff96c0 GS: 0000000000000000 [21409098.366349] potentially unexpected fatal signal 11. [21409098.372055] CPU: 55 PID: 87102 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.385354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.396356] RIP: 0033:0x55a52f4900e9 [21409098.401710] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21409098.422284] RSP: 002b:00007f4b50abd448 EFLAGS: 00010213 [21409098.429359] RAX: 0000000000000016 RBX: 000055a52f4da3b9 RCX: 000055a52f4900d7 [21409098.438345] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f4b50abe5c0 [21409098.447262] RBP: 00007f4b50abe59c R08: 0000000028f1e7f8 R09: 0000000000001ab4 [21409098.456179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b50abe5c0 [21409098.465161] R13: 000055a52f4da3b9 R14: 000000000036ed1d R15: 0000000000000002 [21409098.474045] FS: 000055a5300ed480 GS: 0000000000000000 [21409178.283661] potentially unexpected fatal signal 5. [21409178.288914] CPU: 72 PID: 129276 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409178.300910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409178.310532] RIP: 0033:0x7fffffffe062 [21409178.314511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409178.333725] RSP: 002b:000000c000567b90 EFLAGS: 00000297 [21409178.339364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409178.346909] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21409178.354503] RBP: 000000c000567c28 R08: 0000000000000000 R09: 0000000000000000 [21409178.362046] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000567c18 [21409178.369606] R13: 000000c0005703c0 R14: 000000c0001c36c0 R15: 0000000000015df7 [21409178.377190] FS: 0000000001f6c6b0 GS: 0000000000000000 [21410695.578703] exe[209437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b195ebcab9 cs:33 sp:7f844f463ef8 ax:0 si:20000140 di:ffffffffff600000 [21410745.179272] exe[215759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8ef29fab9 cs:33 sp:7f7ddc9feef8 ax:0 si:20000140 di:ffffffffff600000 [21410847.804242] exe[217676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d5cdb6ab9 cs:33 sp:7ea0051ecef8 ax:0 si:20000140 di:ffffffffff600000 [21410918.586677] exe[225895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b67ec8bab9 cs:33 sp:7ff69cdfeef8 ax:0 si:20000140 di:ffffffffff600000 [21410939.443332] exe[231251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f94bdab9 cs:33 sp:7f6dcbd44ef8 ax:0 si:20000140 di:ffffffffff600000 [21410963.291288] exe[228003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e0399ab9 cs:33 sp:7ee7e0fa2ef8 ax:0 si:20000140 di:ffffffffff600000 [21410977.914153] exe[234939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4ada35ab9 cs:33 sp:7ff625524ef8 ax:0 si:20000140 di:ffffffffff600000 [21411015.800054] exe[231292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639d0a9aab9 cs:33 sp:7fec5dc80ef8 ax:0 si:20000140 di:ffffffffff600000 [21411079.323173] exe[236966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642e4282ab9 cs:33 sp:7fce88b80ef8 ax:0 si:20000140 di:ffffffffff600000 [21412580.277588] exe[237259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629192e4237 cs:33 sp:7eac6eea6ef8 ax:2f700000 si:5629193522f7 di:ffffffffff600000 [21413091.444697] exe[271381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e8a450ab9 cs:33 sp:7effb33feef8 ax:0 si:20000140 di:ffffffffff600000 [21413094.547093] exe[272360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f3a9a1ab9 cs:33 sp:7f26beb25858 ax:0 si:558f3a9fb062 di:ffffffffff600000 [21413677.566332] potentially unexpected fatal signal 5. [21413677.571569] CPU: 27 PID: 283136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21413677.583551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21413677.593215] RIP: 0033:0x7fffffffe062 [21413677.597206] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21413677.616461] RSP: 002b:000000c000605b90 EFLAGS: 00000297 [21413677.622093] RAX: 000055f510639000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21413677.629653] RDX: 0000000000000001 RSI: 00000000001c7000 RDI: 000055f510639000 [21413677.638585] RBP: 000000c000605c28 R08: 0000000000000009 R09: 0000000014b94000 [21413677.647527] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000605c18 [21413677.656441] R13: 000000c0005fe150 R14: 000000c00017c8c0 R15: 0000000000043406 [21413677.664021] FS: 0000000001f6c6b0 GS: 0000000000000000 [21413874.031603] exe[227076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a7c081237 cs:33 sp:7ed56a10eef8 ax:2f700000 si:563a7c0ef2f7 di:ffffffffff600000 [21414181.873992] potentially unexpected fatal signal 5. [21414181.879201] CPU: 93 PID: 230861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21414181.891197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21414181.900818] RIP: 0033:0x7fffffffe062 [21414181.904788] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21414181.923967] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21414181.929583] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21414181.937128] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000056252a200000 [21414181.944723] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21414181.953634] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21414181.961221] R13: 000000c00017c008 R14: 000000c000588540 R15: 0000000000037ab8 [21414181.970154] FS: 00007feeb4b5a6c0 GS: 0000000000000000 [21414226.844684] exe[234963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563733e07237 cs:33 sp:7f69d93faef8 ax:2f700000 si:563733e752f7 di:ffffffffff600000 [21414374.531922] exe[290459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3e9963ab9 cs:33 sp:7fb827593ef8 ax:0 si:20000140 di:ffffffffff600000 [21414467.498144] exe[300889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a855fa8ab9 cs:33 sp:7f4a31072858 ax:0 si:55a856002062 di:ffffffffff600000 [21414819.731107] exe[313252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b4bc0ab9 cs:33 sp:7eeb93c37ef8 ax:0 si:20000040 di:ffffffffff600000 [21415079.281734] exe[327751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcaae4ab9 cs:33 sp:7f9e03a34858 ax:0 si:555bcab3e097 di:ffffffffff600000 [21415470.366210] exe[299675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56495b2e3237 cs:33 sp:7eca0fe3def8 ax:2f700000 si:56495b3512f7 di:ffffffffff600000 [21415688.076592] exe[311738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564057a6fab9 cs:33 sp:7ec9287feef8 ax:0 si:20000140 di:ffffffffff600000 [21415914.905283] exe[272401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e08999ab9 cs:33 sp:7f4d913c5ef8 ax:0 si:20000140 di:ffffffffff600000 [21416086.539575] exe[343301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6b353ab9 cs:33 sp:7f361c279858 ax:0 si:558d6b3ad097 di:ffffffffff600000 [21416313.855746] exe[334477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648d88aab9 cs:33 sp:7fe1398a0ef8 ax:0 si:20000040 di:ffffffffff600000 [21416476.302322] exe[299449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f41ca43ab9 cs:33 sp:7ec7eb74a858 ax:0 si:55f41ca9d070 di:ffffffffff600000 [21416992.346108] exe[343445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b011ad237 cs:33 sp:7fc51cd48ef8 ax:2f700000 si:555b0121b2f7 di:ffffffffff600000 [21416995.013634] exe[289231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef52f3e237 cs:33 sp:7f82bfee5ef8 ax:2f700000 si:55ef52fac2f7 di:ffffffffff600000 [21417004.315615] exe[361033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4a783d237 cs:33 sp:7f9c19decef8 ax:2f700000 si:55e4a78ab2f7 di:ffffffffff600000 [21417052.468372] exe[343142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56153fba7ab9 cs:33 sp:7fd13f3ec858 ax:0 si:56153fc01062 di:ffffffffff600000 [21417053.386610] exe[348835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562422cb4ab9 cs:33 sp:7f00818ec858 ax:0 si:562422d0e062 di:ffffffffff600000 [21417279.378515] exe[355136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56319d6c2237 cs:33 sp:7f663831fef8 ax:2f700000 si:56319d7302f7 di:ffffffffff600000 [21417282.068540] exe[359128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476ba3a237 cs:33 sp:7fc09bddbef8 ax:2f700000 si:56476baa82f7 di:ffffffffff600000 [21417354.242153] exe[309352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564824e0f237 cs:33 sp:7f4641071ef8 ax:2f700000 si:564824e7d2f7 di:ffffffffff600000 [21417358.958207] exe[298270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2506b237 cs:33 sp:7ebc3c70fef8 ax:2f700000 si:564e250d92f7 di:ffffffffff600000 [21417367.533780] exe[343241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc91188237 cs:33 sp:7f31d5a32ef8 ax:2f700000 si:55fc911f62f7 di:ffffffffff600000 [21417378.708841] exe[323581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a631963237 cs:33 sp:7ff60a738ef8 ax:2f700000 si:55a6319d12f7 di:ffffffffff600000 [21417394.174444] exe[343585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4d139237 cs:33 sp:7ed3ddde9ef8 ax:2f700000 si:55af4d1a72f7 di:ffffffffff600000 [21417446.157077] exe[317577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626fb3d9237 cs:33 sp:7ec69d503ef8 ax:2f700000 si:5626fb4472f7 di:ffffffffff600000 [21417645.408545] exe[337956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547af11ab9 cs:33 sp:7f414cd6e858 ax:0 si:56547af6b062 di:ffffffffff600000 [21417665.879520] potentially unexpected fatal signal 5. [21417665.884749] CPU: 41 PID: 355852 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417665.896750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417665.906417] RIP: 0033:0x7fffffffe062 [21417665.910395] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417665.929576] RSP: 002b:000000c0005cdb90 EFLAGS: 00000297 [21417665.935249] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417665.944151] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417665.951861] RBP: 000000c0005cdc28 R08: 0000000000000000 R09: 0000000000000000 [21417665.960783] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005cdc18 [21417665.968364] R13: 000000c0005e23c0 R14: 000000c000164a80 R15: 0000000000056cc2 [21417665.977303] FS: 0000000001f6c6b0 GS: 0000000000000000 [21417672.128457] potentially unexpected fatal signal 5. [21417672.133695] CPU: 94 PID: 356651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417672.145678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417672.155405] RIP: 0033:0x7fffffffe062 [21417672.159470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417672.180022] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21417672.187098] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417672.194717] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417672.203644] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21417672.212532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21417672.221459] R13: 000000c000030b10 R14: 000000c0004cddc0 R15: 0000000000056cc3 [21417672.230396] FS: 000000c000580098 GS: 0000000000000000 [21417795.857646] exe[372952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c1b74237 cs:33 sp:7fa71c89bef8 ax:2f700000 si:55e0c1be22f7 di:ffffffffff600000 [21417811.018308] exe[322365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a13dd237 cs:33 sp:7fd4ed19aef8 ax:2f700000 si:55d1a144b2f7 di:ffffffffff600000 [21418869.563407] potentially unexpected fatal signal 5. [21418869.568635] CPU: 84 PID: 400098 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418869.580633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418869.590266] RIP: 0033:0x7fffffffe062 [21418869.594253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418869.613440] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21418869.619084] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21418869.626670] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21418869.635703] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21418869.644638] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21418869.653678] R13: 000000c000030b10 R14: 000000c000492380 R15: 000000000005aaaa [21418869.662619] FS: 0000000001f6c6b0 GS: 0000000000000000 [21418882.881935] potentially unexpected fatal signal 11. [21418882.887258] CPU: 72 PID: 375225 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.899263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.908973] RIP: 0033:0x556abcfd4d97 [21418882.913013] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21418882.933675] RSP: 002b:00007fd6c974bc90 EFLAGS: 00010206 [21418882.935443] potentially unexpected fatal signal 5. [21418882.939296] RAX: 00007fd6c974c500 RBX: 00007fd6c974c1f0 RCX: 0000000000000000 [21418882.945894] CPU: 6 PID: 372495 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.945897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.945905] RIP: 0033:0x7fffffffe062 [21418882.945908] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418882.945909] RSP: 002b:000000c0005f9b90 EFLAGS: 00000297 [21418882.945911] RAX: 000000000006311e RBX: 0000000000000000 RCX: 00007fffffffe05a [21418882.945912] RDX: 0000000000000000 RSI: 000000c0005fa000 RDI: 0000000000012f00 [21418882.945913] RBP: 000000c0005f9c28 R08: 000000c000609a50 R09: 0000000000000000 [21418882.945914] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f9c18 [21418882.945915] R13: 000000c000601f50 R14: 000000c0004c6a80 R15: 000000000005aab0 [21418882.945920] FS: 000000c000180098 GS: 0000000000000000 [21418882.954792] RDX: 00007fd6c974c370 RSI: 0000556abd0573d8 RDI: 00007fd6c974c1f0 [21418882.954794] RBP: 00007fd6c974c2e0 R08: 0000000000000000 R09: 0000000000000000 [21418882.954795] R10: 0000000000001000 R11: 0000000000000293 R12: 0000556abd0573d8 [21418882.954796] R13: 00007fd6c974c370 R14: 0000000000000000 R15: 00007fd6c974c1f0 [21418882.954798] FS: 0000556abdc6a480 GS: 0000000000000000 [21418920.255201] exe[387465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639567da237 cs:33 sp:7fe1f9554ef8 ax:2f700000 si:5639568482f7 di:ffffffffff600000 [21419227.581174] exe[413105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f6c104ab9 cs:33 sp:7f64497afef8 ax:0 si:20000040 di:ffffffffff600000 [21419227.714228] exe[390319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c763cbab9 cs:33 sp:7fd90e2feef8 ax:0 si:20000040 di:ffffffffff600000 [21419496.098609] exe[399043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563659024ab9 cs:33 sp:7fe944867858 ax:0 si:56365907e097 di:ffffffffff600000 [21419627.711405] exe[410343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651cffdc237 cs:33 sp:7f98a7d88ef8 ax:2f700000 si:5651d004a2f7 di:ffffffffff600000 [21419952.928000] exe[382306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560619adc237 cs:33 sp:7f801e926ef8 ax:2f700000 si:560619b4a2f7 di:ffffffffff600000 [21420135.989010] exe[379783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee7e53ab9 cs:33 sp:7ff75390d858 ax:0 si:560ee7ead062 di:ffffffffff600000 [21420149.162911] exe[428734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d5b17ab9 cs:33 sp:7f0de753a858 ax:0 si:55f8d5b71062 di:ffffffffff600000 [21420165.434399] exe[392340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557601ea6ab9 cs:33 sp:7fb25bd89858 ax:0 si:557601f00062 di:ffffffffff600000 [21420182.749924] exe[439583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56311a977ab9 cs:33 sp:7f629cdf6858 ax:0 si:56311a9d1062 di:ffffffffff600000 [21420186.574670] exe[272414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146968cab9 cs:33 sp:7f365b6e1858 ax:0 si:5614696e6062 di:ffffffffff600000 [21420196.519938] exe[405618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583eed66ab9 cs:33 sp:7f60ca22a858 ax:0 si:5583eedc0062 di:ffffffffff600000 [21420204.480305] exe[399868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608e9f55ab9 cs:33 sp:7ed736ce9858 ax:0 si:5608e9faf062 di:ffffffffff600000 [21420232.163961] exe[432620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd834f9ab9 cs:33 sp:7eada6122858 ax:0 si:55bd83553062 di:ffffffffff600000 [21420329.551403] exe[429279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7f475ab9 cs:33 sp:7f354a725858 ax:0 si:55da7f4cf062 di:ffffffffff600000 [21420329.964186] exe[375874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557189982ab9 cs:33 sp:7fd2faada858 ax:0 si:5571899dc062 di:ffffffffff600000 [21420334.991102] exe[427890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563048d35ab9 cs:33 sp:7fd4a2c88858 ax:0 si:563048d8f062 di:ffffffffff600000 [21420349.544016] potentially unexpected fatal signal 5. [21420349.549265] CPU: 66 PID: 441220 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21420349.561260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21420349.570947] RIP: 0033:0x7fffffffe062 [21420349.574942] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21420349.595512] RSP: 002b:000000c000609b90 EFLAGS: 00000297 [21420349.602546] RAX: 0000557bf2c00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21420349.611481] RDX: 0000000000000001 RSI: 00000000000ef000 RDI: 0000557bf2c00000 [21420349.620409] RBP: 000000c000609c28 R08: 0000000000000009 R09: 0000000015b46000 [21420349.629368] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000609c18 [21420349.638329] R13: 000000c00040ee10 R14: 000000c000228540 R15: 000000000006a54e [21420349.645870] FS: 000000c00013a898 GS: 0000000000000000 [21420406.153110] exe[431787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565476397ab9 cs:33 sp:7ebd7759d858 ax:0 si:5654763f1062 di:ffffffffff600000 [21420479.492378] exe[443288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55805818aab9 cs:33 sp:7ef02d731858 ax:0 si:5580581e4062 di:ffffffffff600000 [21420659.373746] exe[442359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564a0308ab9 cs:33 sp:7ef018e96858 ax:0 si:5564a0362070 di:ffffffffff600000