1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.539308 14720 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.539360 14720 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc010c03f80 43 D0613 11:13:00.539381 14720 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.539706 14720 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.539761 14720 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.539799 14720 task_signals.go:204] [ 136: 137] Signal 136, PID: 137, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.539829 14720 task_exit.go:204] [ 136: 137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.539868 14720 task_exit.go:204] [ 136: 137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.539886 14720 task_exit.go:204] [ 136: 137] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.539929 14720 task_signals.go:204] [ 136: 138] Signal 136, PID: 138, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.539972 14720 task_exit.go:204] [ 136: 138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.540604 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.540703 14720 task_exit.go:204] [ 136: 138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.540725 14720 task_exit.go:204] [ 136: 138] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.540738 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.540899 14720 task_exit.go:204] [ 139: 139] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.542519 14720 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/57, 0x39}, {&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000340)=""/159, 0x9f}, {&(0x7f0000000400)=""/69, 0x45}, {&(0x7f0000000480)=""/59, 0x3b}, {&(0x7f0000002f40)=""/87, 0x57}], 0x9, &(0x7f0000000540)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000000580), 0x6e, &(0x7f0000001780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/169, 0xa9}, {&(0x7f00000016c0)=""/52, 0x34}, {&(0x7f0000001700)=""/98, 0x62}], 0x4, &(0x7f00000017c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000001880)=@abs, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001900)=""/2, 0x2}, {&(0x7f0000001940)=""/178, 0xb2}, {&(0x7f0000001a00)=""/93, 0x5d}, {&(0x7f0000001a80)=""/84, 0x54}, {&(0x7f0000001b00)=""/139, 0x8b}], 0x5, &(0x7f0000001c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000002e40)=[{&(0x7f0000001d40)=""/82, 0x52}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/16, 0x10}, {&(0x7f0000002e00)=""/62, 0x3e}], 0x4, &(0x7f0000002e80)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000003080)=""/252, 0xfc}, {&(0x7f0000003180)=""/85, 0x55}, {&(0x7f0000003200)=""/158, 0x9e}, {&(0x7f00000032c0)=""/15, 0xf}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/124, 0x7c}, {&(0x7f0000004380)=""/210, 0xd2}], 0x7, &(0x7f0000004500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}], 0x5, 0x100, &(0x7f0000003040)) (async) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000093c0), 0x0, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000040)=r2) (async) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSPGRP(r3, 0x5410, 0x0) D0613 11:13:00.554560 14720 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.554637 14720 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc00c98d3b0 39 D0613 11:13:00.554765 14720 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.556307 14720 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.556342 14720 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc00c98d3b0 40 D0613 11:13:00.556360 14720 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.566137 14720 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.566233 14720 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc00c98d3b0 41 D0613 11:13:00.566258 14720 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.573772 14720 usertrap_amd64.go:212] [ 143: 143] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:00.573862 14720 usertrap_amd64.go:122] [ 143: 143] Allocate a new trap: 0xc000ab0a80 42 D0613 11:13:00.574183 14720 usertrap_amd64.go:225] [ 143: 143] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.577081 14720 task_signals.go:470] [ 143: 143] Notified of signal 60 D0613 11:13:00.577184 14720 task_signals.go:204] [ 143: 143] Signal 143, PID: 143, TID: 0, fault addr: 0x3c: terminating thread group D0613 11:13:00.577211 14720 task_exit.go:204] [ 143: 143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.577819 14720 task_exit.go:204] [ 143: 143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.580044 14720 usertrap_amd64.go:212] [ 140: 142] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:00.580127 14720 usertrap_amd64.go:122] [ 140: 142] Allocate a new trap: 0xc00c98d3b0 42 D0613 11:13:00.580155 14720 usertrap_amd64.go:225] [ 140: 142] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.582814 14720 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.582893 14720 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc00c98d3b0 43 D0613 11:13:00.582918 14720 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.583105 14720 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.583182 14720 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.583223 14720 task_signals.go:204] [ 140: 141] Signal 140, PID: 141, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.583262 14720 task_exit.go:204] [ 140: 141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.583285 14720 task_exit.go:204] [ 140: 141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.583234 14720 task_signals.go:204] [ 140: 142] Signal 140, PID: 142, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.583292 14720 task_exit.go:204] [ 140: 141] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.583353 14720 task_exit.go:204] [ 140: 142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.584068 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.584171 14720 task_exit.go:204] [ 140: 142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.584198 14720 task_exit.go:204] [ 140: 142] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.584211 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.584757 14720 task_exit.go:204] [ 143: 143] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.587368 14720 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4c1c, @dev}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0xffffffffffffffff, 0x7fffffff, 0x24}) sendto$inet(r2, &(0x7f0000000040)="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", 0xff, 0x48000, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) D0613 11:13:00.610638 14720 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.610729 14720 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc00c98d470 39 D0613 11:13:00.610985 14720 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.613668 14720 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.613735 14720 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc00c98d470 40 D0613 11:13:00.613755 14720 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.622046 14720 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.622135 14720 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc00c98d470 41 D0613 11:13:00.622161 14720 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.636394 14720 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.636458 14720 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc00c98d470 42 D0613 11:13:00.636481 14720 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.638414 14720 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.638511 14720 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.638583 14720 task_signals.go:204] [ 144: 145] Signal 144, PID: 145, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.638679 14720 task_exit.go:204] [ 144: 145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.639212 14720 task_exit.go:204] [ 144: 145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.639266 14720 task_exit.go:204] [ 144: 145] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.639285 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.640341 14720 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4c1c, @dev}, 0x10) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0xffffffffffffffff, 0x7fffffff, 0x24}) sendto$inet(r2, &(0x7f0000000040)="76710f944b424dc972d8c98a2de88be9373b169afc0864071b238616aa1c66516f7bbed37143a7899a0a1f02de2786b91ee61b90414c287962e42bd604f34756f6c6bec21fd7b091260e6eecd12c2063c00c0b7a6e4dda9960371bc813d557991356e2d3bd21f01396aeb20265012da1ff2d813533027b4976fd153fbe22a547d092691339594da0fb9bb210f2018965efb27bcff728dcd0b4eed0eeeaeee039806eb88a559b8155a6b605a3e1bf3a830ea7818a5937c0623ff60e053654014a05ef5b8918dd6d113cf4d997691b1aac206039bae88e8d448c17caf808925e4cf01a266630da871629270798406dfedf656dfb4942a3fb83c8ad0c024dd046", 0xff, 0x48000, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) D0613 11:13:00.652229 14720 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.652282 14720 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc01162c2d0 39 D0613 11:13:00.652451 14720 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.653608 14720 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.653643 14720 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc01162c2d0 40 D0613 11:13:00.653654 14720 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.664260 14720 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.664357 14720 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc01162c2d0 41 D0613 11:13:00.664391 14720 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.668447 14720 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:00.668518 14720 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc01162c2d0 42 D0613 11:13:00.668540 14720 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.671221 14720 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.671284 14720 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc01162c2d0 43 D0613 11:13:00.671307 14720 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.673111 14720 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.673216 14720 task_signals.go:204] [ 146: 148] Signal 146, PID: 148, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.673277 14720 task_exit.go:204] [ 146: 148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.673309 14720 task_exit.go:204] [ 146: 148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.673315 14720 task_exit.go:204] [ 146: 148] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.673335 14720 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.673351 14720 task_signals.go:204] [ 146: 147] Signal 146, PID: 147, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.673381 14720 task_exit.go:204] [ 146: 147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.673796 14720 task_exit.go:204] [ 146: 147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.673829 14720 task_exit.go:204] [ 146: 147] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.673846 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.674633 14720 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4c1c, @dev}, 0x10) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0xffffffffffffffff, 0x7fffffff, 0x24}) sendto$inet(r2, &(0x7f0000000040)="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", 0xff, 0x48000, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) D0613 11:13:00.689199 14720 usertrap_amd64.go:212] [ 149: 149] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.689276 14720 usertrap_amd64.go:122] [ 149: 149] Allocate a new trap: 0xc00c98d530 39 D0613 11:13:00.689418 14720 usertrap_amd64.go:225] [ 149: 149] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.690639 14720 usertrap_amd64.go:212] [ 149: 149] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.690673 14720 usertrap_amd64.go:122] [ 149: 149] Allocate a new trap: 0xc00c98d530 40 D0613 11:13:00.690687 14720 usertrap_amd64.go:225] [ 149: 149] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.702038 14720 usertrap_amd64.go:212] [ 149: 149] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.702094 14720 usertrap_amd64.go:122] [ 149: 149] Allocate a new trap: 0xc00c98d530 41 D0613 11:13:00.702111 14720 usertrap_amd64.go:225] [ 149: 149] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.706458 14720 usertrap_amd64.go:212] [ 149: 149] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.706523 14720 usertrap_amd64.go:122] [ 149: 149] Allocate a new trap: 0xc00c98d530 42 D0613 11:13:00.706550 14720 usertrap_amd64.go:225] [ 149: 149] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.708198 14720 task_exit.go:204] [ 149: 149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.708312 14720 task_exit.go:204] [ 149: 149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.708380 14720 task_signals.go:204] [ 149: 151] Signal 149, PID: 151, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.708528 14720 task_exit.go:204] [ 149: 151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.708450 14720 task_signals.go:204] [ 149: 150] Signal 149, PID: 150, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.708601 14720 task_exit.go:204] [ 149: 151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.708633 14720 task_exit.go:204] [ 149: 151] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.708670 14720 task_exit.go:204] [ 149: 150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.709310 14720 task_exit.go:204] [ 149: 150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.709501 14720 task_exit.go:204] [ 149: 150] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.709612 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.710181 14720 task_exit.go:204] [ 149: 149] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaa0086dd60b761cb00fe880000000000000000000000000001fe8000000000000000000000000000aa22000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) D0613 11:13:00.724399 14720 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.724512 14720 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc002f82720 39 D0613 11:13:00.724692 14720 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.726562 14720 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.726592 14720 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc002f82720 40 D0613 11:13:00.726608 14720 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.743328 14720 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.743400 14720 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc002f82720 41 D0613 11:13:00.743421 14720 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.749812 14720 usertrap_amd64.go:212] [ 152: 153] Found the pattern at ip 5604396c3f18:sysno 1 D0613 11:13:00.749860 14720 usertrap_amd64.go:122] [ 152: 153] Allocate a new trap: 0xc002f82720 42 D0613 11:13:00.749877 14720 usertrap_amd64.go:225] [ 152: 153] Apply the binary patch addr 5604396c3f18 trap addr 62d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.754227 14720 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.754280 14720 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc002f82720 43 D0613 11:13:00.754300 14720 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.755757 14720 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.755820 14720 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.755854 14720 task_signals.go:204] [ 152: 153] Signal 152, PID: 153, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.755874 14720 task_exit.go:204] [ 152: 153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.756434 14720 task_exit.go:204] [ 152: 153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.756509 14720 task_exit.go:204] [ 152: 153] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.756530 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.757522 14720 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaa0086dd60b761cb00fe880000000000000000000000000001fe8000000000000000000000000000aa22000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) D0613 11:13:00.774170 14720 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.774350 14720 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc00c98d590 39 D0613 11:13:00.774632 14720 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.778226 14720 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.778401 14720 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc00c98d590 40 D0613 11:13:00.778567 14720 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.792865 14720 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.793097 14720 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc00c98d590 41 D0613 11:13:00.793216 14720 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.797150 14720 usertrap_amd64.go:212] [ 154: 155] Found the pattern at ip 5604396c3f18:sysno 1 D0613 11:13:00.797228 14720 usertrap_amd64.go:122] [ 154: 155] Allocate a new trap: 0xc00c98d590 42 D0613 11:13:00.797255 14720 usertrap_amd64.go:225] [ 154: 155] Apply the binary patch addr 5604396c3f18 trap addr 62d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.799294 14720 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.799368 14720 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc00c98d590 43 D0613 11:13:00.799392 14720 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.800350 14720 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.800428 14720 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.800483 14720 task_signals.go:204] [ 154: 155] Signal 154, PID: 155, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.800516 14720 task_exit.go:204] [ 154: 155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.801716 14720 task_exit.go:204] [ 154: 155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.801775 14720 task_exit.go:204] [ 154: 155] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.801792 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.802738 14720 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaa0086dd60b761cb00fe880000000000000000000000000001fe8000000000000000000000000000aa22000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) D0613 11:13:00.815970 14720 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.816050 14720 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc003b98d80 39 D0613 11:13:00.816300 14720 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.821070 14720 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.821147 14720 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc003b98d80 40 D0613 11:13:00.821217 14720 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.834873 14720 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.834955 14720 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc003b98d80 41 D0613 11:13:00.834978 14720 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.837699 14720 usertrap_amd64.go:212] [ 156: 157] Found the pattern at ip 5604396c3f18:sysno 1 D0613 11:13:00.837730 14720 usertrap_amd64.go:122] [ 156: 157] Allocate a new trap: 0xc003b98d80 42 D0613 11:13:00.837750 14720 usertrap_amd64.go:225] [ 156: 157] Apply the binary patch addr 5604396c3f18 trap addr 62d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:00.839390 14720 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:00.839430 14720 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc003b98d80 43 D0613 11:13:00.839448 14720 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:00.840480 14720 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.840613 14720 task_signals.go:204] [ 156: 157] Signal 156, PID: 157, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:00.840652 14720 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.840708 14720 task_exit.go:204] [ 156: 157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:00.841329 14720 task_exit.go:204] [ 156: 157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:00.841460 14720 task_exit.go:204] [ 156: 157] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:00.841489 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:00.841682 14720 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:00 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xecf86c37d5304817) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/&%]*'}]}, 0x11) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa400017a) read(r1, &(0x7f0000000380)=""/224, 0xe0) read(r1, &(0x7f0000000180)=""/57, 0x39) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) D0613 11:13:00.857895 14720 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:00.857944 14720 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc003b98f60 39 D0613 11:13:00.858169 14720 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:00.860214 14720 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:00.860305 14720 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc003b98f60 40 D0613 11:13:00.860333 14720 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:00.874232 14720 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:00.874305 14720 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc003b98f60 41 D0613 11:13:00.874331 14720 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:00.988728 14720 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:00.988804 14720 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc003b98f60 42 D0613 11:13:00.988827 14720 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:01.701792 14720 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:01.701876 14720 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc003b98f60 43 D0613 11:13:01.701901 14720 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:01.703922 14720 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:01.704038 14720 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:01.704090 14720 task_signals.go:204] [ 158: 159] Signal 158, PID: 159, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:01.704126 14720 task_exit.go:204] [ 158: 159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:01.704142 14720 task_exit.go:204] [ 158: 159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:01.704149 14720 task_exit.go:204] [ 158: 159] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:01.704174 14720 task_signals.go:204] [ 158: 160] Signal 158, PID: 160, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:01.704200 14720 task_exit.go:204] [ 158: 160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:01.704213 14720 task_exit.go:204] [ 158: 160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:01.704220 14720 task_exit.go:204] [ 158: 160] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:01.704254 14720 task_signals.go:204] [ 158: 161] Signal 158, PID: 161, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:01.704284 14720 task_exit.go:204] [ 158: 161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:01.704814 14720 task_exit.go:204] [ 158: 161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:01.704862 14720 task_exit.go:204] [ 158: 161] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:01.704885 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:01.706369 14720 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0xecf86c37d5304817) (async) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xecf86c37d5304817) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/&%]*'}]}, 0x11) (async) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/&%]*'}]}, 0x11) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa400017a) read(r1, &(0x7f0000000380)=""/224, 0xe0) read(r1, &(0x7f0000000180)=""/57, 0x39) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) D0613 11:13:01.750907 14720 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:01.750987 14720 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc002f829f0 39 D0613 11:13:01.751126 14720 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:01.753659 14720 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:01.753704 14720 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc002f829f0 40 D0613 11:13:01.753722 14720 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:01.767222 14720 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:01.767313 14720 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc002f829f0 41 D0613 11:13:01.767337 14720 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:01.876619 14720 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:01.876682 14720 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc002f829f0 42 D0613 11:13:01.876704 14720 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:02.595897 14720 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:02.595966 14720 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc002f829f0 43 D0613 11:13:02.595988 14720 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:02.597723 14720 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:02.597828 14720 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:02.597874 14720 task_signals.go:204] [ 162: 163] Signal 162, PID: 163, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:02.597896 14720 task_exit.go:204] [ 162: 163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:02.597911 14720 task_exit.go:204] [ 162: 163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:02.597926 14720 task_exit.go:204] [ 162: 163] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:02.597948 14720 task_signals.go:204] [ 162: 164] Signal 162, PID: 164, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:02.597961 14720 task_exit.go:204] [ 162: 164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:02.597972 14720 task_exit.go:204] [ 162: 164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:02.597977 14720 task_exit.go:204] [ 162: 164] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:02.597994 14720 task_signals.go:204] [ 162: 165] Signal 162, PID: 165, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:02.598003 14720 task_exit.go:204] [ 162: 165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:02.598563 14720 task_exit.go:204] [ 162: 165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:02.598599 14720 task_exit.go:204] [ 162: 165] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:02.598614 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:02.598862 14720 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:02 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xecf86c37d5304817) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/&%]*'}]}, 0x11) (async) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa400017a) read(r1, &(0x7f0000000380)=""/224, 0xe0) (async) read(r1, &(0x7f0000000180)=""/57, 0x39) (async) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) D0613 11:13:02.617805 14720 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:02.617874 14720 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc01162c960 39 D0613 11:13:02.618067 14720 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:02.621274 14720 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:02.621333 14720 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc01162c960 40 D0613 11:13:02.621353 14720 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:02.629909 14720 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:02.629963 14720 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc01162c960 41 D0613 11:13:02.629985 14720 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:02.640259 14720 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:02.640321 14720 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc01162c960 42 D0613 11:13:02.640345 14720 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.459006 14720 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.459070 14720 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc01162c960 43 D0613 11:13:03.459092 14720 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:03.461501 14720 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.461610 14720 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.461667 14720 task_signals.go:204] [ 166: 167] Signal 166, PID: 167, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.461693 14720 task_exit.go:204] [ 166: 167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.461708 14720 task_exit.go:204] [ 166: 167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.461715 14720 task_exit.go:204] [ 166: 167] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.461777 14720 task_signals.go:204] [ 166: 168] Signal 166, PID: 168, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.461933 14720 task_exit.go:204] [ 166: 168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.461983 14720 task_exit.go:204] [ 166: 168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.462015 14720 task_exit.go:204] [ 166: 168] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.461850 14720 task_signals.go:204] [ 166: 169] Signal 166, PID: 169, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.462060 14720 task_exit.go:204] [ 166: 169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.463375 14720 task_exit.go:204] [ 166: 169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.463419 14720 task_exit.go:204] [ 166: 169] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.463438 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.463837 14720 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, 0x0) D0613 11:13:03.474872 14720 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.474954 14720 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc00c98d890 39 D0613 11:13:03.475179 14720 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.477065 14720 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.477149 14720 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc00c98d890 40 D0613 11:13:03.477175 14720 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.487270 14720 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.487332 14720 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc00c98d890 41 D0613 11:13:03.487358 14720 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.496175 14720 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.496259 14720 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc00c98d890 42 D0613 11:13:03.496283 14720 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.498417 14720 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.498498 14720 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.498545 14720 task_signals.go:204] [ 170: 171] Signal 170, PID: 171, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.498575 14720 task_exit.go:204] [ 170: 171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.499095 14720 task_exit.go:204] [ 170: 171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.499128 14720 task_exit.go:204] [ 170: 171] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.499146 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.499482 14720 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x401c5820, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:03.518312 14720 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.518391 14720 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc01162cae0 39 D0613 11:13:03.518592 14720 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.520326 14720 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.520369 14720 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc01162cae0 40 D0613 11:13:03.520387 14720 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.542640 14720 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.542710 14720 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc01162cae0 41 D0613 11:13:03.542733 14720 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.551164 14720 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.551245 14720 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc01162cae0 42 D0613 11:13:03.551271 14720 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.552655 14720 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.552749 14720 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.552790 14720 task_signals.go:204] [ 172: 173] Signal 172, PID: 173, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.552820 14720 task_exit.go:204] [ 172: 173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.553328 14720 task_exit.go:204] [ 172: 173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.553370 14720 task_exit.go:204] [ 172: 173] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.553392 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.554556 14720 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:03.563906 14720 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.563947 14720 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc002f82f00 39 D0613 11:13:03.564064 14720 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.566850 14720 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.566936 14720 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc002f82f00 40 D0613 11:13:03.566968 14720 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.581364 14720 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.581430 14720 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc002f82f00 41 D0613 11:13:03.581453 14720 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.593752 14720 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.593826 14720 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc002f82f00 42 D0613 11:13:03.593852 14720 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.595341 14720 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.595431 14720 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.595467 14720 task_signals.go:204] [ 174: 175] Signal 174, PID: 175, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.595488 14720 task_exit.go:204] [ 174: 175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.595961 14720 task_exit.go:204] [ 174: 175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.596005 14720 task_exit.go:204] [ 174: 175] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.596038 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.596891 14720 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:03.609505 14720 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.609604 14720 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc000ab0ea0 39 D0613 11:13:03.609788 14720 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.612058 14720 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.612117 14720 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc000ab0ea0 40 D0613 11:13:03.612138 14720 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.626271 14720 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.626350 14720 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc000ab0ea0 41 D0613 11:13:03.626377 14720 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.635101 14720 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.635204 14720 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc000ab0ea0 42 D0613 11:13:03.635225 14720 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.637409 14720 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.637459 14720 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.637493 14720 task_signals.go:204] [ 176: 177] Signal 176, PID: 177, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.637513 14720 task_exit.go:204] [ 176: 177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.638005 14720 task_exit.go:204] [ 176: 177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.638036 14720 task_exit.go:204] [ 176: 177] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.638053 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.638282 14720 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: prctl$PR_SET_VMA(0x4, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:03.651736 14720 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.651813 14720 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc0110b4660 39 D0613 11:13:03.652254 14720 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.654513 14720 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.654594 14720 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc0110b4660 40 D0613 11:13:03.654617 14720 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.673225 14720 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.673304 14720 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc0110b4660 41 D0613 11:13:03.673340 14720 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.680991 14720 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.681058 14720 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc0110b4660 42 D0613 11:13:03.681082 14720 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.682456 14720 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.682559 14720 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.682617 14720 task_signals.go:204] [ 178: 179] Signal 178, PID: 179, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.682638 14720 task_exit.go:204] [ 178: 179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.683315 14720 task_exit.go:204] [ 178: 179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.683387 14720 task_exit.go:204] [ 178: 179] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.683408 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.683448 14720 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b66, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:03.701844 14720 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.701908 14720 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc00c98dc80 39 D0613 11:13:03.702057 14720 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.705121 14720 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.705246 14720 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc00c98dc80 40 D0613 11:13:03.705271 14720 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.717095 14720 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.717167 14720 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc00c98dc80 41 D0613 11:13:03.717188 14720 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.724250 14720 usertrap_amd64.go:212] [ 180: 181] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:03.724339 14720 usertrap_amd64.go:122] [ 180: 181] Allocate a new trap: 0xc00c98dc80 42 D0613 11:13:03.724365 14720 usertrap_amd64.go:225] [ 180: 181] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.737074 14720 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.737145 14720 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc00c98dc80 43 D0613 11:13:03.737170 14720 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:03.737464 14720 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.737551 14720 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.737590 14720 task_signals.go:204] [ 180: 181] Signal 180, PID: 181, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.737614 14720 task_exit.go:204] [ 180: 181] Transitioning from exit state TaskExitNone to TaskExitInitiated 11:13:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x5412, &(0x7f00000000c0)) D0613 11:13:03.738205 14720 task_exit.go:204] [ 180: 181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.738243 14720 task_exit.go:204] [ 180: 181] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.738268 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.738435 14720 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.753582 14720 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.753649 14720 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc0110b48d0 39 D0613 11:13:03.753942 14720 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.757693 14720 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.757772 14720 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc0110b48d0 40 D0613 11:13:03.757799 14720 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.769100 14720 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.769169 14720 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc0110b48d0 41 D0613 11:13:03.769195 14720 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.776451 14720 usertrap_amd64.go:212] [ 182: 183] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:03.776589 14720 usertrap_amd64.go:122] [ 182: 183] Allocate a new trap: 0xc0110b48d0 42 D0613 11:13:03.776634 14720 usertrap_amd64.go:225] [ 182: 183] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.784927 14720 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.785086 14720 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc0110b48d0 43 D0613 11:13:03.785108 14720 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:03.785500 14720 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.785574 14720 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.785621 14720 task_signals.go:204] [ 182: 183] Signal 182, PID: 183, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.785643 14720 task_exit.go:204] [ 182: 183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.786172 14720 task_exit.go:204] [ 182: 183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.786202 14720 task_exit.go:204] [ 182: 183] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.786244 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.787699 14720 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8920, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:03.803957 14720 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.804040 14720 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc00c98dfb0 39 D0613 11:13:03.804439 14720 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.806376 14720 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.806433 14720 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc00c98dfb0 40 D0613 11:13:03.806453 14720 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.816820 14720 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.816912 14720 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc00c98dfb0 41 D0613 11:13:03.817006 14720 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.826923 14720 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.826996 14720 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc00c98dfb0 42 D0613 11:13:03.827016 14720 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.830635 14720 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.830753 14720 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.830802 14720 task_signals.go:204] [ 184: 185] Signal 184, PID: 185, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.830822 14720 task_exit.go:204] [ 184: 185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.837563 14720 task_exit.go:204] [ 184: 185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.837671 14720 task_exit.go:204] [ 184: 185] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.837706 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 11:13:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, 0x0) D0613 11:13:03.839117 14720 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.851547 14720 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.851615 14720 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc003b99380 39 D0613 11:13:03.851733 14720 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.856303 14720 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.856375 14720 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc003b99380 40 D0613 11:13:03.856398 14720 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.868321 14720 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.868380 14720 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc003b99380 41 D0613 11:13:03.868399 14720 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.875190 14720 usertrap_amd64.go:212] [ 186: 187] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:03.875404 14720 usertrap_amd64.go:122] [ 186: 187] Allocate a new trap: 0xc003b99380 42 D0613 11:13:03.875460 14720 usertrap_amd64.go:225] [ 186: 187] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.886734 14720 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.886807 14720 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc003b99380 43 D0613 11:13:03.886829 14720 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:03.888486 14720 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.888571 14720 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.888612 14720 task_signals.go:204] [ 186: 187] Signal 186, PID: 187, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.888657 14720 task_exit.go:204] [ 186: 187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.889924 14720 task_exit.go:204] [ 186: 187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.890021 14720 task_exit.go:204] [ 186: 187] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.890047 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.891025 14720 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b30, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:03.928996 14720 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.929083 14720 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc01162cd20 39 D0613 11:13:03.929250 14720 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.931697 14720 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.931770 14720 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc01162cd20 40 D0613 11:13:03.931795 14720 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.940182 14720 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.940235 14720 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc01162cd20 41 D0613 11:13:03.940254 14720 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:03.949640 14720 usertrap_amd64.go:212] [ 188: 189] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:03.949699 14720 usertrap_amd64.go:122] [ 188: 189] Allocate a new trap: 0xc01162cd20 42 D0613 11:13:03.949719 14720 usertrap_amd64.go:225] [ 188: 189] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:03.957622 14720 task_signals.go:470] [ 7: 54887] Notified of signal 23 D0613 11:13:03.957816 14720 task_signals.go:220] [ 7: 54887] Signal 23: delivering to handler D0613 11:13:03.960741 14720 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:03.960790 14720 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc01162cd20 43 D0613 11:13:03.960813 14720 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:03.961356 14720 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.961428 14720 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.961465 14720 task_signals.go:204] [ 188: 189] Signal 188, PID: 189, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:03.961497 14720 task_exit.go:204] [ 188: 189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:03.962811 14720 task_exit.go:204] [ 188: 189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:03.962854 14720 task_exit.go:204] [ 188: 189] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:03.962878 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:03.963341 14720 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b65, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:03.981380 14720 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:03.981588 14720 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc000ab1440 39 D0613 11:13:03.981863 14720 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:03.983602 14720 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:03.983671 14720 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc000ab1440 40 D0613 11:13:03.983702 14720 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:03.996437 14720 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:03.996501 14720 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc000ab1440 41 D0613 11:13:03.996528 14720 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.005136 14720 usertrap_amd64.go:212] [ 190: 191] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.005207 14720 usertrap_amd64.go:122] [ 190: 191] Allocate a new trap: 0xc000ab1440 42 D0613 11:13:04.005231 14720 usertrap_amd64.go:225] [ 190: 191] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.016033 14720 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.016098 14720 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc000ab1440 43 D0613 11:13:04.016120 14720 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.016339 14720 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.016450 14720 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.016496 14720 task_signals.go:204] [ 190: 191] Signal 190, PID: 191, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.016547 14720 task_exit.go:204] [ 190: 191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.017595 14720 task_exit.go:204] [ 190: 191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.017673 14720 task_exit.go:204] [ 190: 191] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.017717 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.018687 14720 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5409, 0x0) D0613 11:13:04.028658 14720 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.028712 14720 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc00ec341e0 39 D0613 11:13:04.028787 14720 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.029741 14720 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.029772 14720 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc00ec341e0 40 D0613 11:13:04.029789 14720 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.037436 14720 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.037477 14720 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc00ec341e0 41 D0613 11:13:04.037501 14720 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.041958 14720 usertrap_amd64.go:212] [ 192: 193] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.041990 14720 usertrap_amd64.go:122] [ 192: 193] Allocate a new trap: 0xc00ec341e0 42 D0613 11:13:04.042002 14720 usertrap_amd64.go:225] [ 192: 193] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.053998 14720 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.054078 14720 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc00ec341e0 43 D0613 11:13:04.054103 14720 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.054460 14720 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.054521 14720 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.054588 14720 task_signals.go:204] [ 192: 193] Signal 192, PID: 193, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.054624 14720 task_exit.go:204] [ 192: 193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.055355 14720 task_exit.go:204] [ 192: 193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.055448 14720 task_exit.go:204] [ 192: 193] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.055478 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.055999 14720 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfb, 0x0) D0613 11:13:04.068990 14720 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.069067 14720 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000ab1560 39 D0613 11:13:04.069403 14720 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.070800 14720 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.070845 14720 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000ab1560 40 D0613 11:13:04.070863 14720 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.080617 14720 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.080693 14720 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000ab1560 41 D0613 11:13:04.080715 14720 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.086213 14720 usertrap_amd64.go:212] [ 194: 195] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.086275 14720 usertrap_amd64.go:122] [ 194: 195] Allocate a new trap: 0xc000ab1560 42 D0613 11:13:04.086295 14720 usertrap_amd64.go:225] [ 194: 195] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.094975 14720 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.095037 14720 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000ab1560 43 D0613 11:13:04.095056 14720 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.095194 14720 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.095241 14720 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.095275 14720 task_signals.go:204] [ 194: 195] Signal 194, PID: 195, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.095304 14720 task_exit.go:204] [ 194: 195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.095853 14720 task_exit.go:204] [ 194: 195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.096016 14720 task_exit.go:204] [ 194: 195] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.096064 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.096170 14720 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x801c581f, 0x0) D0613 11:13:04.109595 14720 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.109671 14720 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc0110b4d80 39 D0613 11:13:04.109768 14720 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.114021 14720 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.114086 14720 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc0110b4d80 40 D0613 11:13:04.114112 14720 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.124288 14720 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.124340 14720 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc0110b4d80 41 D0613 11:13:04.124361 14720 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.130503 14720 usertrap_amd64.go:212] [ 196: 197] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.130576 14720 usertrap_amd64.go:122] [ 196: 197] Allocate a new trap: 0xc0110b4d80 42 D0613 11:13:04.130598 14720 usertrap_amd64.go:225] [ 196: 197] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.148246 14720 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.148314 14720 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc0110b4d80 43 D0613 11:13:04.148335 14720 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.148434 14720 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.148479 14720 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.148497 14720 task_signals.go:204] [ 196: 197] Signal 196, PID: 197, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.148558 14720 task_exit.go:204] [ 196: 197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.149129 14720 task_exit.go:204] [ 196: 197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.149169 14720 task_exit.go:204] [ 196: 197] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.149188 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.149268 14720 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x560a, &(0x7f00000000c0)) D0613 11:13:04.164678 14720 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.164744 14720 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc00ec34450 39 D0613 11:13:04.164849 14720 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.166045 14720 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.166081 14720 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc00ec34450 40 D0613 11:13:04.166099 14720 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.177909 14720 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.178040 14720 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc00ec34450 41 D0613 11:13:04.178088 14720 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.183672 14720 usertrap_amd64.go:212] [ 198: 199] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.183762 14720 usertrap_amd64.go:122] [ 198: 199] Allocate a new trap: 0xc00ec34450 42 D0613 11:13:04.183788 14720 usertrap_amd64.go:225] [ 198: 199] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.195383 14720 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.195488 14720 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc00ec34450 43 D0613 11:13:04.195517 14720 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.196058 14720 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.196141 14720 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.196257 14720 task_signals.go:204] [ 198: 199] Signal 198, PID: 199, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.196297 14720 task_exit.go:204] [ 198: 199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.196920 14720 task_exit.go:204] [ 198: 199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.197037 14720 task_exit.go:204] [ 198: 199] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.197063 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.197117 14720 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0189436, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.209848 14720 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.209910 14720 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc01162d0e0 39 D0613 11:13:04.210126 14720 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.211564 14720 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.211624 14720 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc01162d0e0 40 D0613 11:13:04.211650 14720 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.221004 14720 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.221066 14720 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc01162d0e0 41 D0613 11:13:04.221092 14720 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.226960 14720 usertrap_amd64.go:212] [ 200: 201] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.227018 14720 usertrap_amd64.go:122] [ 200: 201] Allocate a new trap: 0xc01162d0e0 42 D0613 11:13:04.227042 14720 usertrap_amd64.go:225] [ 200: 201] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.244581 14720 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.244652 14720 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc01162d0e0 43 D0613 11:13:04.244676 14720 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.245740 14720 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.245841 14720 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.245919 14720 task_signals.go:204] [ 200: 201] Signal 200, PID: 201, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.245993 14720 task_exit.go:204] [ 200: 201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.246637 14720 task_exit.go:204] [ 200: 201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.246748 14720 task_exit.go:204] [ 200: 201] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.246790 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.247816 14720 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.261876 14720 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.261964 14720 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc002f83350 39 D0613 11:13:04.262138 14720 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.263858 14720 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.263912 14720 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc002f83350 40 D0613 11:13:04.263930 14720 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.274508 14720 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.274570 14720 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc002f83350 41 D0613 11:13:04.274598 14720 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.281178 14720 usertrap_amd64.go:212] [ 202: 203] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.281244 14720 usertrap_amd64.go:122] [ 202: 203] Allocate a new trap: 0xc002f83350 42 D0613 11:13:04.281266 14720 usertrap_amd64.go:225] [ 202: 203] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.292306 14720 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.292391 14720 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc002f83350 43 D0613 11:13:04.292423 14720 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.294490 14720 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.294584 14720 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.294645 14720 task_signals.go:204] [ 202: 203] Signal 202, PID: 203, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.294719 14720 task_exit.go:204] [ 202: 203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.295485 14720 task_exit.go:204] [ 202: 203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.295613 14720 task_exit.go:204] [ 202: 203] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.295637 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.299275 14720 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:04.316788 14720 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.316857 14720 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc00ec34510 39 D0613 11:13:04.317074 14720 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.318606 14720 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.318709 14720 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc00ec34510 40 D0613 11:13:04.318740 14720 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.330903 14720 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.330978 14720 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc00ec34510 41 D0613 11:13:04.331005 14720 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.341107 14720 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.341189 14720 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc00ec34510 42 D0613 11:13:04.341214 14720 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.342669 14720 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.342755 14720 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.342797 14720 task_signals.go:204] [ 204: 205] Signal 204, PID: 205, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.342817 14720 task_exit.go:204] [ 204: 205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.343456 14720 task_exit.go:204] [ 204: 205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.343591 14720 task_exit.go:204] [ 204: 205] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.343617 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.344384 14720 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) D0613 11:13:04.362228 14720 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.362297 14720 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc000ab1950 39 D0613 11:13:04.362482 14720 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.364198 14720 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.364251 14720 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc000ab1950 40 D0613 11:13:04.364270 14720 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.376061 14720 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.376114 14720 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc000ab1950 41 D0613 11:13:04.376131 14720 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.385649 14720 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.385720 14720 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc000ab1950 42 D0613 11:13:04.385743 14720 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.388105 14720 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.388208 14720 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.388253 14720 task_signals.go:204] [ 206: 207] Signal 206, PID: 207, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.388269 14720 task_exit.go:204] [ 206: 207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.388831 14720 task_exit.go:204] [ 206: 207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.388922 14720 task_exit.go:204] [ 206: 207] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.388993 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.389084 14720 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f00000012c0)=[&(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f0000000040)}]) D0613 11:13:04.399214 14720 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.399285 14720 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc002f83620 39 D0613 11:13:04.399493 14720 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.406523 14720 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.406620 14720 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc002f83620 40 D0613 11:13:04.406649 14720 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.418418 14720 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.418493 14720 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc002f83620 41 D0613 11:13:04.418517 14720 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.428360 14720 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.428412 14720 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc002f83620 42 D0613 11:13:04.428432 14720 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.430112 14720 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.430250 14720 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.430298 14720 task_signals.go:204] [ 208: 209] Signal 208, PID: 209, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.430340 14720 task_exit.go:204] [ 208: 209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.430936 14720 task_exit.go:204] [ 208: 209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.430988 14720 task_exit.go:204] [ 208: 209] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.431011 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.431782 14720 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x545d, 0x0) D0613 11:13:04.443249 14720 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.443309 14720 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc000ab1b30 39 D0613 11:13:04.443487 14720 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.446270 14720 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.446346 14720 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc000ab1b30 40 D0613 11:13:04.446371 14720 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.458615 14720 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.458711 14720 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc000ab1b30 41 D0613 11:13:04.458732 14720 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.466221 14720 usertrap_amd64.go:212] [ 210: 211] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.466386 14720 usertrap_amd64.go:122] [ 210: 211] Allocate a new trap: 0xc000ab1b30 42 D0613 11:13:04.466444 14720 usertrap_amd64.go:225] [ 210: 211] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.477247 14720 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.477327 14720 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc000ab1b30 43 D0613 11:13:04.477355 14720 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.477750 14720 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.477797 14720 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.477841 14720 task_signals.go:204] [ 210: 211] Signal 210, PID: 211, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.477862 14720 task_exit.go:204] [ 210: 211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.478307 14720 task_exit.go:204] [ 210: 211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.478342 14720 task_exit.go:204] [ 210: 211] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.478367 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.478427 14720 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8947, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:04.494216 14720 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.494291 14720 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc00ec34900 39 D0613 11:13:04.494507 14720 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.496706 14720 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.496767 14720 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc00ec34900 40 D0613 11:13:04.496786 14720 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.509793 14720 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.509861 14720 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc00ec34900 41 D0613 11:13:04.509880 14720 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.516810 14720 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.516875 14720 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc00ec34900 42 D0613 11:13:04.516893 14720 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.518299 14720 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.518378 14720 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.518414 14720 task_signals.go:204] [ 212: 213] Signal 212, PID: 213, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.518477 14720 task_exit.go:204] [ 212: 213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.519149 14720 task_exit.go:204] [ 212: 213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.519225 14720 task_exit.go:204] [ 212: 213] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.519253 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.520142 14720 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5412, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.529537 14720 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.529631 14720 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0056be300 39 D0613 11:13:04.529907 14720 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.531909 14720 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.531966 14720 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0056be300 40 D0613 11:13:04.531992 14720 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.541675 14720 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.541724 14720 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0056be300 41 D0613 11:13:04.541742 14720 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.547511 14720 usertrap_amd64.go:212] [ 214: 215] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.547557 14720 usertrap_amd64.go:122] [ 214: 215] Allocate a new trap: 0xc0056be300 42 D0613 11:13:04.547573 14720 usertrap_amd64.go:225] [ 214: 215] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.555706 14720 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.555776 14720 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0056be300 43 D0613 11:13:04.555798 14720 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.555953 14720 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.556001 14720 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.556044 14720 task_signals.go:204] [ 214: 215] Signal 214, PID: 215, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.556080 14720 task_exit.go:204] [ 214: 215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.556594 14720 task_exit.go:204] [ 214: 215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.556644 14720 task_exit.go:204] [ 214: 215] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.556664 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.556796 14720 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b33, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.573157 14720 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.573230 14720 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc003b99d70 39 D0613 11:13:04.573383 14720 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.578983 14720 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.579018 14720 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc003b99d70 40 D0613 11:13:04.579042 14720 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.595698 14720 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.595789 14720 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc003b99d70 41 D0613 11:13:04.595816 14720 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.601719 14720 usertrap_amd64.go:212] [ 216: 217] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.601778 14720 usertrap_amd64.go:122] [ 216: 217] Allocate a new trap: 0xc003b99d70 42 D0613 11:13:04.601799 14720 usertrap_amd64.go:225] [ 216: 217] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.609667 14720 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.609726 14720 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc003b99d70 43 D0613 11:13:04.609746 14720 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.610714 14720 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.610789 14720 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.610785 14720 task_signals.go:204] [ 216: 217] Signal 216, PID: 217, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.610817 14720 task_exit.go:204] [ 216: 217] Transitioning from exit state TaskExitNone to TaskExitInitiated 11:13:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:04.611309 14720 task_exit.go:204] [ 216: 217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.611338 14720 task_exit.go:204] [ 216: 217] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.611355 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.611386 14720 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.625598 14720 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.625714 14720 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc002f837a0 39 D0613 11:13:04.625943 14720 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.629981 14720 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.630069 14720 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc002f837a0 40 D0613 11:13:04.630099 14720 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.641177 14720 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.641262 14720 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc002f837a0 41 D0613 11:13:04.641288 14720 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.651431 14720 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.651509 14720 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc002f837a0 42 D0613 11:13:04.651535 14720 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.653902 14720 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.653996 14720 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.653994 14720 task_signals.go:204] [ 218: 219] Signal 218, PID: 219, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.654027 14720 task_exit.go:204] [ 218: 219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.654636 14720 task_exit.go:204] [ 218: 219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.654680 14720 task_exit.go:204] [ 218: 219] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.654703 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.655317 14720 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.672577 14720 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.672668 14720 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc0110b50b0 39 D0613 11:13:04.672807 14720 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.675007 14720 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.675081 14720 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc0110b50b0 40 D0613 11:13:04.675117 14720 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.685780 14720 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.685860 14720 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc0110b50b0 41 D0613 11:13:04.685885 14720 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.694028 14720 usertrap_amd64.go:212] [ 220: 221] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.694101 14720 usertrap_amd64.go:122] [ 220: 221] Allocate a new trap: 0xc0110b50b0 42 D0613 11:13:04.694124 14720 usertrap_amd64.go:225] [ 220: 221] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.705306 14720 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.705406 14720 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc0110b50b0 43 D0613 11:13:04.705434 14720 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.705666 14720 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.705732 14720 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.705770 14720 task_signals.go:204] [ 220: 221] Signal 220, PID: 221, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.705789 14720 task_exit.go:204] [ 220: 221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.706356 14720 task_exit.go:204] [ 220: 221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.706424 14720 task_exit.go:204] [ 220: 221] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.706449 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.707095 14720 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891e, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:04.722801 14720 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.722885 14720 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc01162d350 39 D0613 11:13:04.723080 14720 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.725351 14720 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.725476 14720 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc01162d350 40 D0613 11:13:04.725498 14720 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.735660 14720 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.735733 14720 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc01162d350 41 D0613 11:13:04.735757 14720 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.744716 14720 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.744793 14720 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc01162d350 42 D0613 11:13:04.744814 14720 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.746693 14720 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.746777 14720 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.746821 14720 task_signals.go:204] [ 222: 223] Signal 222, PID: 223, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.746842 14720 task_exit.go:204] [ 222: 223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.747435 14720 task_exit.go:204] [ 222: 223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.747478 14720 task_exit.go:204] [ 222: 223] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.747507 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.748528 14720 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5608, 0x0) D0613 11:13:04.760601 14720 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.760669 14720 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc01162d380 39 D0613 11:13:04.760901 14720 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.763282 14720 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.763322 14720 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc01162d380 40 D0613 11:13:04.763344 14720 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.773588 14720 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.773656 14720 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc01162d380 41 D0613 11:13:04.773704 14720 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.780663 14720 usertrap_amd64.go:212] [ 224: 225] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.780751 14720 usertrap_amd64.go:122] [ 224: 225] Allocate a new trap: 0xc01162d380 42 D0613 11:13:04.780780 14720 usertrap_amd64.go:225] [ 224: 225] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.795076 14720 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.795164 14720 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc01162d380 43 D0613 11:13:04.795193 14720 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.795456 14720 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.795577 14720 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.795617 14720 task_signals.go:204] [ 224: 225] Signal 224, PID: 225, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.795651 14720 task_exit.go:204] [ 224: 225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.796581 14720 task_exit.go:204] [ 224: 225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.796644 14720 task_exit.go:204] [ 224: 225] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.796677 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.796820 14720 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:04.811318 14720 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.811392 14720 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0110b53e0 39 D0613 11:13:04.811676 14720 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.813388 14720 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.813452 14720 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0110b53e0 40 D0613 11:13:04.813470 14720 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.819547 14720 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.819584 14720 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0110b53e0 41 D0613 11:13:04.819598 14720 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.825197 14720 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.825244 14720 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0110b53e0 42 D0613 11:13:04.825263 14720 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.826649 14720 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.826774 14720 task_signals.go:204] [ 226: 227] Signal 226, PID: 227, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.826816 14720 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.826840 14720 task_exit.go:204] [ 226: 227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.827309 14720 task_exit.go:204] [ 226: 227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.827356 14720 task_exit.go:204] [ 226: 227] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.827380 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.828207 14720 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.841269 14720 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.841335 14720 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002f83ce0 39 D0613 11:13:04.841569 14720 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.843446 14720 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.843499 14720 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002f83ce0 40 D0613 11:13:04.843517 14720 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.855772 14720 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.855824 14720 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002f83ce0 41 D0613 11:13:04.855840 14720 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.860221 14720 usertrap_amd64.go:212] [ 228: 229] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.860293 14720 usertrap_amd64.go:122] [ 228: 229] Allocate a new trap: 0xc002f83ce0 42 D0613 11:13:04.860317 14720 usertrap_amd64.go:225] [ 228: 229] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.869127 14720 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.869217 14720 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002f83ce0 43 D0613 11:13:04.869243 14720 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.869729 14720 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.869976 14720 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.870134 14720 task_signals.go:204] [ 228: 229] Signal 228, PID: 229, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.870220 14720 task_exit.go:204] [ 228: 229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.870828 14720 task_exit.go:204] [ 228: 229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.870879 14720 task_exit.go:204] [ 228: 229] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.870900 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.872224 14720 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:04.896294 14720 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.896377 14720 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002f83d10 39 D0613 11:13:04.896511 14720 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.898542 14720 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.898601 14720 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002f83d10 40 D0613 11:13:04.898624 14720 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.914329 14720 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.914387 14720 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002f83d10 41 D0613 11:13:04.914408 14720 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.919644 14720 usertrap_amd64.go:212] [ 230: 231] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.919714 14720 usertrap_amd64.go:122] [ 230: 231] Allocate a new trap: 0xc002f83d10 42 D0613 11:13:04.919749 14720 usertrap_amd64.go:225] [ 230: 231] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.928699 14720 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.928988 14720 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002f83d10 43 D0613 11:13:04.929070 14720 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.929604 14720 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.929746 14720 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.929739 14720 task_signals.go:204] [ 230: 231] Signal 230, PID: 231, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.929782 14720 task_exit.go:204] [ 230: 231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.930361 14720 task_exit.go:204] [ 230: 231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.930428 14720 task_exit.go:204] [ 230: 231] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.930455 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.930592 14720 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b31, 0x0) D0613 11:13:04.945375 14720 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:04.945449 14720 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc01162d440 39 D0613 11:13:04.945629 14720 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:04.947981 14720 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:04.948011 14720 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc01162d440 40 D0613 11:13:04.948124 14720 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:04.959290 14720 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:04.959386 14720 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc01162d440 41 D0613 11:13:04.959414 14720 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:04.967279 14720 usertrap_amd64.go:212] [ 232: 233] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:04.967345 14720 usertrap_amd64.go:122] [ 232: 233] Allocate a new trap: 0xc01162d440 42 D0613 11:13:04.967387 14720 usertrap_amd64.go:225] [ 232: 233] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:04.979920 14720 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:04.979992 14720 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc01162d440 43 D0613 11:13:04.980028 14720 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:04.980252 14720 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.980319 14720 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.980353 14720 task_signals.go:204] [ 232: 233] Signal 232, PID: 233, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:04.980379 14720 task_exit.go:204] [ 232: 233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:04.981094 14720 task_exit.go:204] [ 232: 233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:04.981196 14720 task_exit.go:204] [ 232: 233] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:04.981230 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:04.981305 14720 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x5412, &(0x7f0000000000)) D0613 11:13:05.004757 14720 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.005054 14720 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0110b5410 39 D0613 11:13:05.005371 14720 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.008657 14720 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.008700 14720 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0110b5410 40 D0613 11:13:05.008725 14720 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.019896 14720 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.019996 14720 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0110b5410 41 D0613 11:13:05.020014 14720 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.024174 14720 usertrap_amd64.go:212] [ 234: 235] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.024223 14720 usertrap_amd64.go:122] [ 234: 235] Allocate a new trap: 0xc0110b5410 42 D0613 11:13:05.024242 14720 usertrap_amd64.go:225] [ 234: 235] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.033014 14720 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.033114 14720 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0110b5410 43 D0613 11:13:05.033143 14720 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.033548 14720 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.033640 14720 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.033623 14720 task_signals.go:204] [ 234: 235] Signal 234, PID: 235, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.033716 14720 task_exit.go:204] [ 234: 235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.037351 14720 task_exit.go:204] [ 234: 235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.037405 14720 task_exit.go:204] [ 234: 235] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.037431 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.037593 14720 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5412, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.050620 14720 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.050681 14720 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc0110b5440 39 D0613 11:13:05.051061 14720 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.052660 14720 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.052726 14720 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc0110b5440 40 D0613 11:13:05.052745 14720 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.059490 14720 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.059546 14720 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc0110b5440 41 D0613 11:13:05.059567 14720 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.063787 14720 usertrap_amd64.go:212] [ 236: 237] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.063861 14720 usertrap_amd64.go:122] [ 236: 237] Allocate a new trap: 0xc0110b5440 42 D0613 11:13:05.063889 14720 usertrap_amd64.go:225] [ 236: 237] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.073398 14720 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.073485 14720 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc0110b5440 43 D0613 11:13:05.073515 14720 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.074220 14720 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.074323 14720 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.074355 14720 task_signals.go:204] [ 236: 237] Signal 236, PID: 237, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.074393 14720 task_exit.go:204] [ 236: 237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.074951 14720 task_exit.go:204] [ 236: 237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.074982 14720 task_exit.go:204] [ 236: 237] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.075000 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.075237 14720 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:05.085338 14720 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.085413 14720 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc00d81a240 39 D0613 11:13:05.085599 14720 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.089632 14720 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.089719 14720 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc00d81a240 40 D0613 11:13:05.089743 14720 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.099940 14720 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.099999 14720 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc00d81a240 41 D0613 11:13:05.100017 14720 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.108123 14720 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.108184 14720 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc00d81a240 42 D0613 11:13:05.108206 14720 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.109987 14720 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.110102 14720 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.110152 14720 task_signals.go:204] [ 238: 239] Signal 238, PID: 239, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.110240 14720 task_exit.go:204] [ 238: 239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.110839 14720 task_exit.go:204] [ 238: 239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.110886 14720 task_exit.go:204] [ 238: 239] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.110912 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.111440 14720 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5412, &(0x7f0000000100)) D0613 11:13:05.120630 14720 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.120683 14720 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc0056be660 39 D0613 11:13:05.120801 14720 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.122691 14720 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.122728 14720 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc0056be660 40 D0613 11:13:05.122744 14720 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.131143 14720 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.131200 14720 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc0056be660 41 D0613 11:13:05.131228 14720 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.139779 14720 usertrap_amd64.go:212] [ 240: 241] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.139857 14720 usertrap_amd64.go:122] [ 240: 241] Allocate a new trap: 0xc0056be660 42 D0613 11:13:05.139884 14720 usertrap_amd64.go:225] [ 240: 241] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.149421 14720 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.149494 14720 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc0056be660 43 D0613 11:13:05.149517 14720 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.149998 14720 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.150065 14720 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.150110 14720 task_signals.go:204] [ 240: 241] Signal 240, PID: 241, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.150131 14720 task_exit.go:204] [ 240: 241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.150902 14720 task_exit.go:204] [ 240: 241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.151104 14720 task_exit.go:204] [ 240: 241] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.151152 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.151211 14720 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5600, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.161927 14720 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.162001 14720 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc0056be7e0 39 D0613 11:13:05.162228 14720 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.164304 14720 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.164343 14720 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc0056be7e0 40 D0613 11:13:05.164361 14720 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.174048 14720 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.174120 14720 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc0056be7e0 41 D0613 11:13:05.174139 14720 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.179177 14720 usertrap_amd64.go:212] [ 242: 243] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.179236 14720 usertrap_amd64.go:122] [ 242: 243] Allocate a new trap: 0xc0056be7e0 42 D0613 11:13:05.179261 14720 usertrap_amd64.go:225] [ 242: 243] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.186017 14720 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.186138 14720 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc0056be7e0 43 D0613 11:13:05.186193 14720 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.186852 14720 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.187072 14720 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.187221 14720 task_signals.go:204] [ 242: 243] Signal 242, PID: 243, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.187269 14720 task_exit.go:204] [ 242: 243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.188054 14720 task_exit.go:204] [ 242: 243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.188156 14720 task_exit.go:204] [ 242: 243] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.188187 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.188248 14720 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: mlock(&(0x7f0000ff6000/0xa000)=nil, 0xa000) mlock(&(0x7f0000ff8000/0x1000)=nil, 0x1000) D0613 11:13:05.201166 14720 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.201233 14720 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc00b1f43f0 39 D0613 11:13:05.201379 14720 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.203359 14720 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.203427 14720 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc00b1f43f0 40 D0613 11:13:05.203449 14720 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.214026 14720 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.214106 14720 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc00b1f43f0 41 D0613 11:13:05.214131 14720 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.220329 14720 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.220377 14720 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc00b1f43f0 42 D0613 11:13:05.220392 14720 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.222089 14720 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.222217 14720 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.222282 14720 task_signals.go:204] [ 244: 245] Signal 244, PID: 245, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.222319 14720 task_exit.go:204] [ 244: 245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.222895 14720 task_exit.go:204] [ 244: 245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.222952 14720 task_exit.go:204] [ 244: 245] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.222980 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.223860 14720 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:05.249049 14720 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.249134 14720 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc00541c300 39 D0613 11:13:05.249340 14720 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.250977 14720 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.251052 14720 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc00541c300 40 D0613 11:13:05.251075 14720 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.262193 14720 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.262256 14720 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc00541c300 41 D0613 11:13:05.262352 14720 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.271482 14720 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.271557 14720 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc00541c300 42 D0613 11:13:05.271585 14720 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.273710 14720 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.273817 14720 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.273858 14720 task_signals.go:204] [ 246: 247] Signal 246, PID: 247, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.273881 14720 task_exit.go:204] [ 246: 247] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.274447 14720 task_exit.go:204] [ 246: 247] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.274537 14720 task_exit.go:204] [ 246: 247] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.274565 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.274751 14720 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5421, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.289708 14720 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.289797 14720 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc00b1f4750 39 D0613 11:13:05.289926 14720 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.291457 14720 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.291561 14720 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc00b1f4750 40 D0613 11:13:05.291606 14720 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.307326 14720 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.307407 14720 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc00b1f4750 41 D0613 11:13:05.307432 14720 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.315055 14720 usertrap_amd64.go:212] [ 248: 249] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.315119 14720 usertrap_amd64.go:122] [ 248: 249] Allocate a new trap: 0xc00b1f4750 42 D0613 11:13:05.315144 14720 usertrap_amd64.go:225] [ 248: 249] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.325502 14720 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.325590 14720 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc00b1f4750 43 D0613 11:13:05.325615 14720 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.325822 14720 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.325868 14720 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.325909 14720 task_signals.go:204] [ 248: 249] Signal 248, PID: 249, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.325973 14720 task_exit.go:204] [ 248: 249] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.326569 14720 task_exit.go:204] [ 248: 249] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.326659 14720 task_exit.go:204] [ 248: 249] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.326682 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.326998 14720 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.347737 14720 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.347935 14720 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc00ec35230 39 D0613 11:13:05.348126 14720 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.351231 14720 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.351292 14720 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc00ec35230 40 D0613 11:13:05.351311 14720 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.359717 14720 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.359774 14720 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc00ec35230 41 D0613 11:13:05.359791 14720 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.365436 14720 usertrap_amd64.go:212] [ 250: 251] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.365522 14720 usertrap_amd64.go:122] [ 250: 251] Allocate a new trap: 0xc00ec35230 42 D0613 11:13:05.365549 14720 usertrap_amd64.go:225] [ 250: 251] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.373869 14720 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.373957 14720 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc00ec35230 43 D0613 11:13:05.373984 14720 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.374264 14720 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.374322 14720 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.374338 14720 task_signals.go:204] [ 250: 251] Signal 250, PID: 251, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.374433 14720 task_exit.go:204] [ 250: 251] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.375046 14720 task_exit.go:204] [ 250: 251] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.375098 14720 task_exit.go:204] [ 250: 251] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.375123 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.375803 14720 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b44, 0x0) D0613 11:13:05.387512 14720 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.387605 14720 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc00b1f4930 39 D0613 11:13:05.387894 14720 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.390069 14720 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.390133 14720 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc00b1f4930 40 D0613 11:13:05.390169 14720 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.404107 14720 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.404166 14720 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc00b1f4930 41 D0613 11:13:05.404189 14720 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.413298 14720 usertrap_amd64.go:212] [ 252: 253] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.413383 14720 usertrap_amd64.go:122] [ 252: 253] Allocate a new trap: 0xc00b1f4930 42 D0613 11:13:05.413410 14720 usertrap_amd64.go:225] [ 252: 253] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.422777 14720 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.422861 14720 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc00b1f4930 43 D0613 11:13:05.422885 14720 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.423187 14720 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.423250 14720 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.423290 14720 task_signals.go:204] [ 252: 253] Signal 252, PID: 253, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.423310 14720 task_exit.go:204] [ 252: 253] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.423929 14720 task_exit.go:204] [ 252: 253] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.424002 14720 task_exit.go:204] [ 252: 253] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.424031 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.425670 14720 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000a00)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0xfff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) D0613 11:13:05.441151 14720 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.441311 14720 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0056beb10 39 D0613 11:13:05.441598 14720 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.443600 14720 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.443646 14720 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0056beb10 40 D0613 11:13:05.443665 14720 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.454473 14720 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.454532 14720 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0056beb10 41 D0613 11:13:05.454550 14720 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.463120 14720 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.463199 14720 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0056beb10 42 D0613 11:13:05.463225 14720 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.464715 14720 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.464789 14720 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.464831 14720 task_signals.go:204] [ 254: 255] Signal 254, PID: 255, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.464854 14720 task_exit.go:204] [ 254: 255] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.465649 14720 task_exit.go:204] [ 254: 255] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.465721 14720 task_exit.go:204] [ 254: 255] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.465748 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.466730 14720 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40086602, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.477202 14720 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.477258 14720 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc0056beb70 39 D0613 11:13:05.477414 14720 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.478977 14720 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.479046 14720 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc0056beb70 40 D0613 11:13:05.479075 14720 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.492188 14720 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.492273 14720 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc0056beb70 41 D0613 11:13:05.492302 14720 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.496873 14720 usertrap_amd64.go:212] [ 256: 257] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.496918 14720 usertrap_amd64.go:122] [ 256: 257] Allocate a new trap: 0xc0056beb70 42 D0613 11:13:05.496934 14720 usertrap_amd64.go:225] [ 256: 257] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.512317 14720 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.512414 14720 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc0056beb70 43 D0613 11:13:05.512447 14720 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.512774 14720 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.512850 14720 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.513000 14720 task_signals.go:204] [ 256: 257] Signal 256, PID: 257, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.513098 14720 task_exit.go:204] [ 256: 257] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.514288 14720 task_exit.go:204] [ 256: 257] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.514393 14720 task_exit.go:204] [ 256: 257] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.514432 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.515456 14720 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5452, &(0x7f0000000240)={0x0, 0x2, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.526534 14720 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.526603 14720 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc01162dbc0 39 D0613 11:13:05.526860 14720 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.528554 14720 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.528612 14720 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc01162dbc0 40 D0613 11:13:05.528635 14720 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.539427 14720 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.539489 14720 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc01162dbc0 41 D0613 11:13:05.539511 14720 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.545357 14720 usertrap_amd64.go:212] [ 258: 259] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.545424 14720 usertrap_amd64.go:122] [ 258: 259] Allocate a new trap: 0xc01162dbc0 42 D0613 11:13:05.545446 14720 usertrap_amd64.go:225] [ 258: 259] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.553937 14720 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.554004 14720 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc01162dbc0 43 D0613 11:13:05.554032 14720 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.554350 14720 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.554415 14720 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.554459 14720 task_signals.go:204] [ 258: 259] Signal 258, PID: 259, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.554503 14720 task_exit.go:204] [ 258: 259] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.555042 14720 task_exit.go:204] [ 258: 259] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.555054 14720 task_exit.go:204] [ 258: 259] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.555074 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.555569 14720 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) D0613 11:13:05.567619 14720 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.567715 14720 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0110b5ce0 39 D0613 11:13:05.567881 14720 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.572752 14720 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.572817 14720 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0110b5ce0 40 D0613 11:13:05.572836 14720 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.580989 14720 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.581045 14720 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0110b5ce0 41 D0613 11:13:05.581060 14720 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.590115 14720 usertrap_amd64.go:212] [ 260: 261] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.590168 14720 usertrap_amd64.go:122] [ 260: 261] Allocate a new trap: 0xc0110b5ce0 42 D0613 11:13:05.590195 14720 usertrap_amd64.go:225] [ 260: 261] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.601492 14720 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.601590 14720 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0110b5ce0 43 D0613 11:13:05.601667 14720 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.602058 14720 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.602133 14720 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.602217 14720 task_signals.go:204] [ 260: 261] Signal 260, PID: 261, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.602310 14720 task_exit.go:204] [ 260: 261] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.603113 14720 task_exit.go:204] [ 260: 261] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.603200 14720 task_exit.go:204] [ 260: 261] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.603233 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.603533 14720 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560e, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.617958 14720 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.618020 14720 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc00b1f4a80 39 D0613 11:13:05.618286 14720 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.624367 14720 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.624471 14720 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc00b1f4a80 40 D0613 11:13:05.624502 14720 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.638054 14720 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.638161 14720 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc00b1f4a80 41 D0613 11:13:05.638191 14720 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.642860 14720 usertrap_amd64.go:212] [ 262: 263] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.642956 14720 usertrap_amd64.go:122] [ 262: 263] Allocate a new trap: 0xc00b1f4a80 42 D0613 11:13:05.642986 14720 usertrap_amd64.go:225] [ 262: 263] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.651067 14720 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.651140 14720 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc00b1f4a80 43 D0613 11:13:05.651162 14720 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.652015 14720 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.652126 14720 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.652220 14720 task_signals.go:204] [ 262: 263] Signal 262, PID: 263, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.652254 14720 task_exit.go:204] [ 262: 263] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.652881 14720 task_exit.go:204] [ 262: 263] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.653035 14720 task_exit.go:204] [ 262: 263] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.653061 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.653220 14720 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0xc) D0613 11:13:05.667965 14720 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.668061 14720 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc00ec35710 39 D0613 11:13:05.668329 14720 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.669824 14720 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.669871 14720 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc00ec35710 40 D0613 11:13:05.669890 14720 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.678585 14720 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.678651 14720 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc00ec35710 41 D0613 11:13:05.678676 14720 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.685561 14720 usertrap_amd64.go:212] [ 264: 265] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.685615 14720 usertrap_amd64.go:122] [ 264: 265] Allocate a new trap: 0xc00ec35710 42 D0613 11:13:05.685638 14720 usertrap_amd64.go:225] [ 264: 265] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.694235 14720 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.694289 14720 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc00ec35710 43 D0613 11:13:05.694307 14720 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.694450 14720 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.694498 14720 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.694545 14720 task_signals.go:204] [ 264: 265] Signal 264, PID: 265, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.694568 14720 task_exit.go:204] [ 264: 265] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.695239 14720 task_exit.go:204] [ 264: 265] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.695278 14720 task_exit.go:204] [ 264: 265] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.695296 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.695359 14720 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b47, &(0x7f0000000240)={0xa4c, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.709419 14720 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.709501 14720 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc0110b5da0 39 D0613 11:13:05.709650 14720 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.711372 14720 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.711419 14720 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc0110b5da0 40 D0613 11:13:05.711437 14720 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.721930 14720 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.722015 14720 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc0110b5da0 41 D0613 11:13:05.722047 14720 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.728928 14720 usertrap_amd64.go:212] [ 266: 267] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.729057 14720 usertrap_amd64.go:122] [ 266: 267] Allocate a new trap: 0xc0110b5da0 42 D0613 11:13:05.729090 14720 usertrap_amd64.go:225] [ 266: 267] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.735608 14720 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.735671 14720 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc0110b5da0 43 D0613 11:13:05.735693 14720 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.736126 14720 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.736185 14720 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.736226 14720 task_signals.go:204] [ 266: 267] Signal 266, PID: 267, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.736253 14720 task_exit.go:204] [ 266: 267] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.736883 14720 task_exit.go:204] [ 266: 267] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.736992 14720 task_exit.go:204] [ 266: 267] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.737030 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.738162 14720 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x401, 0x0, 0x0, 0x1ff, 0x0, "0847e678f511f8be"}) D0613 11:13:05.750565 14720 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.750631 14720 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc0056bf1d0 39 D0613 11:13:05.750799 14720 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.753594 14720 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.753757 14720 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc0056bf1d0 40 D0613 11:13:05.753822 14720 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.763037 14720 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.763108 14720 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc0056bf1d0 41 D0613 11:13:05.763131 14720 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.770438 14720 usertrap_amd64.go:212] [ 268: 269] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.770502 14720 usertrap_amd64.go:122] [ 268: 269] Allocate a new trap: 0xc0056bf1d0 42 D0613 11:13:05.770529 14720 usertrap_amd64.go:225] [ 268: 269] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.779624 14720 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.779686 14720 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc0056bf1d0 43 D0613 11:13:05.779717 14720 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.780086 14720 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.780146 14720 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.780175 14720 task_signals.go:204] [ 268: 269] Signal 268, PID: 269, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.780200 14720 task_exit.go:204] [ 268: 269] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.780792 14720 task_exit.go:204] [ 268: 269] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.780840 14720 task_exit.go:204] [ 268: 269] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.780865 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.782359 14720 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3b, 0x0) D0613 11:13:05.795282 14720 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.795358 14720 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0056bf200 39 D0613 11:13:05.795764 14720 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.797467 14720 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.797679 14720 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0056bf200 40 D0613 11:13:05.797769 14720 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.808398 14720 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.808435 14720 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0056bf200 41 D0613 11:13:05.808456 14720 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.815168 14720 usertrap_amd64.go:212] [ 270: 271] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.815220 14720 usertrap_amd64.go:122] [ 270: 271] Allocate a new trap: 0xc0056bf200 42 D0613 11:13:05.815251 14720 usertrap_amd64.go:225] [ 270: 271] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.821303 14720 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.821344 14720 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0056bf200 43 D0613 11:13:05.821365 14720 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.821681 14720 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.821743 14720 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.821774 14720 task_signals.go:204] [ 270: 271] Signal 270, PID: 271, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.821792 14720 task_exit.go:204] [ 270: 271] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.822435 14720 task_exit.go:204] [ 270: 271] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.822510 14720 task_exit.go:204] [ 270: 271] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.822545 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.823113 14720 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000001000)={0x7f08, 0x3fb, 0xd8, 0x1}) D0613 11:13:05.824205 14720 task_signals.go:470] [ 7: 25] Notified of signal 23 D0613 11:13:05.824272 14720 task_signals.go:179] [ 7: 25] Restarting syscall 202: interrupted by signal 23 D0613 11:13:05.824286 14720 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0613 11:13:05.833580 14720 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.833658 14720 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc0056bf2c0 39 D0613 11:13:05.833864 14720 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.835651 14720 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.835710 14720 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc0056bf2c0 40 D0613 11:13:05.835769 14720 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.846169 14720 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.846232 14720 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc0056bf2c0 41 D0613 11:13:05.846255 14720 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.852395 14720 usertrap_amd64.go:212] [ 272: 273] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.852437 14720 usertrap_amd64.go:122] [ 272: 273] Allocate a new trap: 0xc0056bf2c0 42 D0613 11:13:05.852453 14720 usertrap_amd64.go:225] [ 272: 273] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.858554 14720 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.858636 14720 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc0056bf2c0 43 D0613 11:13:05.858664 14720 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.858960 14720 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.859028 14720 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.859066 14720 task_signals.go:204] [ 272: 273] Signal 272, PID: 273, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.859104 14720 task_exit.go:204] [ 272: 273] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.859680 14720 task_exit.go:204] [ 272: 273] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.859739 14720 task_exit.go:204] [ 272: 273] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.859757 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.859869 14720 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8994, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:05.876368 14720 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.876441 14720 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc00b1f4cf0 39 D0613 11:13:05.876679 14720 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.878734 14720 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.878798 14720 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc00b1f4cf0 40 D0613 11:13:05.878818 14720 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.886626 14720 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.886687 14720 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc00b1f4cf0 41 D0613 11:13:05.886705 14720 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.894639 14720 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.894710 14720 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc00b1f4cf0 42 D0613 11:13:05.894766 14720 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.896005 14720 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.896068 14720 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.896133 14720 task_signals.go:204] [ 274: 275] Signal 274, PID: 275, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.896165 14720 task_exit.go:204] [ 274: 275] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.896730 14720 task_exit.go:204] [ 274: 275] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.896816 14720 task_exit.go:204] [ 274: 275] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.896859 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.897302 14720 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5423, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:05.921312 14720 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.921382 14720 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc00541cb70 39 D0613 11:13:05.921823 14720 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.923674 14720 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.923738 14720 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc00541cb70 40 D0613 11:13:05.923762 14720 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.934149 14720 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.934207 14720 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc00541cb70 41 D0613 11:13:05.934228 14720 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.939925 14720 usertrap_amd64.go:212] [ 276: 277] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:05.939970 14720 usertrap_amd64.go:122] [ 276: 277] Allocate a new trap: 0xc00541cb70 42 D0613 11:13:05.939989 14720 usertrap_amd64.go:225] [ 276: 277] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.946199 14720 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.946275 14720 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc00541cb70 43 D0613 11:13:05.946313 14720 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:05.946628 14720 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.946688 14720 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.946801 14720 task_signals.go:204] [ 276: 277] Signal 276, PID: 277, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:05.946902 14720 task_exit.go:204] [ 276: 277] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:05.947713 14720 task_exit.go:204] [ 276: 277] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:05.947781 14720 task_exit.go:204] [ 276: 277] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:05.947813 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:05.948418 14720 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:05 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) pipe2$watch_queue(&(0x7f0000000080), 0x80) getuid() syz_emit_ethernet(0x56, &(0x7f00000001c0)={@random="d415da7858ea", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0xc, 0x2, 0x0, 0x0, "3b93c60f0d24af0a6ae2fe2c8159db78d15ae4828a8257261c5bddcfd57d2e2b6d854037683072ce65eaa389589ff1b59a1f3e93056b99086e9ad6e203ad93a1"}}}}, &(0x7f0000000240)={0x0, 0x4, [0x8c3, 0x3ab, 0x314, 0xc19]}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000100)="4bdd1d308468536ffe1165c529098c94a303add15d77adff92425479cf508ca1f12a888f405246625ab5544b90dc38bd7968a8f2661f310c9ef978c8b59a236571fc17abbdb709a7ad3a60b08737e506f6f7cfd7", 0x54, 0x4040000, &(0x7f0000000180)={0x11, 0x15, r1, 0x1, 0x2, 0x6, @multicast}, 0x14) epoll_create1(0x80000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000005c40), 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) D0613 11:13:05.962509 14720 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:05.962585 14720 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0056bf2f0 39 D0613 11:13:05.962836 14720 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:05.965656 14720 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:05.965737 14720 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0056bf2f0 40 D0613 11:13:05.965764 14720 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:05.976899 14720 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:05.977025 14720 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0056bf2f0 41 D0613 11:13:05.977054 14720 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:05.985667 14720 usertrap_amd64.go:212] [ 278: 279] Found the pattern at ip 5604396c3f18:sysno 1 D0613 11:13:05.985737 14720 usertrap_amd64.go:122] [ 278: 279] Allocate a new trap: 0xc0056bf2f0 42 D0613 11:13:05.985758 14720 usertrap_amd64.go:225] [ 278: 279] Apply the binary patch addr 5604396c3f18 trap addr 62d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:05.999770 14720 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:05.999847 14720 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0056bf2f0 43 D0613 11:13:05.999873 14720 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.001038 14720 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.001229 14720 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.001288 14720 task_signals.go:204] [ 278: 279] Signal 278, PID: 279, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.001306 14720 task_exit.go:204] [ 278: 279] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.001765 14720 task_exit.go:204] [ 278: 279] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.001807 14720 task_exit.go:204] [ 278: 279] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.001820 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.002773 14720 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4020940d, &(0x7f0000000100)) D0613 11:13:06.014449 14720 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.014501 14720 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc00541cdb0 39 D0613 11:13:06.014622 14720 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.016622 14720 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.016663 14720 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc00541cdb0 40 D0613 11:13:06.016681 14720 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.025864 14720 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.025910 14720 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc00541cdb0 41 D0613 11:13:06.025927 14720 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.033303 14720 usertrap_amd64.go:212] [ 280: 281] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.033386 14720 usertrap_amd64.go:122] [ 280: 281] Allocate a new trap: 0xc00541cdb0 42 D0613 11:13:06.033405 14720 usertrap_amd64.go:225] [ 280: 281] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.041121 14720 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.041186 14720 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc00541cdb0 43 D0613 11:13:06.041210 14720 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.041471 14720 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.041580 14720 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.041633 14720 task_signals.go:204] [ 280: 281] Signal 280, PID: 281, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.041661 14720 task_exit.go:204] [ 280: 281] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.042438 14720 task_exit.go:204] [ 280: 281] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.042528 14720 task_exit.go:204] [ 280: 281] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.042545 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.042655 14720 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0x2) D0613 11:13:06.054776 14720 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.054862 14720 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc0056bf4a0 39 D0613 11:13:06.055518 14720 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.056637 14720 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.056678 14720 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc0056bf4a0 40 D0613 11:13:06.056692 14720 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.070093 14720 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.070157 14720 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc0056bf4a0 41 D0613 11:13:06.070184 14720 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.078359 14720 usertrap_amd64.go:212] [ 282: 283] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.078436 14720 usertrap_amd64.go:122] [ 282: 283] Allocate a new trap: 0xc0056bf4a0 42 D0613 11:13:06.078461 14720 usertrap_amd64.go:225] [ 282: 283] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.084020 14720 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.084050 14720 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc0056bf4a0 43 D0613 11:13:06.084077 14720 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.084209 14720 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.084243 14720 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.084271 14720 task_signals.go:204] [ 282: 283] Signal 282, PID: 283, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.084301 14720 task_exit.go:204] [ 282: 283] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.084736 14720 task_exit.go:204] [ 282: 283] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.084764 14720 task_exit.go:204] [ 282: 283] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.084790 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.085731 14720 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0x3) D0613 11:13:06.097564 14720 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.097614 14720 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0056bf740 39 D0613 11:13:06.097825 14720 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.099176 14720 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.099198 14720 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0056bf740 40 D0613 11:13:06.099221 14720 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.110977 14720 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.111049 14720 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0056bf740 41 D0613 11:13:06.111070 14720 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.116371 14720 usertrap_amd64.go:212] [ 284: 285] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.116425 14720 usertrap_amd64.go:122] [ 284: 285] Allocate a new trap: 0xc0056bf740 42 D0613 11:13:06.116443 14720 usertrap_amd64.go:225] [ 284: 285] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.121245 14720 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.121282 14720 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0056bf740 43 D0613 11:13:06.121327 14720 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.121488 14720 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.121533 14720 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.121553 14720 task_signals.go:204] [ 284: 285] Signal 284, PID: 285, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.121581 14720 task_exit.go:204] [ 284: 285] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.122139 14720 task_exit.go:204] [ 284: 285] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.122159 14720 task_exit.go:204] [ 284: 285] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.122175 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.123380 14720 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b48, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:06.135864 14720 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.135922 14720 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc00ec35f50 39 D0613 11:13:06.136123 14720 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.137547 14720 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.137590 14720 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc00ec35f50 40 D0613 11:13:06.137624 14720 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.145139 14720 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.145198 14720 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc00ec35f50 41 D0613 11:13:06.145228 14720 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.152120 14720 usertrap_amd64.go:212] [ 286: 287] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.152212 14720 usertrap_amd64.go:122] [ 286: 287] Allocate a new trap: 0xc00ec35f50 42 D0613 11:13:06.152239 14720 usertrap_amd64.go:225] [ 286: 287] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.157948 14720 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.158001 14720 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc00ec35f50 43 D0613 11:13:06.158027 14720 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.158173 14720 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.158212 14720 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.158259 14720 task_signals.go:204] [ 286: 287] Signal 286, PID: 287, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.158280 14720 task_exit.go:204] [ 286: 287] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.158756 14720 task_exit.go:204] [ 286: 287] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.158787 14720 task_exit.go:204] [ 286: 287] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.158805 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.159814 14720 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x4b4b, &(0x7f0000000000)) D0613 11:13:06.183982 14720 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.184054 14720 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc0056bf770 39 D0613 11:13:06.184153 14720 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.187568 14720 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.187615 14720 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc0056bf770 40 D0613 11:13:06.187635 14720 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.196701 14720 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.196773 14720 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc0056bf770 41 D0613 11:13:06.196794 14720 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.204577 14720 usertrap_amd64.go:212] [ 288: 289] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.204713 14720 usertrap_amd64.go:122] [ 288: 289] Allocate a new trap: 0xc0056bf770 42 D0613 11:13:06.204748 14720 usertrap_amd64.go:225] [ 288: 289] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.213524 14720 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.213578 14720 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc0056bf770 43 D0613 11:13:06.213596 14720 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.213924 14720 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.213973 14720 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.214006 14720 task_signals.go:204] [ 288: 289] Signal 288, PID: 289, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.214031 14720 task_exit.go:204] [ 288: 289] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.214579 14720 task_exit.go:204] [ 288: 289] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.214682 14720 task_exit.go:204] [ 288: 289] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.214723 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.215748 14720 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5435, 0x0) D0613 11:13:06.225393 14720 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.225470 14720 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc007f620f0 39 D0613 11:13:06.225725 14720 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.227822 14720 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.227998 14720 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc007f620f0 40 D0613 11:13:06.228080 14720 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.234423 14720 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.234470 14720 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc007f620f0 41 D0613 11:13:06.234491 14720 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.238472 14720 usertrap_amd64.go:212] [ 290: 291] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.238507 14720 usertrap_amd64.go:122] [ 290: 291] Allocate a new trap: 0xc007f620f0 42 D0613 11:13:06.238524 14720 usertrap_amd64.go:225] [ 290: 291] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.243376 14720 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.243417 14720 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc007f620f0 43 D0613 11:13:06.243461 14720 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.243676 14720 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.243725 14720 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.243758 14720 task_signals.go:204] [ 290: 291] Signal 290, PID: 291, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.243806 14720 task_exit.go:204] [ 290: 291] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.244189 14720 task_exit.go:204] [ 290: 291] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.244219 14720 task_exit.go:204] [ 290: 291] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.244239 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.245359 14720 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0xe) D0613 11:13:06.256855 14720 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.256994 14720 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc00a072960 39 D0613 11:13:06.257184 14720 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.258746 14720 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.258809 14720 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc00a072960 40 D0613 11:13:06.258830 14720 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.265915 14720 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.265997 14720 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc00a072960 41 D0613 11:13:06.266022 14720 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.272431 14720 usertrap_amd64.go:212] [ 292: 293] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.272515 14720 usertrap_amd64.go:122] [ 292: 293] Allocate a new trap: 0xc00a072960 42 D0613 11:13:06.272547 14720 usertrap_amd64.go:225] [ 292: 293] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.279506 14720 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.279574 14720 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc00a072960 43 D0613 11:13:06.279598 14720 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.280026 14720 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.280086 14720 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.280137 14720 task_signals.go:204] [ 292: 293] Signal 292, PID: 293, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.280169 14720 task_exit.go:204] [ 292: 293] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.280823 14720 task_exit.go:204] [ 292: 293] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.280909 14720 task_exit.go:204] [ 292: 293] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.280997 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.281687 14720 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000100)) D0613 11:13:06.307008 14720 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.307088 14720 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc0067bc240 39 D0613 11:13:06.307282 14720 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.309281 14720 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.309368 14720 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc0067bc240 40 D0613 11:13:06.309393 14720 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.319066 14720 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.319141 14720 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc0067bc240 41 D0613 11:13:06.319161 14720 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.329547 14720 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.329631 14720 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc0067bc240 42 D0613 11:13:06.329658 14720 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.331676 14720 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.331815 14720 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.331877 14720 task_signals.go:204] [ 294: 295] Signal 294, PID: 295, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.331907 14720 task_exit.go:204] [ 294: 295] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.332521 14720 task_exit.go:204] [ 294: 295] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.332621 14720 task_exit.go:204] [ 294: 295] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.332648 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.332982 14720 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80045432, 0x0) D0613 11:13:06.346474 14720 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.346550 14720 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00d81a780 39 D0613 11:13:06.346958 14720 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.348891 14720 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.348996 14720 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00d81a780 40 D0613 11:13:06.349023 14720 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.364076 14720 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.364207 14720 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00d81a780 41 D0613 11:13:06.364257 14720 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.368461 14720 usertrap_amd64.go:212] [ 296: 297] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.368498 14720 usertrap_amd64.go:122] [ 296: 297] Allocate a new trap: 0xc00d81a780 42 D0613 11:13:06.368516 14720 usertrap_amd64.go:225] [ 296: 297] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.375322 14720 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.375373 14720 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00d81a780 43 D0613 11:13:06.375395 14720 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.375549 14720 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.375621 14720 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.375660 14720 task_signals.go:204] [ 296: 297] Signal 296, PID: 297, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.375682 14720 task_exit.go:204] [ 296: 297] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.376702 14720 task_exit.go:204] [ 296: 297] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.376732 14720 task_exit.go:204] [ 296: 297] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.376750 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.377173 14720 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000500)={'ip6_vti0\x00', &(0x7f0000000480)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) D0613 11:13:06.390517 14720 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.390591 14720 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc00d81a7b0 39 D0613 11:13:06.390871 14720 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.392375 14720 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.392434 14720 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc00d81a7b0 40 D0613 11:13:06.392456 14720 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.400451 14720 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.400527 14720 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc00d81a7b0 41 D0613 11:13:06.400551 14720 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.408390 14720 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.408455 14720 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc00d81a7b0 42 D0613 11:13:06.408480 14720 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.410203 14720 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.410305 14720 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.410374 14720 task_signals.go:204] [ 298: 299] Signal 298, PID: 299, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.410441 14720 task_exit.go:204] [ 298: 299] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.411004 14720 task_exit.go:204] [ 298: 299] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.411056 14720 task_exit.go:204] [ 298: 299] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.411098 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.411231 14720 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:06.420090 14720 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.420164 14720 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00d81a990 39 D0613 11:13:06.420282 14720 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.420828 14720 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.421018 14720 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00d81a990 40 D0613 11:13:06.421053 14720 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.433346 14720 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.433423 14720 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00d81a990 41 D0613 11:13:06.433444 14720 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.440390 14720 usertrap_amd64.go:212] [ 300: 301] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.440448 14720 usertrap_amd64.go:122] [ 300: 301] Allocate a new trap: 0xc00d81a990 42 D0613 11:13:06.440470 14720 usertrap_amd64.go:225] [ 300: 301] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.450572 14720 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.450619 14720 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00d81a990 43 D0613 11:13:06.450651 14720 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.451058 14720 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.451144 14720 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.451194 14720 task_signals.go:204] [ 300: 301] Signal 300, PID: 301, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.451220 14720 task_exit.go:204] [ 300: 301] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.451864 14720 task_exit.go:204] [ 300: 301] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.451947 14720 task_exit.go:204] [ 300: 301] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.451969 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.452498 14720 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: socketpair(0x10, 0x0, 0x5, &(0x7f0000000600)) D0613 11:13:06.465768 14720 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.465832 14720 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0056bfdd0 39 D0613 11:13:06.465979 14720 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.468714 14720 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.468801 14720 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0056bfdd0 40 D0613 11:13:06.468826 14720 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.480416 14720 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.480495 14720 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0056bfdd0 41 D0613 11:13:06.480518 14720 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.501335 14720 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.501434 14720 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0056bfdd0 42 D0613 11:13:06.501463 14720 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.502798 14720 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.502915 14720 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.502961 14720 task_signals.go:204] [ 302: 303] Signal 302, PID: 303, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.503033 14720 task_exit.go:204] [ 302: 303] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.503792 14720 task_exit.go:204] [ 302: 303] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.503883 14720 task_exit.go:204] [ 302: 303] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.503917 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.505108 14720 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541d, 0x0) D0613 11:13:06.519380 14720 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.519453 14720 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0067bc570 39 D0613 11:13:06.519532 14720 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.520461 14720 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.520501 14720 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0067bc570 40 D0613 11:13:06.520518 14720 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.528539 14720 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.528595 14720 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0067bc570 41 D0613 11:13:06.528615 14720 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.535332 14720 usertrap_amd64.go:212] [ 304: 305] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.535420 14720 usertrap_amd64.go:122] [ 304: 305] Allocate a new trap: 0xc0067bc570 42 D0613 11:13:06.535446 14720 usertrap_amd64.go:225] [ 304: 305] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.543834 14720 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.543900 14720 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0067bc570 43 D0613 11:13:06.543924 14720 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.544263 14720 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.544322 14720 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.544378 14720 task_signals.go:204] [ 304: 305] Signal 304, PID: 305, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.544413 14720 task_exit.go:204] [ 304: 305] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.545136 14720 task_exit.go:204] [ 304: 305] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.545366 14720 task_exit.go:204] [ 304: 305] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.545436 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.545580 14720 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000500)={'syztnl1\x00', 0x0}) D0613 11:13:06.557179 14720 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.557257 14720 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc007f625d0 39 D0613 11:13:06.557486 14720 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.559590 14720 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.559678 14720 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc007f625d0 40 D0613 11:13:06.559704 14720 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.570401 14720 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.570472 14720 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc007f625d0 41 D0613 11:13:06.570493 14720 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.578395 14720 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.578462 14720 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc007f625d0 42 D0613 11:13:06.578485 14720 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.580570 14720 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.580656 14720 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.580879 14720 task_signals.go:204] [ 306: 307] Signal 306, PID: 307, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.580978 14720 task_exit.go:204] [ 306: 307] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.584878 14720 task_exit.go:204] [ 306: 307] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.584931 14720 task_exit.go:204] [ 306: 307] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.585045 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.585567 14720 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:06.599434 14720 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.599513 14720 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc00a072c60 39 D0613 11:13:06.599657 14720 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.603147 14720 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.603230 14720 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc00a072c60 40 D0613 11:13:06.603252 14720 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.613203 14720 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.613246 14720 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc00a072c60 41 D0613 11:13:06.613270 14720 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.622543 14720 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.622639 14720 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc00a072c60 42 D0613 11:13:06.622662 14720 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.624451 14720 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.624534 14720 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.624583 14720 task_signals.go:204] [ 308: 309] Signal 308, PID: 309, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.624605 14720 task_exit.go:204] [ 308: 309] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.625333 14720 task_exit.go:204] [ 308: 309] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.625421 14720 task_exit.go:204] [ 308: 309] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.625449 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.626378 14720 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:06.637926 14720 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.637996 14720 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc00a072c90 39 D0613 11:13:06.638120 14720 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.639509 14720 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.639541 14720 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc00a072c90 40 D0613 11:13:06.639559 14720 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.651183 14720 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.651328 14720 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc00a072c90 41 D0613 11:13:06.651399 14720 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.664278 14720 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.664347 14720 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc00a072c90 42 D0613 11:13:06.664371 14720 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.666418 14720 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.666586 14720 task_signals.go:204] [ 310: 311] Signal 310, PID: 311, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.666632 14720 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.666670 14720 task_exit.go:204] [ 310: 311] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.667393 14720 task_exit.go:204] [ 310: 311] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.667432 14720 task_exit.go:204] [ 310: 311] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.667456 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.668020 14720 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:06.701250 14720 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.701329 14720 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0002ac1b0 39 D0613 11:13:06.701424 14720 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.704644 14720 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.704738 14720 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0002ac1b0 40 D0613 11:13:06.704766 14720 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.715138 14720 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.715185 14720 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0002ac1b0 41 D0613 11:13:06.715210 14720 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.723452 14720 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.723522 14720 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0002ac1b0 42 D0613 11:13:06.723543 14720 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.725046 14720 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.725140 14720 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.725293 14720 task_signals.go:204] [ 312: 313] Signal 312, PID: 313, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.725342 14720 task_exit.go:204] [ 312: 313] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.726356 14720 task_exit.go:204] [ 312: 313] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.726426 14720 task_exit.go:204] [ 312: 313] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.726457 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.726592 14720 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5409, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ebdf176b97b1a681"}) D0613 11:13:06.739426 14720 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.739486 14720 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc00a072de0 39 D0613 11:13:06.739594 14720 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.740668 14720 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.740701 14720 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc00a072de0 40 D0613 11:13:06.740717 14720 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.750594 14720 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.750682 14720 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc00a072de0 41 D0613 11:13:06.750717 14720 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.756595 14720 usertrap_amd64.go:212] [ 314: 315] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.756649 14720 usertrap_amd64.go:122] [ 314: 315] Allocate a new trap: 0xc00a072de0 42 D0613 11:13:06.756670 14720 usertrap_amd64.go:225] [ 314: 315] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.764853 14720 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.764905 14720 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc00a072de0 43 D0613 11:13:06.764926 14720 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.765297 14720 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.765357 14720 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.765459 14720 task_signals.go:204] [ 314: 315] Signal 314, PID: 315, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.765524 14720 task_exit.go:204] [ 314: 315] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.766210 14720 task_exit.go:204] [ 314: 315] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.766242 14720 task_exit.go:204] [ 314: 315] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.766259 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.767257 14720 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8949, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:06.793867 14720 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.793938 14720 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0067bc9c0 39 D0613 11:13:06.794093 14720 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.796210 14720 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.796279 14720 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0067bc9c0 40 D0613 11:13:06.796302 14720 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.809314 14720 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.809372 14720 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0067bc9c0 41 D0613 11:13:06.809393 14720 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.817033 14720 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.817084 14720 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0067bc9c0 42 D0613 11:13:06.817102 14720 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.818596 14720 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.818690 14720 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.818738 14720 task_signals.go:204] [ 316: 317] Signal 316, PID: 317, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.818767 14720 task_exit.go:204] [ 316: 317] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.819264 14720 task_exit.go:204] [ 316: 317] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.819323 14720 task_exit.go:204] [ 316: 317] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.819352 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.820365 14720 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b65, 0x0) D0613 11:13:06.833858 14720 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.833927 14720 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc00d81aba0 39 D0613 11:13:06.834039 14720 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.835134 14720 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.835203 14720 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc00d81aba0 40 D0613 11:13:06.835226 14720 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.847237 14720 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.847340 14720 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc00d81aba0 41 D0613 11:13:06.847369 14720 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.856212 14720 usertrap_amd64.go:212] [ 318: 319] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.856299 14720 usertrap_amd64.go:122] [ 318: 319] Allocate a new trap: 0xc00d81aba0 42 D0613 11:13:06.856320 14720 usertrap_amd64.go:225] [ 318: 319] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.862789 14720 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.862853 14720 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc00d81aba0 43 D0613 11:13:06.862877 14720 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.863041 14720 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.863092 14720 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.863131 14720 task_signals.go:204] [ 318: 319] Signal 318, PID: 319, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.863147 14720 task_exit.go:204] [ 318: 319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.863554 14720 task_exit.go:204] [ 318: 319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.863593 14720 task_exit.go:204] [ 318: 319] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.863615 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.864167 14720 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000000)) D0613 11:13:06.883333 14720 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.883406 14720 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc00b1f5140 39 D0613 11:13:06.883684 14720 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.886515 14720 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.886574 14720 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc00b1f5140 40 D0613 11:13:06.886608 14720 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.896618 14720 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.896693 14720 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc00b1f5140 41 D0613 11:13:06.896722 14720 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.904070 14720 usertrap_amd64.go:212] [ 320: 321] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:06.904142 14720 usertrap_amd64.go:122] [ 320: 321] Allocate a new trap: 0xc00b1f5140 42 D0613 11:13:06.904181 14720 usertrap_amd64.go:225] [ 320: 321] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.911434 14720 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.911531 14720 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc00b1f5140 43 D0613 11:13:06.911569 14720 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:06.912034 14720 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.912129 14720 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.912200 14720 task_signals.go:204] [ 320: 321] Signal 320, PID: 321, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.912224 14720 task_exit.go:204] [ 320: 321] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.913055 14720 task_exit.go:204] [ 320: 321] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.913135 14720 task_exit.go:204] [ 320: 321] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.913165 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.914164 14720 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) D0613 11:13:06.923916 14720 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.924016 14720 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0002ac3c0 39 D0613 11:13:06.924254 14720 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.928050 14720 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.928120 14720 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0002ac3c0 40 D0613 11:13:06.928149 14720 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.940018 14720 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.940088 14720 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0002ac3c0 41 D0613 11:13:06.940111 14720 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.952966 14720 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.953036 14720 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0002ac3c0 42 D0613 11:13:06.953062 14720 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.954226 14720 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.954304 14720 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.954456 14720 task_signals.go:204] [ 322: 323] Signal 322, PID: 323, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.954504 14720 task_exit.go:204] [ 322: 323] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.955078 14720 task_exit.go:204] [ 322: 323] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.955211 14720 task_exit.go:204] [ 322: 323] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.955255 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.955360 14720 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:06.974796 14720 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:06.974879 14720 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc007f62b40 39 D0613 11:13:06.974974 14720 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:06.975700 14720 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:06.975734 14720 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc007f62b40 40 D0613 11:13:06.975747 14720 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:06.986481 14720 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:06.986532 14720 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc007f62b40 41 D0613 11:13:06.986552 14720 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:06.995009 14720 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:06.995122 14720 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc007f62b40 42 D0613 11:13:06.995150 14720 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:06.997267 14720 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.997366 14720 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.997459 14720 task_signals.go:204] [ 324: 325] Signal 324, PID: 325, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:06.997830 14720 task_exit.go:204] [ 324: 325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:06.998521 14720 task_exit.go:204] [ 324: 325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:06.998596 14720 task_exit.go:204] [ 324: 325] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:06.998631 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:06.999962 14720 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:07.017119 14720 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.017214 14720 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc00b1f5380 39 D0613 11:13:07.017393 14720 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.020117 14720 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.020179 14720 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc00b1f5380 40 D0613 11:13:07.020203 14720 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.028810 14720 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.028921 14720 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc00b1f5380 41 D0613 11:13:07.028981 14720 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.039069 14720 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.039168 14720 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc00b1f5380 42 D0613 11:13:07.039195 14720 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.040718 14720 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.040796 14720 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.040862 14720 task_signals.go:204] [ 326: 327] Signal 326, PID: 327, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.040927 14720 task_exit.go:204] [ 326: 327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.041437 14720 task_exit.go:204] [ 326: 327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.041486 14720 task_exit.go:204] [ 326: 327] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.041504 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.041771 14720 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:07.043443 14720 task_signals.go:470] [ 7: 2894] Notified of signal 23 D0613 11:13:07.043481 14720 task_signals.go:220] [ 7: 2894] Signal 23: delivering to handler D0613 11:13:07.058800 14720 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.058858 14720 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00d81ad20 39 D0613 11:13:07.059040 14720 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.061649 14720 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.061687 14720 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00d81ad20 40 D0613 11:13:07.061709 14720 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.070960 14720 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.071016 14720 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00d81ad20 41 D0613 11:13:07.071036 14720 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.076354 14720 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.076422 14720 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00d81ad20 42 D0613 11:13:07.076455 14720 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.077870 14720 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.077947 14720 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.077992 14720 task_signals.go:204] [ 328: 329] Signal 328, PID: 329, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.078017 14720 task_exit.go:204] [ 328: 329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.078483 14720 task_exit.go:204] [ 328: 329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.078525 14720 task_exit.go:204] [ 328: 329] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.078550 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.079670 14720 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0xa) D0613 11:13:07.098444 14720 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.098507 14720 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc0002ac480 39 D0613 11:13:07.098591 14720 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.099563 14720 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.099601 14720 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc0002ac480 40 D0613 11:13:07.099619 14720 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.110867 14720 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.110964 14720 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc0002ac480 41 D0613 11:13:07.110990 14720 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.117248 14720 usertrap_amd64.go:212] [ 330: 331] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:07.117306 14720 usertrap_amd64.go:122] [ 330: 331] Allocate a new trap: 0xc0002ac480 42 D0613 11:13:07.117324 14720 usertrap_amd64.go:225] [ 330: 331] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.122466 14720 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.122517 14720 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc0002ac480 43 D0613 11:13:07.122538 14720 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.122971 14720 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.123214 14720 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.123288 14720 task_signals.go:204] [ 330: 331] Signal 330, PID: 331, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.123313 14720 task_exit.go:204] [ 330: 331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.123971 14720 task_exit.go:204] [ 330: 331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.124067 14720 task_exit.go:204] [ 330: 331] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.124100 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.125090 14720 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@random="b1ecd9b521a8", @random="2df65dc7e3bf", @val, {@ipv6}}, 0x0) D0613 11:13:07.138164 14720 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.138220 14720 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc007f62ff0 39 D0613 11:13:07.138376 14720 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.139210 14720 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.139250 14720 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc007f62ff0 40 D0613 11:13:07.139266 14720 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.147926 14720 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.147984 14720 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc007f62ff0 41 D0613 11:13:07.148002 14720 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.158092 14720 usertrap_amd64.go:212] [ 332: 333] Found the pattern at ip 5604396c3f18:sysno 1 D0613 11:13:07.158149 14720 usertrap_amd64.go:122] [ 332: 333] Allocate a new trap: 0xc007f62ff0 42 D0613 11:13:07.158171 14720 usertrap_amd64.go:225] [ 332: 333] Apply the binary patch addr 5604396c3f18 trap addr 62d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.164575 14720 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.164658 14720 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc007f62ff0 43 D0613 11:13:07.164683 14720 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.167859 14720 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.167942 14720 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.167989 14720 task_signals.go:204] [ 332: 333] Signal 332, PID: 333, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.168011 14720 task_exit.go:204] [ 332: 333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.168375 14720 task_exit.go:204] [ 332: 333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.168404 14720 task_exit.go:204] [ 332: 333] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.168421 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.169286 14720 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8993, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:07.181710 14720 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.181799 14720 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc00a073470 39 D0613 11:13:07.181967 14720 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.185821 14720 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.185891 14720 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc00a073470 40 D0613 11:13:07.185912 14720 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.198813 14720 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.198892 14720 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc00a073470 41 D0613 11:13:07.198918 14720 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.208796 14720 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.208884 14720 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc00a073470 42 D0613 11:13:07.208910 14720 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.210439 14720 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.210543 14720 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.210607 14720 task_signals.go:204] [ 334: 335] Signal 334, PID: 335, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.210690 14720 task_exit.go:204] [ 334: 335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.211890 14720 task_exit.go:204] [ 334: 335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.211989 14720 task_exit.go:204] [ 334: 335] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.212012 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.212337 14720 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) D0613 11:13:07.230358 14720 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.230442 14720 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc00a0736b0 39 D0613 11:13:07.230652 14720 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.232796 14720 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.232882 14720 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc00a0736b0 40 D0613 11:13:07.232905 14720 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.242600 14720 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.242643 14720 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc00a0736b0 41 D0613 11:13:07.242658 14720 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.249664 14720 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.249720 14720 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc00a0736b0 42 D0613 11:13:07.249743 14720 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.251875 14720 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.251970 14720 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.252028 14720 task_signals.go:204] [ 336: 337] Signal 336, PID: 337, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.252062 14720 task_exit.go:204] [ 336: 337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.252658 14720 task_exit.go:204] [ 336: 337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.252709 14720 task_exit.go:204] [ 336: 337] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.252729 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.253098 14720 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b35, 0x0) D0613 11:13:07.262710 14720 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.262767 14720 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc00b1f5590 39 D0613 11:13:07.262892 14720 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.264111 14720 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.264199 14720 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc00b1f5590 40 D0613 11:13:07.264220 14720 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.274898 14720 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.274954 14720 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc00b1f5590 41 D0613 11:13:07.274972 14720 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.281433 14720 usertrap_amd64.go:212] [ 338: 339] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:07.281516 14720 usertrap_amd64.go:122] [ 338: 339] Allocate a new trap: 0xc00b1f5590 42 D0613 11:13:07.281539 14720 usertrap_amd64.go:225] [ 338: 339] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.287072 14720 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.287124 14720 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc00b1f5590 43 D0613 11:13:07.287155 14720 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.287285 14720 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.287342 14720 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.287379 14720 task_signals.go:204] [ 338: 339] Signal 338, PID: 339, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.287431 14720 task_exit.go:204] [ 338: 339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.287872 14720 task_exit.go:204] [ 338: 339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.287909 14720 task_exit.go:204] [ 338: 339] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.287926 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.292903 14720 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8931, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:07.326190 14720 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.326264 14720 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc00b1f5710 39 D0613 11:13:07.326630 14720 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.330093 14720 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.330181 14720 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc00b1f5710 40 D0613 11:13:07.330209 14720 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.342417 14720 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.342483 14720 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc00b1f5710 41 D0613 11:13:07.342510 14720 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.352366 14720 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.352413 14720 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc00b1f5710 42 D0613 11:13:07.352437 14720 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.354081 14720 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.354197 14720 task_signals.go:204] [ 340: 341] Signal 340, PID: 341, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.354224 14720 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.354241 14720 task_exit.go:204] [ 340: 341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.354685 14720 task_exit.go:204] [ 340: 341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.354790 14720 task_exit.go:204] [ 340: 341] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.354848 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.355770 14720 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)=0xb) D0613 11:13:07.373708 14720 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.373791 14720 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc0067bcc90 39 D0613 11:13:07.374122 14720 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.377294 14720 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.377360 14720 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc0067bcc90 40 D0613 11:13:07.377383 14720 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.386206 14720 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.386271 14720 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc0067bcc90 41 D0613 11:13:07.386296 14720 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.393713 14720 usertrap_amd64.go:212] [ 342: 343] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:07.394076 14720 usertrap_amd64.go:122] [ 342: 343] Allocate a new trap: 0xc0067bcc90 42 D0613 11:13:07.394176 14720 usertrap_amd64.go:225] [ 342: 343] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.403221 14720 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.403294 14720 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc0067bcc90 43 D0613 11:13:07.403319 14720 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.403764 14720 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.403898 14720 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.403963 14720 task_signals.go:204] [ 342: 343] Signal 342, PID: 343, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.404050 14720 task_exit.go:204] [ 342: 343] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.404833 14720 task_exit.go:204] [ 342: 343] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.405124 14720 task_exit.go:204] [ 342: 343] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.405163 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.405854 14720 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b48, 0x0) D0613 11:13:07.414216 14720 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.414280 14720 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc007f63500 39 D0613 11:13:07.414393 14720 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.417135 14720 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.417173 14720 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc007f63500 40 D0613 11:13:07.417193 14720 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.430740 14720 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.430810 14720 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc007f63500 41 D0613 11:13:07.430836 14720 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.440357 14720 usertrap_amd64.go:212] [ 344: 345] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:07.440442 14720 usertrap_amd64.go:122] [ 344: 345] Allocate a new trap: 0xc007f63500 42 D0613 11:13:07.440470 14720 usertrap_amd64.go:225] [ 344: 345] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.451030 14720 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.451104 14720 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc007f63500 43 D0613 11:13:07.451126 14720 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.451552 14720 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.451683 14720 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.451716 14720 task_signals.go:204] [ 344: 345] Signal 344, PID: 345, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.451734 14720 task_exit.go:204] [ 344: 345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.452320 14720 task_exit.go:204] [ 344: 345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.452363 14720 task_exit.go:204] [ 344: 345] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.452387 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.452553 14720 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b68, 0x0) D0613 11:13:07.464569 14720 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.464644 14720 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc007f635c0 39 D0613 11:13:07.464757 14720 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.466516 14720 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.466555 14720 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc007f635c0 40 D0613 11:13:07.466577 14720 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.475945 14720 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.476015 14720 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc007f635c0 41 D0613 11:13:07.476039 14720 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.480847 14720 usertrap_amd64.go:212] [ 346: 347] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:07.480912 14720 usertrap_amd64.go:122] [ 346: 347] Allocate a new trap: 0xc007f635c0 42 D0613 11:13:07.480932 14720 usertrap_amd64.go:225] [ 346: 347] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.490028 14720 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.490104 14720 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc007f635c0 43 D0613 11:13:07.490132 14720 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:07.490701 14720 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.490818 14720 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.490923 14720 task_signals.go:204] [ 346: 347] Signal 346, PID: 347, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.491023 14720 task_exit.go:204] [ 346: 347] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.491783 14720 task_exit.go:204] [ 346: 347] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.491865 14720 task_exit.go:204] [ 346: 347] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.491885 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.492913 14720 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) D0613 11:13:07.511152 14720 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.511210 14720 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc00b1f5aa0 39 D0613 11:13:07.511412 14720 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.513127 14720 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.513211 14720 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc00b1f5aa0 40 D0613 11:13:07.513242 14720 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.521888 14720 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.521952 14720 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc00b1f5aa0 41 D0613 11:13:07.521980 14720 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.529772 14720 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.529854 14720 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc00b1f5aa0 42 D0613 11:13:07.529877 14720 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.531755 14720 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.531947 14720 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.532002 14720 task_signals.go:204] [ 348: 349] Signal 348, PID: 349, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.532035 14720 task_exit.go:204] [ 348: 349] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.532553 14720 task_exit.go:204] [ 348: 349] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.532622 14720 task_exit.go:204] [ 348: 349] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.532642 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.533821 14720 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000f80)=[{{&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e80)=[{0x0}, {0x0}], 0x2, &(0x7f0000000f40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x28}}], 0x1, 0x0) D0613 11:13:07.557732 14720 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.557792 14720 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00a073a10 39 D0613 11:13:07.557942 14720 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.559789 14720 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.559852 14720 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00a073a10 40 D0613 11:13:07.559873 14720 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.570751 14720 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.570814 14720 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00a073a10 41 D0613 11:13:07.570836 14720 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.581394 14720 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.581448 14720 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00a073a10 42 D0613 11:13:07.581468 14720 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.582814 14720 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.582865 14720 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.582892 14720 task_signals.go:204] [ 350: 351] Signal 350, PID: 351, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.582919 14720 task_exit.go:204] [ 350: 351] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.583356 14720 task_exit.go:204] [ 350: 351] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.583385 14720 task_exit.go:204] [ 350: 351] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.583403 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.584104 14720 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:07.595134 14720 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.595189 14720 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc0002ac810 39 D0613 11:13:07.595330 14720 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.597005 14720 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.597040 14720 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc0002ac810 40 D0613 11:13:07.597059 14720 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.602442 14720 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.602480 14720 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc0002ac810 41 D0613 11:13:07.602496 14720 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.609475 14720 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.609550 14720 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc0002ac810 42 D0613 11:13:07.609585 14720 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.610813 14720 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.610907 14720 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.610986 14720 task_signals.go:204] [ 352: 353] Signal 352, PID: 353, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.611076 14720 task_exit.go:204] [ 352: 353] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.613955 14720 task_exit.go:204] [ 352: 353] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.614068 14720 task_exit.go:204] [ 352: 353] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.614102 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.615129 14720 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: prctl$PR_SET_VMA(0x8, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:07.627316 14720 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.627381 14720 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002ac9f0 39 D0613 11:13:07.627594 14720 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.629300 14720 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.629368 14720 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002ac9f0 40 D0613 11:13:07.629393 14720 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.637479 14720 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.637540 14720 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002ac9f0 41 D0613 11:13:07.637558 14720 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.642885 14720 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.642956 14720 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002ac9f0 42 D0613 11:13:07.642977 14720 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.645318 14720 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.645468 14720 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.645545 14720 task_signals.go:204] [ 354: 355] Signal 354, PID: 355, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.645569 14720 task_exit.go:204] [ 354: 355] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.646284 14720 task_exit.go:204] [ 354: 355] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.646409 14720 task_exit.go:204] [ 354: 355] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.646440 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.646890 14720 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: rt_sigprocmask(0x0, &(0x7f00000021c0)={[0xc75a]}, &(0x7f0000002200), 0x8) D0613 11:13:07.658774 14720 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.658862 14720 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc0002acab0 39 D0613 11:13:07.659173 14720 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.661602 14720 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.661655 14720 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc0002acab0 40 D0613 11:13:07.661671 14720 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.673124 14720 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.673197 14720 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc0002acab0 41 D0613 11:13:07.673223 14720 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.678270 14720 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.678330 14720 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc0002acab0 42 D0613 11:13:07.678369 14720 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.678816 14720 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.678875 14720 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.678962 14720 task_signals.go:204] [ 356: 357] Signal 356, PID: 357, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.679059 14720 task_exit.go:204] [ 356: 357] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.679668 14720 task_exit.go:204] [ 356: 357] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.679727 14720 task_exit.go:204] [ 356: 357] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.679745 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.679889 14720 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: prctl$PR_SET_VMA(0x2, 0x1000000000000, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:07.692899 14720 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.693008 14720 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc0067bd050 39 D0613 11:13:07.693110 14720 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.693639 14720 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.693669 14720 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc0067bd050 40 D0613 11:13:07.693689 14720 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.703378 14720 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.703442 14720 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc0067bd050 41 D0613 11:13:07.703461 14720 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.757100 14720 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.757192 14720 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc0067bd050 42 D0613 11:13:07.757220 14720 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.758846 14720 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.758947 14720 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.759024 14720 task_signals.go:204] [ 358: 359] Signal 358, PID: 359, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.759090 14720 task_exit.go:204] [ 358: 359] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.759742 14720 task_exit.go:204] [ 358: 359] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.759784 14720 task_exit.go:204] [ 358: 359] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.759808 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.760623 14720 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f00000000c0)) D0613 11:13:07.794804 14720 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.795000 14720 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc0002ac000 39 D0613 11:13:07.795135 14720 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.800233 14720 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.800302 14720 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc0002ac000 40 D0613 11:13:07.800324 14720 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.813876 14720 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.813961 14720 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc0002ac000 41 D0613 11:13:07.813989 14720 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.819766 14720 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.819844 14720 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc0002ac000 42 D0613 11:13:07.819867 14720 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.821119 14720 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.821226 14720 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.821260 14720 task_signals.go:204] [ 360: 361] Signal 360, PID: 361, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.821301 14720 task_exit.go:204] [ 360: 361] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.824694 14720 task_exit.go:204] [ 360: 361] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.824793 14720 task_exit.go:204] [ 360: 361] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.824822 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.826161 14720 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:07.838221 14720 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.838280 14720 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc00d81a000 39 D0613 11:13:07.838379 14720 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.838914 14720 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.839039 14720 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc00d81a000 40 D0613 11:13:07.839069 14720 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.848808 14720 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.848879 14720 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc00d81a000 41 D0613 11:13:07.848903 14720 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.856008 14720 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.856087 14720 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc00d81a000 42 D0613 11:13:07.856119 14720 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.857524 14720 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.857614 14720 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.857673 14720 task_signals.go:204] [ 362: 363] Signal 362, PID: 363, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.857705 14720 task_exit.go:204] [ 362: 363] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.858169 14720 task_exit.go:204] [ 362: 363] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.858210 14720 task_exit.go:204] [ 362: 363] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.858230 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.858290 14720 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a00)) D0613 11:13:07.869876 14720 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.869943 14720 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0002ac360 39 D0613 11:13:07.870122 14720 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.873526 14720 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.873568 14720 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0002ac360 40 D0613 11:13:07.873588 14720 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.885322 14720 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.885392 14720 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0002ac360 41 D0613 11:13:07.885414 14720 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.894361 14720 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.894462 14720 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0002ac360 42 D0613 11:13:07.894499 14720 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.896184 14720 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.896252 14720 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.896251 14720 task_signals.go:204] [ 364: 365] Signal 364, PID: 365, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.896302 14720 task_exit.go:204] [ 364: 365] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.897057 14720 task_exit.go:204] [ 364: 365] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.897097 14720 task_exit.go:204] [ 364: 365] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.897112 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.898113 14720 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f5, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:07.911445 14720 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.911518 14720 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc0079741b0 39 D0613 11:13:07.911663 14720 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.913680 14720 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.913742 14720 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc0079741b0 40 D0613 11:13:07.913764 14720 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.925093 14720 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.925336 14720 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc0079741b0 41 D0613 11:13:07.925387 14720 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.933953 14720 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.934014 14720 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc0079741b0 42 D0613 11:13:07.934037 14720 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.934953 14720 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.935029 14720 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.935069 14720 task_signals.go:204] [ 366: 367] Signal 366, PID: 367, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.935085 14720 task_exit.go:204] [ 366: 367] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.935835 14720 task_exit.go:204] [ 366: 367] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.936021 14720 task_exit.go:204] [ 366: 367] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.936085 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.936782 14720 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8935, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:07.957414 14720 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:07.957520 14720 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc00d81a180 39 D0613 11:13:07.957822 14720 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:07.960196 14720 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:07.960395 14720 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc00d81a180 40 D0613 11:13:07.960452 14720 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:07.969247 14720 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:07.969302 14720 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc00d81a180 41 D0613 11:13:07.969330 14720 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:07.981897 14720 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:07.982002 14720 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc00d81a180 42 D0613 11:13:07.982032 14720 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:07.983689 14720 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.983859 14720 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.983895 14720 task_signals.go:204] [ 368: 369] Signal 368, PID: 369, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:07.983928 14720 task_exit.go:204] [ 368: 369] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:07.984768 14720 task_exit.go:204] [ 368: 369] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:07.984840 14720 task_exit.go:204] [ 368: 369] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:07.984861 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:07.985125 14720 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:07 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='-]//)\xa5%:\x00') D0613 11:13:08.001534 14720 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.001602 14720 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002ac4b0 39 D0613 11:13:08.001699 14720 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.002483 14720 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.002601 14720 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002ac4b0 40 D0613 11:13:08.002660 14720 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.008733 14720 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.008794 14720 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002ac4b0 41 D0613 11:13:08.008816 14720 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.017723 14720 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.017794 14720 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002ac4b0 42 D0613 11:13:08.017817 14720 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.018920 14720 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.019022 14720 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.019070 14720 task_signals.go:204] [ 370: 371] Signal 370, PID: 371, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.019092 14720 task_exit.go:204] [ 370: 371] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.019584 14720 task_exit.go:204] [ 370: 371] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.019630 14720 task_exit.go:204] [ 370: 371] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.019647 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.020001 14720 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x5421, 0x0) D0613 11:13:08.028310 14720 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.028361 14720 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc00a0723f0 39 D0613 11:13:08.028439 14720 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.028813 14720 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.028850 14720 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc00a0723f0 40 D0613 11:13:08.028868 14720 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.047898 14720 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.047959 14720 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc00a0723f0 41 D0613 11:13:08.047975 14720 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.059574 14720 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.059646 14720 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc00a0723f0 42 D0613 11:13:08.059674 14720 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.060537 14720 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.060609 14720 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.060659 14720 task_signals.go:204] [ 372: 373] Signal 372, PID: 373, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.060694 14720 task_exit.go:204] [ 372: 373] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.061093 14720 task_exit.go:204] [ 372: 373] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.061120 14720 task_exit.go:204] [ 372: 373] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.061137 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.066401 14720 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x5450, 0x0) D0613 11:13:08.079826 14720 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.079885 14720 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc0079744b0 39 D0613 11:13:08.080064 14720 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.080829 14720 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.080915 14720 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc0079744b0 40 D0613 11:13:08.081018 14720 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.088893 14720 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.088985 14720 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc0079744b0 41 D0613 11:13:08.089012 14720 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.096374 14720 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.096452 14720 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc0079744b0 42 D0613 11:13:08.096473 14720 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.098812 14720 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.098867 14720 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.098906 14720 task_signals.go:204] [ 374: 375] Signal 374, PID: 375, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.098923 14720 task_exit.go:204] [ 374: 375] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.099728 14720 task_exit.go:204] [ 374: 375] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.099810 14720 task_exit.go:204] [ 374: 375] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.099834 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.101099 14720 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x6f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.115412 14720 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.115462 14720 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc00a072660 39 D0613 11:13:08.115743 14720 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.117640 14720 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.117676 14720 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc00a072660 40 D0613 11:13:08.117693 14720 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.126379 14720 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.126428 14720 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc00a072660 41 D0613 11:13:08.126447 14720 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.133306 14720 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.133350 14720 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc00a072660 42 D0613 11:13:08.133371 14720 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.134613 14720 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.134665 14720 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.134868 14720 task_signals.go:204] [ 376: 377] Signal 376, PID: 377, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.134914 14720 task_exit.go:204] [ 376: 377] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.135495 14720 task_exit.go:204] [ 376: 377] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.135532 14720 task_exit.go:204] [ 376: 377] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.135548 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.135702 14720 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/+\x00') D0613 11:13:08.146490 14720 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.146561 14720 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc007f62210 39 D0613 11:13:08.146774 14720 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.150557 14720 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.150624 14720 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc007f62210 40 D0613 11:13:08.150646 14720 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.159501 14720 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.159553 14720 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc007f62210 41 D0613 11:13:08.159573 14720 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.165817 14720 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.165861 14720 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc007f62210 42 D0613 11:13:08.165877 14720 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.166422 14720 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.166507 14720 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.166555 14720 task_signals.go:204] [ 378: 379] Signal 378, PID: 379, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.166586 14720 task_exit.go:204] [ 378: 379] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.166988 14720 task_exit.go:204] [ 378: 379] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.167035 14720 task_exit.go:204] [ 378: 379] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.167050 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.167837 14720 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.182342 14720 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.182456 14720 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc0002ac690 39 D0613 11:13:08.182950 14720 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.184526 14720 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.184595 14720 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc0002ac690 40 D0613 11:13:08.184618 14720 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.194194 14720 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.194262 14720 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc0002ac690 41 D0613 11:13:08.194285 14720 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.198348 14720 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.198399 14720 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc0002ac690 42 D0613 11:13:08.198414 14720 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.199801 14720 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.199865 14720 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.199897 14720 task_signals.go:204] [ 380: 381] Signal 380, PID: 381, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.199918 14720 task_exit.go:204] [ 380: 381] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.200286 14720 task_exit.go:204] [ 380: 381] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.200329 14720 task_exit.go:204] [ 380: 381] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.200352 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.204014 14720 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) D0613 11:13:08.228549 14720 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.228647 14720 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc007974840 39 D0613 11:13:08.228796 14720 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.231038 14720 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.231245 14720 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc007974840 40 D0613 11:13:08.231289 14720 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.245595 14720 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.245664 14720 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc007974840 41 D0613 11:13:08.245687 14720 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.251118 14720 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.251202 14720 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc007974840 42 D0613 11:13:08.251224 14720 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.252301 14720 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.252373 14720 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.252410 14720 task_signals.go:204] [ 382: 383] Signal 382, PID: 383, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.252428 14720 task_exit.go:204] [ 382: 383] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.253122 14720 task_exit.go:204] [ 382: 383] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.253202 14720 task_exit.go:204] [ 382: 383] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.253230 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.253866 14720 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x40086602, 0x0) D0613 11:13:08.268702 14720 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.268784 14720 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc00d81a330 39 D0613 11:13:08.269049 14720 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.271331 14720 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.271387 14720 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc00d81a330 40 D0613 11:13:08.271409 14720 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.279712 14720 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.279827 14720 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc00d81a330 41 D0613 11:13:08.279867 14720 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.285064 14720 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.285127 14720 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc00d81a330 42 D0613 11:13:08.285149 14720 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.286279 14720 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.286405 14720 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.286456 14720 task_signals.go:204] [ 384: 385] Signal 384, PID: 385, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.286488 14720 task_exit.go:204] [ 384: 385] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.287230 14720 task_exit.go:204] [ 384: 385] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.287312 14720 task_exit.go:204] [ 384: 385] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.287334 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.288346 14720 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.300633 14720 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.300701 14720 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc0002ac870 39 D0613 11:13:08.300845 14720 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.302838 14720 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.302894 14720 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc0002ac870 40 D0613 11:13:08.302915 14720 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.311733 14720 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.311859 14720 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc0002ac870 41 D0613 11:13:08.311888 14720 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.316831 14720 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.316872 14720 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc0002ac870 42 D0613 11:13:08.316889 14720 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.319267 14720 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.319323 14720 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.319358 14720 task_signals.go:204] [ 386: 387] Signal 386, PID: 387, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.319424 14720 task_exit.go:204] [ 386: 387] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.319857 14720 task_exit.go:204] [ 386: 387] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.319887 14720 task_exit.go:204] [ 386: 387] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.319912 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.321399 14720 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.333442 14720 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.333482 14720 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0067bc5a0 39 D0613 11:13:08.333856 14720 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.334492 14720 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.334516 14720 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0067bc5a0 40 D0613 11:13:08.334528 14720 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.343209 14720 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.343284 14720 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0067bc5a0 41 D0613 11:13:08.343308 14720 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.351082 14720 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.351155 14720 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0067bc5a0 42 D0613 11:13:08.351177 14720 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.352530 14720 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.352609 14720 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.352682 14720 task_signals.go:204] [ 388: 389] Signal 388, PID: 389, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.352782 14720 task_exit.go:204] [ 388: 389] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.353308 14720 task_exit.go:204] [ 388: 389] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.353354 14720 task_exit.go:204] [ 388: 389] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.353374 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.354871 14720 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x5460, 0x0) D0613 11:13:08.364507 14720 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.364552 14720 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc00d81a5d0 39 D0613 11:13:08.364625 14720 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.365328 14720 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.365356 14720 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc00d81a5d0 40 D0613 11:13:08.365369 14720 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.369419 14720 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.369614 14720 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc00d81a5d0 41 D0613 11:13:08.369628 14720 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.375024 14720 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.375127 14720 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc00d81a5d0 42 D0613 11:13:08.375154 14720 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.376496 14720 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.376569 14720 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.376612 14720 task_signals.go:204] [ 390: 391] Signal 390, PID: 391, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.376670 14720 task_exit.go:204] [ 390: 391] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.377218 14720 task_exit.go:204] [ 390: 391] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.377265 14720 task_exit.go:204] [ 390: 391] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.377285 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.377651 14720 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) D0613 11:13:08.390498 14720 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.390575 14720 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc00a072960 39 D0613 11:13:08.390767 14720 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.393728 14720 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.393786 14720 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc00a072960 40 D0613 11:13:08.393805 14720 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.402035 14720 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.402082 14720 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc00a072960 41 D0613 11:13:08.402103 14720 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.410529 14720 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.410588 14720 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc00a072960 42 D0613 11:13:08.410608 14720 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.412062 14720 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.412127 14720 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.412353 14720 task_signals.go:204] [ 392: 393] Signal 392, PID: 393, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.412444 14720 task_exit.go:204] [ 392: 393] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.412989 14720 task_exit.go:204] [ 392: 393] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.413128 14720 task_exit.go:204] [ 392: 393] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.413181 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.413497 14720 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)) D0613 11:13:08.425614 14720 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.425688 14720 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc00a072ab0 39 D0613 11:13:08.425843 14720 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.427662 14720 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.427706 14720 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc00a072ab0 40 D0613 11:13:08.427733 14720 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.436146 14720 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.436194 14720 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc00a072ab0 41 D0613 11:13:08.436212 14720 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.443299 14720 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.443371 14720 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc00a072ab0 42 D0613 11:13:08.443402 14720 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.444780 14720 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.444859 14720 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.444907 14720 task_signals.go:204] [ 394: 395] Signal 394, PID: 395, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.444965 14720 task_exit.go:204] [ 394: 395] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.445917 14720 task_exit.go:204] [ 394: 395] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.445997 14720 task_exit.go:204] [ 394: 395] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.446025 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.447000 14720 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2, 0x20000000) D0613 11:13:08.456565 14720 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.456634 14720 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc00d81a9f0 39 D0613 11:13:08.456863 14720 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.458734 14720 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.458801 14720 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc00d81a9f0 40 D0613 11:13:08.458819 14720 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.468864 14720 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.468930 14720 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc00d81a9f0 41 D0613 11:13:08.468999 14720 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.476710 14720 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.476788 14720 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc00d81a9f0 42 D0613 11:13:08.476813 14720 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.477937 14720 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.478013 14720 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.478059 14720 task_signals.go:204] [ 396: 397] Signal 396, PID: 397, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.478092 14720 task_exit.go:204] [ 396: 397] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.478545 14720 task_exit.go:204] [ 396: 397] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.478584 14720 task_exit.go:204] [ 396: 397] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.478604 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.478634 14720 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.499127 14720 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.499180 14720 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc00a072b70 39 D0613 11:13:08.499341 14720 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.500536 14720 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.500562 14720 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc00a072b70 40 D0613 11:13:08.500580 14720 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.509346 14720 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.509419 14720 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc00a072b70 41 D0613 11:13:08.509446 14720 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.515458 14720 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.515539 14720 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc00a072b70 42 D0613 11:13:08.515561 14720 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.516342 14720 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.516474 14720 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.516527 14720 task_signals.go:204] [ 398: 399] Signal 398, PID: 399, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.516549 14720 task_exit.go:204] [ 398: 399] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.517108 14720 task_exit.go:204] [ 398: 399] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.517207 14720 task_exit.go:204] [ 398: 399] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.517235 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.517514 14720 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0xc020660b, 0x0) D0613 11:13:08.539727 14720 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.539796 14720 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc007f62900 39 D0613 11:13:08.541401 14720 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.543095 14720 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.543159 14720 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc007f62900 40 D0613 11:13:08.543180 14720 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.551866 14720 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.551909 14720 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc007f62900 41 D0613 11:13:08.551926 14720 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.559588 14720 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.559641 14720 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc007f62900 42 D0613 11:13:08.559656 14720 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.561946 14720 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.562010 14720 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.562045 14720 task_signals.go:204] [ 400: 401] Signal 400, PID: 401, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.562077 14720 task_exit.go:204] [ 400: 401] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.562557 14720 task_exit.go:204] [ 400: 401] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.562599 14720 task_exit.go:204] [ 400: 401] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.562617 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.563148 14720 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0xc0189436, 0x0) D0613 11:13:08.584255 14720 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.584373 14720 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0112ec1e0 39 D0613 11:13:08.584524 14720 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.586965 14720 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.587036 14720 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0112ec1e0 40 D0613 11:13:08.587070 14720 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.597232 14720 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.597287 14720 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0112ec1e0 41 D0613 11:13:08.597307 14720 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.604644 14720 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.604695 14720 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0112ec1e0 42 D0613 11:13:08.604714 14720 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.605503 14720 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.605612 14720 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.605680 14720 task_signals.go:204] [ 402: 403] Signal 402, PID: 403, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.605703 14720 task_exit.go:204] [ 402: 403] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.606220 14720 task_exit.go:204] [ 402: 403] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.606263 14720 task_exit.go:204] [ 402: 403] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.606301 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.606340 14720 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) D0613 11:13:08.616212 14720 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.616262 14720 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc0112ec210 39 D0613 11:13:08.616493 14720 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.617873 14720 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.617908 14720 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc0112ec210 40 D0613 11:13:08.617926 14720 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.628301 14720 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.628375 14720 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc0112ec210 41 D0613 11:13:08.628401 14720 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.638546 14720 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:08.638628 14720 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc007f629f0 42 D0613 11:13:08.638753 14720 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.649110 14720 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.649181 14720 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc0112ec210 42 D0613 11:13:08.649209 14720 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.651166 14720 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.651253 14720 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.651293 14720 task_signals.go:204] [ 404: 405] Signal 404, PID: 405, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.651309 14720 task_exit.go:204] [ 404: 405] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.652094 14720 task_exit.go:204] [ 404: 405] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.652148 14720 task_exit.go:204] [ 404: 405] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.652169 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.653428 14720 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x84821, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc480}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.674831 14720 usertrap_amd64.go:212] [ 407: 407] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.674909 14720 usertrap_amd64.go:122] [ 407: 407] Allocate a new trap: 0xc00d81aea0 39 D0613 11:13:08.675078 14720 usertrap_amd64.go:225] [ 407: 407] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.676441 14720 usertrap_amd64.go:212] [ 407: 407] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.676509 14720 usertrap_amd64.go:122] [ 407: 407] Allocate a new trap: 0xc00d81aea0 40 D0613 11:13:08.676534 14720 usertrap_amd64.go:225] [ 407: 407] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.683128 14720 usertrap_amd64.go:212] [ 407: 407] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.683189 14720 usertrap_amd64.go:122] [ 407: 407] Allocate a new trap: 0xc00d81aea0 41 D0613 11:13:08.683211 14720 usertrap_amd64.go:225] [ 407: 407] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.687791 14720 usertrap_amd64.go:212] [ 407: 407] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.687860 14720 usertrap_amd64.go:122] [ 407: 407] Allocate a new trap: 0xc00d81aea0 42 D0613 11:13:08.687880 14720 usertrap_amd64.go:225] [ 407: 407] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.689078 14720 task_exit.go:204] [ 407: 407] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.689198 14720 task_exit.go:204] [ 407: 407] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.689248 14720 task_signals.go:204] [ 407: 408] Signal 407, PID: 408, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.689271 14720 task_exit.go:204] [ 407: 408] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.689845 14720 task_exit.go:204] [ 407: 408] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.689896 14720 task_exit.go:204] [ 407: 408] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.689912 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.691657 14720 task_exit.go:204] [ 407: 407] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x5421, 0x1ffff000) D0613 11:13:08.700397 14720 usertrap_amd64.go:212] [ 409: 409] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.700455 14720 usertrap_amd64.go:122] [ 409: 409] Allocate a new trap: 0xc0112ec2d0 39 D0613 11:13:08.700576 14720 usertrap_amd64.go:225] [ 409: 409] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.702598 14720 usertrap_amd64.go:212] [ 409: 409] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.702679 14720 usertrap_amd64.go:122] [ 409: 409] Allocate a new trap: 0xc0112ec2d0 40 D0613 11:13:08.702710 14720 usertrap_amd64.go:225] [ 409: 409] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.713098 14720 usertrap_amd64.go:212] [ 409: 409] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.713175 14720 usertrap_amd64.go:122] [ 409: 409] Allocate a new trap: 0xc0112ec2d0 41 D0613 11:13:08.713207 14720 usertrap_amd64.go:225] [ 409: 409] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.720504 14720 usertrap_amd64.go:212] [ 409: 409] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.720568 14720 usertrap_amd64.go:122] [ 409: 409] Allocate a new trap: 0xc0112ec2d0 42 D0613 11:13:08.720593 14720 usertrap_amd64.go:225] [ 409: 409] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.721565 14720 task_exit.go:204] [ 409: 409] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.721621 14720 task_exit.go:204] [ 409: 409] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.721651 14720 task_signals.go:204] [ 409: 410] Signal 409, PID: 410, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.721675 14720 task_exit.go:204] [ 409: 410] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.722019 14720 task_exit.go:204] [ 409: 410] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.722043 14720 task_exit.go:204] [ 409: 410] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.722061 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.722731 14720 task_exit.go:204] [ 409: 409] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/mcfilter\x00') D0613 11:13:08.734224 14720 usertrap_amd64.go:212] [ 411: 411] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.734296 14720 usertrap_amd64.go:122] [ 411: 411] Allocate a new trap: 0xc0002acab0 39 D0613 11:13:08.734605 14720 usertrap_amd64.go:225] [ 411: 411] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.737010 14720 usertrap_amd64.go:212] [ 411: 411] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.737037 14720 usertrap_amd64.go:122] [ 411: 411] Allocate a new trap: 0xc0002acab0 40 D0613 11:13:08.737050 14720 usertrap_amd64.go:225] [ 411: 411] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.746516 14720 usertrap_amd64.go:212] [ 411: 411] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.746576 14720 usertrap_amd64.go:122] [ 411: 411] Allocate a new trap: 0xc0002acab0 41 D0613 11:13:08.746594 14720 usertrap_amd64.go:225] [ 411: 411] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.753392 14720 usertrap_amd64.go:212] [ 411: 412] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:08.753463 14720 usertrap_amd64.go:122] [ 411: 412] Allocate a new trap: 0xc0002acab0 42 D0613 11:13:08.753490 14720 usertrap_amd64.go:225] [ 411: 412] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.758430 14720 usertrap_amd64.go:212] [ 411: 411] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.758471 14720 usertrap_amd64.go:122] [ 411: 411] Allocate a new trap: 0xc0002acab0 43 D0613 11:13:08.758491 14720 usertrap_amd64.go:225] [ 411: 411] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:08.758647 14720 task_exit.go:204] [ 411: 411] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.758698 14720 task_signals.go:204] [ 411: 412] Signal 411, PID: 412, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.758724 14720 task_exit.go:204] [ 411: 411] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.758734 14720 task_exit.go:204] [ 411: 412] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.759346 14720 task_exit.go:204] [ 411: 412] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.759382 14720 task_exit.go:204] [ 411: 412] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.759402 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.759879 14720 task_exit.go:204] [ 411: 411] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{0x0}], 0x1) setrlimit(0xe, &(0x7f0000000380)={0xbe, 0x7fff}) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x28011, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600013, 0x14) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000280)) D0613 11:13:08.769667 14720 usertrap_amd64.go:212] [ 413: 413] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.769722 14720 usertrap_amd64.go:122] [ 413: 413] Allocate a new trap: 0xc0002acb40 39 D0613 11:13:08.769949 14720 usertrap_amd64.go:225] [ 413: 413] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.771513 14720 usertrap_amd64.go:212] [ 413: 413] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.771542 14720 usertrap_amd64.go:122] [ 413: 413] Allocate a new trap: 0xc0002acb40 40 D0613 11:13:08.771556 14720 usertrap_amd64.go:225] [ 413: 413] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.779392 14720 usertrap_amd64.go:212] [ 413: 413] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.779434 14720 usertrap_amd64.go:122] [ 413: 413] Allocate a new trap: 0xc0002acb40 41 D0613 11:13:08.779450 14720 usertrap_amd64.go:225] [ 413: 413] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.793210 14720 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.793639 14720 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.793677 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.794600 14720 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.799269 14720 usertrap_amd64.go:212] [ 413: 413] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.799315 14720 usertrap_amd64.go:122] [ 413: 413] Allocate a new trap: 0xc0002acb40 42 D0613 11:13:08.799337 14720 usertrap_amd64.go:225] [ 413: 413] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.800290 14720 task_exit.go:204] [ 413: 413] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.800342 14720 task_exit.go:204] [ 413: 413] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.800369 14720 task_signals.go:204] [ 413: 414] Signal 413, PID: 414, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.800385 14720 task_exit.go:204] [ 413: 414] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.800799 14720 task_exit.go:204] [ 413: 414] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.800845 14720 task_exit.go:204] [ 413: 414] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.800858 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.801316 14720 task_exit.go:204] [ 413: 413] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: prctl$PR_SET_PTRACER(0x18, 0x0) D0613 11:13:08.818488 14720 usertrap_amd64.go:212] [ 415: 415] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.818540 14720 usertrap_amd64.go:122] [ 415: 415] Allocate a new trap: 0xc0112ec5d0 39 D0613 11:13:08.818697 14720 usertrap_amd64.go:225] [ 415: 415] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.820261 14720 usertrap_amd64.go:212] [ 415: 415] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.820297 14720 usertrap_amd64.go:122] [ 415: 415] Allocate a new trap: 0xc0112ec5d0 40 D0613 11:13:08.820316 14720 usertrap_amd64.go:225] [ 415: 415] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.830808 14720 usertrap_amd64.go:212] [ 415: 415] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.830887 14720 usertrap_amd64.go:122] [ 415: 415] Allocate a new trap: 0xc0112ec5d0 41 D0613 11:13:08.830914 14720 usertrap_amd64.go:225] [ 415: 415] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.836849 14720 usertrap_amd64.go:212] [ 415: 415] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.836902 14720 usertrap_amd64.go:122] [ 415: 415] Allocate a new trap: 0xc0112ec5d0 42 D0613 11:13:08.836918 14720 usertrap_amd64.go:225] [ 415: 415] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.838692 14720 task_exit.go:204] [ 415: 415] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.838753 14720 task_exit.go:204] [ 415: 415] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.838785 14720 task_signals.go:204] [ 415: 416] Signal 415, PID: 416, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.838820 14720 task_exit.go:204] [ 415: 416] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.839333 14720 task_exit.go:204] [ 415: 416] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.839369 14720 task_exit.go:204] [ 415: 416] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.839389 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.839850 14720 task_exit.go:204] [ 415: 415] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000cc0)='net/wireless\x00') D0613 11:13:08.862348 14720 usertrap_amd64.go:212] [ 417: 417] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.862416 14720 usertrap_amd64.go:122] [ 417: 417] Allocate a new trap: 0xc00a073140 39 D0613 11:13:08.862648 14720 usertrap_amd64.go:225] [ 417: 417] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.864748 14720 usertrap_amd64.go:212] [ 417: 417] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.864810 14720 usertrap_amd64.go:122] [ 417: 417] Allocate a new trap: 0xc00a073140 40 D0613 11:13:08.864831 14720 usertrap_amd64.go:225] [ 417: 417] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.874053 14720 usertrap_amd64.go:212] [ 417: 417] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.874111 14720 usertrap_amd64.go:122] [ 417: 417] Allocate a new trap: 0xc00a073140 41 D0613 11:13:08.874142 14720 usertrap_amd64.go:225] [ 417: 417] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.884291 14720 usertrap_amd64.go:212] [ 417: 418] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:08.884355 14720 usertrap_amd64.go:122] [ 417: 418] Allocate a new trap: 0xc00a073140 42 D0613 11:13:08.884380 14720 usertrap_amd64.go:225] [ 417: 418] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.893980 14720 usertrap_amd64.go:212] [ 417: 417] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.894049 14720 usertrap_amd64.go:122] [ 417: 417] Allocate a new trap: 0xc00a073140 43 D0613 11:13:08.894074 14720 usertrap_amd64.go:225] [ 417: 417] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:08.894704 14720 task_exit.go:204] [ 417: 417] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.894832 14720 task_exit.go:204] [ 417: 417] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.894888 14720 task_signals.go:204] [ 417: 418] Signal 417, PID: 418, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.894927 14720 task_exit.go:204] [ 417: 418] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.895533 14720 task_exit.go:204] [ 417: 418] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.895601 14720 task_exit.go:204] [ 417: 418] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.895626 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.896136 14720 task_exit.go:204] [ 417: 417] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: r0 = socket(0x18, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) writev(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)='g', 0x1}], 0x1) D0613 11:13:08.907620 14720 usertrap_amd64.go:212] [ 419: 419] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.907677 14720 usertrap_amd64.go:122] [ 419: 419] Allocate a new trap: 0xc007f62ff0 39 D0613 11:13:08.907890 14720 usertrap_amd64.go:225] [ 419: 419] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.909148 14720 usertrap_amd64.go:212] [ 419: 419] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.909181 14720 usertrap_amd64.go:122] [ 419: 419] Allocate a new trap: 0xc007f62ff0 40 D0613 11:13:08.909194 14720 usertrap_amd64.go:225] [ 419: 419] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.919615 14720 usertrap_amd64.go:212] [ 419: 419] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.919689 14720 usertrap_amd64.go:122] [ 419: 419] Allocate a new trap: 0xc007f62ff0 41 D0613 11:13:08.919714 14720 usertrap_amd64.go:225] [ 419: 419] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.929307 14720 usertrap_amd64.go:212] [ 419: 419] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.929342 14720 usertrap_amd64.go:122] [ 419: 419] Allocate a new trap: 0xc007f62ff0 42 D0613 11:13:08.929362 14720 usertrap_amd64.go:225] [ 419: 419] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.931610 14720 task_exit.go:204] [ 419: 419] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.931793 14720 task_exit.go:204] [ 419: 419] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.931849 14720 task_signals.go:204] [ 419: 420] Signal 419, PID: 420, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.931875 14720 task_exit.go:204] [ 419: 420] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.932761 14720 task_exit.go:204] [ 419: 420] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.932934 14720 task_exit.go:204] [ 419: 420] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.933012 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.933484 14720 task_exit.go:204] [ 419: 419] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.949249 14720 usertrap_amd64.go:212] [ 421: 421] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.949352 14720 usertrap_amd64.go:122] [ 421: 421] Allocate a new trap: 0xc00a073350 39 D0613 11:13:08.949664 14720 usertrap_amd64.go:225] [ 421: 421] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.951959 14720 usertrap_amd64.go:212] [ 421: 421] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.952025 14720 usertrap_amd64.go:122] [ 421: 421] Allocate a new trap: 0xc00a073350 40 D0613 11:13:08.952047 14720 usertrap_amd64.go:225] [ 421: 421] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:08.958883 14720 usertrap_amd64.go:212] [ 421: 421] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:08.958936 14720 usertrap_amd64.go:122] [ 421: 421] Allocate a new trap: 0xc00a073350 41 D0613 11:13:08.958957 14720 usertrap_amd64.go:225] [ 421: 421] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:08.963566 14720 usertrap_amd64.go:212] [ 421: 421] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:08.963642 14720 usertrap_amd64.go:122] [ 421: 421] Allocate a new trap: 0xc00a073350 42 D0613 11:13:08.963681 14720 usertrap_amd64.go:225] [ 421: 421] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:08.965121 14720 task_exit.go:204] [ 421: 421] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.965187 14720 task_exit.go:204] [ 421: 421] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.965241 14720 task_signals.go:204] [ 421: 422] Signal 421, PID: 422, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:08.965292 14720 task_exit.go:204] [ 421: 422] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:08.965834 14720 task_exit.go:204] [ 421: 422] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:08.965881 14720 task_exit.go:204] [ 421: 422] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:08.965916 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:08.967037 14720 task_exit.go:204] [ 421: 421] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:08.987100 14720 usertrap_amd64.go:212] [ 423: 423] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:08.987168 14720 usertrap_amd64.go:122] [ 423: 423] Allocate a new trap: 0xc007f630b0 39 D0613 11:13:08.987313 14720 usertrap_amd64.go:225] [ 423: 423] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:08.989737 14720 usertrap_amd64.go:212] [ 423: 423] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:08.989810 14720 usertrap_amd64.go:122] [ 423: 423] Allocate a new trap: 0xc007f630b0 40 D0613 11:13:08.989839 14720 usertrap_amd64.go:225] [ 423: 423] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.001660 14720 usertrap_amd64.go:212] [ 423: 423] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.001738 14720 usertrap_amd64.go:122] [ 423: 423] Allocate a new trap: 0xc007f630b0 41 D0613 11:13:09.001763 14720 usertrap_amd64.go:225] [ 423: 423] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.006391 14720 usertrap_amd64.go:212] [ 423: 423] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.006437 14720 usertrap_amd64.go:122] [ 423: 423] Allocate a new trap: 0xc007f630b0 42 D0613 11:13:09.006456 14720 usertrap_amd64.go:225] [ 423: 423] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.007686 14720 task_exit.go:204] [ 423: 423] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.007762 14720 task_exit.go:204] [ 423: 423] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.007835 14720 task_signals.go:204] [ 423: 424] Signal 423, PID: 424, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.007860 14720 task_exit.go:204] [ 423: 424] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.008659 14720 task_exit.go:204] [ 423: 424] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.008772 14720 task_exit.go:204] [ 423: 424] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.008798 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.009510 14720 task_exit.go:204] [ 423: 423] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) D0613 11:13:09.023414 14720 usertrap_amd64.go:212] [ 425: 425] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.023487 14720 usertrap_amd64.go:122] [ 425: 425] Allocate a new trap: 0xc0002ace70 39 D0613 11:13:09.023677 14720 usertrap_amd64.go:225] [ 425: 425] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.025282 14720 usertrap_amd64.go:212] [ 425: 425] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.025370 14720 usertrap_amd64.go:122] [ 425: 425] Allocate a new trap: 0xc0002ace70 40 D0613 11:13:09.025396 14720 usertrap_amd64.go:225] [ 425: 425] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.037217 14720 usertrap_amd64.go:212] [ 425: 425] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.037280 14720 usertrap_amd64.go:122] [ 425: 425] Allocate a new trap: 0xc0002ace70 41 D0613 11:13:09.037300 14720 usertrap_amd64.go:225] [ 425: 425] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.043128 14720 usertrap_amd64.go:212] [ 425: 425] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.043172 14720 usertrap_amd64.go:122] [ 425: 425] Allocate a new trap: 0xc0002ace70 42 D0613 11:13:09.043191 14720 usertrap_amd64.go:225] [ 425: 425] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.045097 14720 task_exit.go:204] [ 425: 425] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.045215 14720 task_exit.go:204] [ 425: 425] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.045255 14720 task_signals.go:204] [ 425: 426] Signal 425, PID: 426, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.045316 14720 task_exit.go:204] [ 425: 426] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.046088 14720 task_exit.go:204] [ 425: 426] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.046170 14720 task_exit.go:204] [ 425: 426] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.046198 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.046428 14720 task_exit.go:204] [ 425: 425] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b00dcaa24e8f90eaa37ec9fa25132ddb1a2eb4"}) D0613 11:13:09.062948 14720 usertrap_amd64.go:212] [ 427: 427] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.063028 14720 usertrap_amd64.go:122] [ 427: 427] Allocate a new trap: 0xc007f63170 39 D0613 11:13:09.063164 14720 usertrap_amd64.go:225] [ 427: 427] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.064138 14720 usertrap_amd64.go:212] [ 427: 427] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.064203 14720 usertrap_amd64.go:122] [ 427: 427] Allocate a new trap: 0xc007f63170 40 D0613 11:13:09.064220 14720 usertrap_amd64.go:225] [ 427: 427] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.071034 14720 usertrap_amd64.go:212] [ 427: 427] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.071099 14720 usertrap_amd64.go:122] [ 427: 427] Allocate a new trap: 0xc007f63170 41 D0613 11:13:09.071124 14720 usertrap_amd64.go:225] [ 427: 427] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.076530 14720 usertrap_amd64.go:212] [ 427: 428] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:09.076593 14720 usertrap_amd64.go:122] [ 427: 428] Allocate a new trap: 0xc007f63170 42 D0613 11:13:09.076616 14720 usertrap_amd64.go:225] [ 427: 428] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.087176 14720 usertrap_amd64.go:212] [ 427: 427] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.087228 14720 usertrap_amd64.go:122] [ 427: 427] Allocate a new trap: 0xc007f63170 43 D0613 11:13:09.087245 14720 usertrap_amd64.go:225] [ 427: 427] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:09.087421 14720 task_exit.go:204] [ 427: 427] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.087470 14720 task_exit.go:204] [ 427: 427] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.087537 14720 task_signals.go:204] [ 427: 428] Signal 427, PID: 428, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.087632 14720 task_exit.go:204] [ 427: 428] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.093232 14720 task_exit.go:204] [ 427: 428] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.093287 14720 task_exit.go:204] [ 427: 428] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.093309 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.093447 14720 task_exit.go:204] [ 427: 427] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: syz_mount_image$fuse(&(0x7f0000002600), &(0x7f0000002640)='./file0\x00', 0x11040, &(0x7f0000002680)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) D0613 11:13:09.103926 14720 usertrap_amd64.go:212] [ 429: 429] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.103996 14720 usertrap_amd64.go:122] [ 429: 429] Allocate a new trap: 0xc007974ea0 39 D0613 11:13:09.104174 14720 usertrap_amd64.go:225] [ 429: 429] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.106831 14720 usertrap_amd64.go:212] [ 429: 429] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.106909 14720 usertrap_amd64.go:122] [ 429: 429] Allocate a new trap: 0xc007974ea0 40 D0613 11:13:09.106931 14720 usertrap_amd64.go:225] [ 429: 429] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.117054 14720 usertrap_amd64.go:212] [ 429: 429] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.117129 14720 usertrap_amd64.go:122] [ 429: 429] Allocate a new trap: 0xc007974ea0 41 D0613 11:13:09.117149 14720 usertrap_amd64.go:225] [ 429: 429] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.123757 14720 usertrap_amd64.go:212] [ 429: 429] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.123819 14720 usertrap_amd64.go:122] [ 429: 429] Allocate a new trap: 0xc007974ea0 42 D0613 11:13:09.123844 14720 usertrap_amd64.go:225] [ 429: 429] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.125075 14720 task_exit.go:204] [ 429: 429] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.125178 14720 task_exit.go:204] [ 429: 429] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.125260 14720 task_signals.go:204] [ 429: 430] Signal 429, PID: 430, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.125294 14720 task_exit.go:204] [ 429: 430] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.137335 14720 task_exit.go:204] [ 429: 430] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.137409 14720 task_exit.go:204] [ 429: 430] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.137432 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.138644 14720 task_exit.go:204] [ 429: 429] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000800)={'netdevsim0\x00', 0x400}) D0613 11:13:09.152494 14720 usertrap_amd64.go:212] [ 431: 431] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.152552 14720 usertrap_amd64.go:122] [ 431: 431] Allocate a new trap: 0xc00a073590 39 D0613 11:13:09.152705 14720 usertrap_amd64.go:225] [ 431: 431] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.154052 14720 usertrap_amd64.go:212] [ 431: 431] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.154188 14720 usertrap_amd64.go:122] [ 431: 431] Allocate a new trap: 0xc00a073590 40 D0613 11:13:09.154221 14720 usertrap_amd64.go:225] [ 431: 431] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.159575 14720 usertrap_amd64.go:212] [ 431: 431] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.159614 14720 usertrap_amd64.go:122] [ 431: 431] Allocate a new trap: 0xc00a073590 41 D0613 11:13:09.159630 14720 usertrap_amd64.go:225] [ 431: 431] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.168664 14720 usertrap_amd64.go:212] [ 431: 431] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.168755 14720 usertrap_amd64.go:122] [ 431: 431] Allocate a new trap: 0xc00a073590 42 D0613 11:13:09.168782 14720 usertrap_amd64.go:225] [ 431: 431] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.171256 14720 task_exit.go:204] [ 431: 431] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.171336 14720 task_exit.go:204] [ 431: 431] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.171376 14720 task_signals.go:204] [ 431: 432] Signal 431, PID: 432, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.171398 14720 task_exit.go:204] [ 431: 432] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.171855 14720 task_exit.go:204] [ 431: 432] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.171943 14720 task_exit.go:204] [ 431: 432] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.171967 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.172173 14720 task_exit.go:204] [ 431: 431] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) D0613 11:13:09.187943 14720 usertrap_amd64.go:212] [ 433: 433] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.188293 14720 usertrap_amd64.go:122] [ 433: 433] Allocate a new trap: 0xc00a0737a0 39 D0613 11:13:09.188646 14720 usertrap_amd64.go:225] [ 433: 433] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.190517 14720 usertrap_amd64.go:212] [ 433: 433] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.190622 14720 usertrap_amd64.go:122] [ 433: 433] Allocate a new trap: 0xc00a0737a0 40 D0613 11:13:09.190651 14720 usertrap_amd64.go:225] [ 433: 433] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.201058 14720 usertrap_amd64.go:212] [ 433: 433] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.201134 14720 usertrap_amd64.go:122] [ 433: 433] Allocate a new trap: 0xc00a0737a0 41 D0613 11:13:09.201159 14720 usertrap_amd64.go:225] [ 433: 433] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.205861 14720 usertrap_amd64.go:212] [ 433: 433] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.205930 14720 usertrap_amd64.go:122] [ 433: 433] Allocate a new trap: 0xc00a0737a0 42 D0613 11:13:09.205956 14720 usertrap_amd64.go:225] [ 433: 433] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.207576 14720 task_exit.go:204] [ 433: 433] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.207698 14720 task_exit.go:204] [ 433: 433] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.207780 14720 task_signals.go:204] [ 433: 434] Signal 433, PID: 434, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.207813 14720 task_exit.go:204] [ 433: 434] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.208393 14720 task_exit.go:204] [ 433: 434] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.208453 14720 task_exit.go:204] [ 433: 434] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.208482 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.209880 14720 task_exit.go:204] [ 433: 433] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000080)) D0613 11:13:09.226004 14720 usertrap_amd64.go:212] [ 435: 435] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.226061 14720 usertrap_amd64.go:122] [ 435: 435] Allocate a new trap: 0xc007975110 39 D0613 11:13:09.226266 14720 usertrap_amd64.go:225] [ 435: 435] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.229166 14720 usertrap_amd64.go:212] [ 435: 435] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.229368 14720 usertrap_amd64.go:122] [ 435: 435] Allocate a new trap: 0xc007975110 40 D0613 11:13:09.229406 14720 usertrap_amd64.go:225] [ 435: 435] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.238411 14720 usertrap_amd64.go:212] [ 435: 435] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.238490 14720 usertrap_amd64.go:122] [ 435: 435] Allocate a new trap: 0xc007975110 41 D0613 11:13:09.238515 14720 usertrap_amd64.go:225] [ 435: 435] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.244724 14720 usertrap_amd64.go:212] [ 435: 435] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.244800 14720 usertrap_amd64.go:122] [ 435: 435] Allocate a new trap: 0xc007975110 42 D0613 11:13:09.244830 14720 usertrap_amd64.go:225] [ 435: 435] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.246004 14720 task_exit.go:204] [ 435: 435] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.246075 14720 task_exit.go:204] [ 435: 435] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.246113 14720 task_signals.go:204] [ 435: 436] Signal 435, PID: 436, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.246175 14720 task_exit.go:204] [ 435: 436] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.246631 14720 task_exit.go:204] [ 435: 436] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.246720 14720 task_exit.go:204] [ 435: 436] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.246756 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.247350 14720 task_exit.go:204] [ 435: 435] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'macvlan0\x00', 0x1}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) D0613 11:13:09.258232 14720 usertrap_amd64.go:212] [ 437: 437] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.258278 14720 usertrap_amd64.go:122] [ 437: 437] Allocate a new trap: 0xc007975290 39 D0613 11:13:09.258436 14720 usertrap_amd64.go:225] [ 437: 437] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.258947 14720 usertrap_amd64.go:212] [ 437: 437] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.258973 14720 usertrap_amd64.go:122] [ 437: 437] Allocate a new trap: 0xc007975290 40 D0613 11:13:09.258984 14720 usertrap_amd64.go:225] [ 437: 437] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.270603 14720 usertrap_amd64.go:212] [ 437: 437] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.270683 14720 usertrap_amd64.go:122] [ 437: 437] Allocate a new trap: 0xc007975290 41 D0613 11:13:09.270709 14720 usertrap_amd64.go:225] [ 437: 437] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.278060 14720 usertrap_amd64.go:212] [ 437: 437] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.278111 14720 usertrap_amd64.go:122] [ 437: 437] Allocate a new trap: 0xc007975290 42 D0613 11:13:09.278148 14720 usertrap_amd64.go:225] [ 437: 437] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.279083 14720 task_exit.go:204] [ 437: 437] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.279144 14720 task_exit.go:204] [ 437: 437] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.279181 14720 task_signals.go:204] [ 437: 438] Signal 437, PID: 438, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.279204 14720 task_exit.go:204] [ 437: 438] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.279925 14720 task_exit.go:204] [ 437: 438] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.279976 14720 task_exit.go:204] [ 437: 438] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.279999 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.281048 14720 task_exit.go:204] [ 437: 437] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000880)="e9", 0x1}], 0x1}, 0x40801) D0613 11:13:09.282026 14720 task_signals.go:470] [ 7: 54887] Notified of signal 23 D0613 11:13:09.282193 14720 task_signals.go:220] [ 7: 54887] Signal 23: delivering to handler D0613 11:13:09.296016 14720 usertrap_amd64.go:212] [ 439: 439] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.296066 14720 usertrap_amd64.go:122] [ 439: 439] Allocate a new trap: 0xc0067bc8a0 39 D0613 11:13:09.296213 14720 usertrap_amd64.go:225] [ 439: 439] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.297008 14720 usertrap_amd64.go:212] [ 439: 439] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.297036 14720 usertrap_amd64.go:122] [ 439: 439] Allocate a new trap: 0xc0067bc8a0 40 D0613 11:13:09.297050 14720 usertrap_amd64.go:225] [ 439: 439] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.303789 14720 usertrap_amd64.go:212] [ 439: 439] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.303866 14720 usertrap_amd64.go:122] [ 439: 439] Allocate a new trap: 0xc0067bc8a0 41 D0613 11:13:09.303885 14720 usertrap_amd64.go:225] [ 439: 439] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.313062 14720 usertrap_amd64.go:212] [ 439: 439] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.313140 14720 usertrap_amd64.go:122] [ 439: 439] Allocate a new trap: 0xc0067bc8a0 42 D0613 11:13:09.313160 14720 usertrap_amd64.go:225] [ 439: 439] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.314724 14720 task_exit.go:204] [ 439: 439] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.314790 14720 task_exit.go:204] [ 439: 439] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.315150 14720 task_signals.go:204] [ 439: 440] Signal 439, PID: 440, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.315197 14720 task_exit.go:204] [ 439: 440] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.315657 14720 task_exit.go:204] [ 439: 440] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.315693 14720 task_exit.go:204] [ 439: 440] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.315717 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.316570 14720 task_exit.go:204] [ 439: 439] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: syz_clone(0x2b300680, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)='w') D0613 11:13:09.326170 14720 usertrap_amd64.go:212] [ 441: 441] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.326246 14720 usertrap_amd64.go:122] [ 441: 441] Allocate a new trap: 0xc00d81b6b0 39 D0613 11:13:09.326472 14720 usertrap_amd64.go:225] [ 441: 441] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.327790 14720 usertrap_amd64.go:212] [ 441: 441] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.327831 14720 usertrap_amd64.go:122] [ 441: 441] Allocate a new trap: 0xc00d81b6b0 40 D0613 11:13:09.327848 14720 usertrap_amd64.go:225] [ 441: 441] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.336450 14720 usertrap_amd64.go:212] [ 441: 441] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.336520 14720 usertrap_amd64.go:122] [ 441: 441] Allocate a new trap: 0xc00d81b6b0 41 D0613 11:13:09.336540 14720 usertrap_amd64.go:225] [ 441: 441] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.340442 14720 usertrap_amd64.go:212] [ 441: 441] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.340498 14720 usertrap_amd64.go:122] [ 441: 441] Allocate a new trap: 0xc00d81b6b0 42 D0613 11:13:09.340514 14720 usertrap_amd64.go:225] [ 441: 441] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.341351 14720 task_exit.go:204] [ 441: 441] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.341408 14720 task_exit.go:204] [ 441: 441] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.341443 14720 task_signals.go:204] [ 441: 442] Signal 441, PID: 442, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.341463 14720 task_exit.go:204] [ 441: 442] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.341855 14720 task_exit.go:204] [ 441: 442] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.341900 14720 task_exit.go:204] [ 441: 442] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.341923 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.342857 14720 task_exit.go:204] [ 441: 441] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'dummy0\x00', 0x600}) D0613 11:13:09.355008 14720 usertrap_amd64.go:212] [ 443: 443] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.355058 14720 usertrap_amd64.go:122] [ 443: 443] Allocate a new trap: 0xc007f637a0 39 D0613 11:13:09.355269 14720 usertrap_amd64.go:225] [ 443: 443] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.356531 14720 usertrap_amd64.go:212] [ 443: 443] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.356562 14720 usertrap_amd64.go:122] [ 443: 443] Allocate a new trap: 0xc007f637a0 40 D0613 11:13:09.356581 14720 usertrap_amd64.go:225] [ 443: 443] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.367288 14720 usertrap_amd64.go:212] [ 443: 443] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.367368 14720 usertrap_amd64.go:122] [ 443: 443] Allocate a new trap: 0xc007f637a0 41 D0613 11:13:09.367395 14720 usertrap_amd64.go:225] [ 443: 443] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.374058 14720 usertrap_amd64.go:212] [ 443: 443] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.374114 14720 usertrap_amd64.go:122] [ 443: 443] Allocate a new trap: 0xc007f637a0 42 D0613 11:13:09.374137 14720 usertrap_amd64.go:225] [ 443: 443] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.375529 14720 task_exit.go:204] [ 443: 443] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.375627 14720 task_signals.go:204] [ 443: 444] Signal 443, PID: 444, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.375651 14720 task_exit.go:204] [ 443: 443] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.375667 14720 task_exit.go:204] [ 443: 444] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.376137 14720 task_exit.go:204] [ 443: 444] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.376180 14720 task_exit.go:204] [ 443: 444] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.376210 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.376878 14720 task_exit.go:204] [ 443: 443] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:09.389430 14720 usertrap_amd64.go:212] [ 445: 445] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.389497 14720 usertrap_amd64.go:122] [ 445: 445] Allocate a new trap: 0xc0067bcbd0 39 D0613 11:13:09.389632 14720 usertrap_amd64.go:225] [ 445: 445] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.390651 14720 usertrap_amd64.go:212] [ 445: 445] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.390672 14720 usertrap_amd64.go:122] [ 445: 445] Allocate a new trap: 0xc0067bcbd0 40 D0613 11:13:09.390684 14720 usertrap_amd64.go:225] [ 445: 445] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.397131 14720 usertrap_amd64.go:212] [ 445: 445] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.397175 14720 usertrap_amd64.go:122] [ 445: 445] Allocate a new trap: 0xc0067bcbd0 41 D0613 11:13:09.397191 14720 usertrap_amd64.go:225] [ 445: 445] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.402949 14720 usertrap_amd64.go:212] [ 445: 445] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.403023 14720 usertrap_amd64.go:122] [ 445: 445] Allocate a new trap: 0xc0067bcbd0 42 D0613 11:13:09.403053 14720 usertrap_amd64.go:225] [ 445: 445] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.404153 14720 task_exit.go:204] [ 445: 445] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.404217 14720 task_exit.go:204] [ 445: 445] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.404251 14720 task_signals.go:204] [ 445: 446] Signal 445, PID: 446, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.404278 14720 task_exit.go:204] [ 445: 446] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.404676 14720 task_exit.go:204] [ 445: 446] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.404718 14720 task_exit.go:204] [ 445: 446] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.404738 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.405670 14720 task_exit.go:204] [ 445: 445] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x303) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000080)=0x1) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)={'ip6_vti0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x20a00, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'macvlan0\x00', 0x1}) D0613 11:13:09.415672 14720 usertrap_amd64.go:212] [ 447: 447] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.415750 14720 usertrap_amd64.go:122] [ 447: 447] Allocate a new trap: 0xc00d81ba40 39 D0613 11:13:09.415880 14720 usertrap_amd64.go:225] [ 447: 447] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.417652 14720 usertrap_amd64.go:212] [ 447: 447] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.417706 14720 usertrap_amd64.go:122] [ 447: 447] Allocate a new trap: 0xc00d81ba40 40 D0613 11:13:09.417724 14720 usertrap_amd64.go:225] [ 447: 447] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.425532 14720 usertrap_amd64.go:212] [ 447: 447] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.425603 14720 usertrap_amd64.go:122] [ 447: 447] Allocate a new trap: 0xc00d81ba40 41 D0613 11:13:09.425629 14720 usertrap_amd64.go:225] [ 447: 447] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.436196 14720 usertrap_amd64.go:212] [ 447: 447] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.436261 14720 usertrap_amd64.go:122] [ 447: 447] Allocate a new trap: 0xc00d81ba40 42 D0613 11:13:09.436287 14720 usertrap_amd64.go:225] [ 447: 447] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.437397 14720 task_exit.go:204] [ 447: 447] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.437569 14720 task_exit.go:204] [ 447: 447] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.437667 14720 task_signals.go:204] [ 447: 448] Signal 447, PID: 448, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.437730 14720 task_exit.go:204] [ 447: 448] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.438058 14720 task_exit.go:204] [ 447: 448] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.438163 14720 task_exit.go:204] [ 447: 448] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.438203 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.438552 14720 task_exit.go:204] [ 447: 447] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'macvlan0\x00'}) D0613 11:13:09.449632 14720 usertrap_amd64.go:212] [ 449: 449] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.449676 14720 usertrap_amd64.go:122] [ 449: 449] Allocate a new trap: 0xc007975500 39 D0613 11:13:09.449803 14720 usertrap_amd64.go:225] [ 449: 449] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.452303 14720 usertrap_amd64.go:212] [ 449: 449] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.452413 14720 usertrap_amd64.go:122] [ 449: 449] Allocate a new trap: 0xc007975500 40 D0613 11:13:09.452443 14720 usertrap_amd64.go:225] [ 449: 449] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.465627 14720 usertrap_amd64.go:212] [ 449: 449] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.465765 14720 usertrap_amd64.go:122] [ 449: 449] Allocate a new trap: 0xc007975500 41 D0613 11:13:09.465792 14720 usertrap_amd64.go:225] [ 449: 449] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.472746 14720 usertrap_amd64.go:212] [ 449: 449] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.472817 14720 usertrap_amd64.go:122] [ 449: 449] Allocate a new trap: 0xc007975500 42 D0613 11:13:09.472841 14720 usertrap_amd64.go:225] [ 449: 449] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.474310 14720 task_exit.go:204] [ 449: 449] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.474470 14720 task_exit.go:204] [ 449: 449] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.474465 14720 task_signals.go:204] [ 449: 450] Signal 449, PID: 450, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.474605 14720 task_exit.go:204] [ 449: 450] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.475562 14720 task_exit.go:204] [ 449: 450] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.475585 14720 task_exit.go:204] [ 449: 450] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.475615 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.475661 14720 task_exit.go:204] [ 449: 449] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60580, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0613 11:13:09.485272 14720 usertrap_amd64.go:212] [ 451: 451] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.485351 14720 usertrap_amd64.go:122] [ 451: 451] Allocate a new trap: 0xc0067bcd20 39 D0613 11:13:09.485534 14720 usertrap_amd64.go:225] [ 451: 451] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.489955 14720 usertrap_amd64.go:212] [ 451: 451] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.490019 14720 usertrap_amd64.go:122] [ 451: 451] Allocate a new trap: 0xc0067bcd20 40 D0613 11:13:09.490043 14720 usertrap_amd64.go:225] [ 451: 451] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.501809 14720 usertrap_amd64.go:212] [ 451: 451] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.501889 14720 usertrap_amd64.go:122] [ 451: 451] Allocate a new trap: 0xc0067bcd20 41 D0613 11:13:09.501918 14720 usertrap_amd64.go:225] [ 451: 451] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.507914 14720 usertrap_amd64.go:212] [ 451: 451] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.508026 14720 usertrap_amd64.go:122] [ 451: 451] Allocate a new trap: 0xc0067bcd20 42 D0613 11:13:09.508048 14720 usertrap_amd64.go:225] [ 451: 451] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.510717 14720 task_exit.go:204] [ 451: 451] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.510840 14720 task_exit.go:204] [ 451: 451] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.510930 14720 task_signals.go:204] [ 451: 452] Signal 451, PID: 452, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.511002 14720 task_exit.go:204] [ 451: 452] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.511503 14720 task_exit.go:204] [ 451: 452] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.511559 14720 task_exit.go:204] [ 451: 452] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.511586 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.512291 14720 task_exit.go:204] [ 451: 451] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) D0613 11:13:09.532339 14720 usertrap_amd64.go:212] [ 453: 453] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.532433 14720 usertrap_amd64.go:122] [ 453: 453] Allocate a new trap: 0xc007f63950 39 D0613 11:13:09.532606 14720 usertrap_amd64.go:225] [ 453: 453] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.535796 14720 usertrap_amd64.go:212] [ 453: 453] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.535856 14720 usertrap_amd64.go:122] [ 453: 453] Allocate a new trap: 0xc007f63950 40 D0613 11:13:09.535880 14720 usertrap_amd64.go:225] [ 453: 453] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.544500 14720 usertrap_amd64.go:212] [ 453: 453] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.544554 14720 usertrap_amd64.go:122] [ 453: 453] Allocate a new trap: 0xc007f63950 41 D0613 11:13:09.544572 14720 usertrap_amd64.go:225] [ 453: 453] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.559978 14720 usertrap_amd64.go:212] [ 453: 453] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.560054 14720 usertrap_amd64.go:122] [ 453: 453] Allocate a new trap: 0xc007f63950 42 D0613 11:13:09.560079 14720 usertrap_amd64.go:225] [ 453: 453] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.562249 14720 task_exit.go:204] [ 453: 453] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.562330 14720 task_exit.go:204] [ 453: 453] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.562376 14720 task_signals.go:204] [ 453: 454] Signal 453, PID: 454, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.562397 14720 task_exit.go:204] [ 453: 454] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.562802 14720 task_exit.go:204] [ 453: 454] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.562839 14720 task_exit.go:204] [ 453: 454] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.562853 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.563534 14720 task_exit.go:204] [ 453: 453] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: syz_clone(0x900, 0x0, 0x0, 0x0, 0x0, 0x0) D0613 11:13:09.576600 14720 usertrap_amd64.go:212] [ 455: 455] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.576664 14720 usertrap_amd64.go:122] [ 455: 455] Allocate a new trap: 0xc00d81bd40 39 D0613 11:13:09.576800 14720 usertrap_amd64.go:225] [ 455: 455] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.577681 14720 usertrap_amd64.go:212] [ 455: 455] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.577763 14720 usertrap_amd64.go:122] [ 455: 455] Allocate a new trap: 0xc00d81bd40 40 D0613 11:13:09.577785 14720 usertrap_amd64.go:225] [ 455: 455] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.585116 14720 usertrap_amd64.go:212] [ 455: 455] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.585183 14720 usertrap_amd64.go:122] [ 455: 455] Allocate a new trap: 0xc00d81bd40 41 D0613 11:13:09.585212 14720 usertrap_amd64.go:225] [ 455: 455] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.590264 14720 usertrap_amd64.go:212] [ 455: 455] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.590344 14720 usertrap_amd64.go:122] [ 455: 455] Allocate a new trap: 0xc00d81bd40 42 D0613 11:13:09.590371 14720 usertrap_amd64.go:225] [ 455: 455] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.591660 14720 task_exit.go:204] [ 455: 455] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.591743 14720 task_exit.go:204] [ 455: 455] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.591790 14720 task_signals.go:204] [ 455: 456] Signal 455, PID: 456, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.591811 14720 task_exit.go:204] [ 455: 456] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.592312 14720 task_exit.go:204] [ 455: 456] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.592356 14720 task_exit.go:204] [ 455: 456] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.592378 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.592495 14720 task_exit.go:204] [ 455: 455] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'macvlan0\x00', 0x1}) D0613 11:13:09.603118 14720 usertrap_amd64.go:212] [ 457: 457] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.603196 14720 usertrap_amd64.go:122] [ 457: 457] Allocate a new trap: 0xc00a073b60 39 D0613 11:13:09.603348 14720 usertrap_amd64.go:225] [ 457: 457] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.605495 14720 usertrap_amd64.go:212] [ 457: 457] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.605576 14720 usertrap_amd64.go:122] [ 457: 457] Allocate a new trap: 0xc00a073b60 40 D0613 11:13:09.605614 14720 usertrap_amd64.go:225] [ 457: 457] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.615923 14720 usertrap_amd64.go:212] [ 457: 457] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.615978 14720 usertrap_amd64.go:122] [ 457: 457] Allocate a new trap: 0xc00a073b60 41 D0613 11:13:09.615996 14720 usertrap_amd64.go:225] [ 457: 457] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.621912 14720 usertrap_amd64.go:212] [ 457: 457] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.621948 14720 usertrap_amd64.go:122] [ 457: 457] Allocate a new trap: 0xc00a073b60 42 D0613 11:13:09.621964 14720 usertrap_amd64.go:225] [ 457: 457] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.623771 14720 task_exit.go:204] [ 457: 457] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.623879 14720 task_exit.go:204] [ 457: 457] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.623922 14720 task_signals.go:204] [ 457: 458] Signal 457, PID: 458, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.623982 14720 task_exit.go:204] [ 457: 458] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.624534 14720 task_exit.go:204] [ 457: 458] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.624626 14720 task_exit.go:204] [ 457: 458] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.624688 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.625050 14720 task_exit.go:204] [ 457: 457] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000b40)) D0613 11:13:09.638908 14720 usertrap_amd64.go:212] [ 459: 459] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.638970 14720 usertrap_amd64.go:122] [ 459: 459] Allocate a new trap: 0xc0067bcfc0 39 D0613 11:13:09.639240 14720 usertrap_amd64.go:225] [ 459: 459] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.641270 14720 usertrap_amd64.go:212] [ 459: 459] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.641334 14720 usertrap_amd64.go:122] [ 459: 459] Allocate a new trap: 0xc0067bcfc0 40 D0613 11:13:09.641356 14720 usertrap_amd64.go:225] [ 459: 459] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.650944 14720 usertrap_amd64.go:212] [ 459: 459] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.650997 14720 usertrap_amd64.go:122] [ 459: 459] Allocate a new trap: 0xc0067bcfc0 41 D0613 11:13:09.651013 14720 usertrap_amd64.go:225] [ 459: 459] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.657565 14720 usertrap_amd64.go:212] [ 459: 459] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.657623 14720 usertrap_amd64.go:122] [ 459: 459] Allocate a new trap: 0xc0067bcfc0 42 D0613 11:13:09.657654 14720 usertrap_amd64.go:225] [ 459: 459] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.658696 14720 task_exit.go:204] [ 459: 459] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.658749 14720 task_exit.go:204] [ 459: 459] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.658779 14720 task_signals.go:204] [ 459: 460] Signal 459, PID: 460, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.658808 14720 task_exit.go:204] [ 459: 460] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.659289 14720 task_exit.go:204] [ 459: 460] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.659322 14720 task_exit.go:204] [ 459: 460] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.659349 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.660281 14720 task_exit.go:204] [ 459: 459] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: syz_clone(0x10400, 0x0, 0x0, 0x0, 0x0, 0x0) D0613 11:13:09.671276 14720 usertrap_amd64.go:212] [ 461: 461] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.671352 14720 usertrap_amd64.go:122] [ 461: 461] Allocate a new trap: 0xc0112ecbd0 39 D0613 11:13:09.671577 14720 usertrap_amd64.go:225] [ 461: 461] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.673360 14720 usertrap_amd64.go:212] [ 461: 461] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.673416 14720 usertrap_amd64.go:122] [ 461: 461] Allocate a new trap: 0xc0112ecbd0 40 D0613 11:13:09.673438 14720 usertrap_amd64.go:225] [ 461: 461] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.681549 14720 usertrap_amd64.go:212] [ 461: 461] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.681609 14720 usertrap_amd64.go:122] [ 461: 461] Allocate a new trap: 0xc0112ecbd0 41 D0613 11:13:09.681632 14720 usertrap_amd64.go:225] [ 461: 461] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.687670 14720 usertrap_amd64.go:212] [ 461: 461] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.687743 14720 usertrap_amd64.go:122] [ 461: 461] Allocate a new trap: 0xc0112ecbd0 42 D0613 11:13:09.687767 14720 usertrap_amd64.go:225] [ 461: 461] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.688878 14720 task_exit.go:204] [ 461: 461] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.688971 14720 task_exit.go:204] [ 461: 461] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.689020 14720 task_signals.go:204] [ 461: 462] Signal 461, PID: 462, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.689041 14720 task_exit.go:204] [ 461: 462] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.689490 14720 task_exit.go:204] [ 461: 462] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.689518 14720 task_exit.go:204] [ 461: 462] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.689536 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.689790 14720 task_exit.go:204] [ 461: 461] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.idle_time\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000a80)='syz1\x00', 0x200002, 0x0) D0613 11:13:09.698688 14720 usertrap_amd64.go:212] [ 463: 463] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.698882 14720 usertrap_amd64.go:122] [ 463: 463] Allocate a new trap: 0xc0067bcff0 39 D0613 11:13:09.699040 14720 usertrap_amd64.go:225] [ 463: 463] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.699977 14720 usertrap_amd64.go:212] [ 463: 463] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.699998 14720 usertrap_amd64.go:122] [ 463: 463] Allocate a new trap: 0xc0067bcff0 40 D0613 11:13:09.700021 14720 usertrap_amd64.go:225] [ 463: 463] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.711878 14720 usertrap_amd64.go:212] [ 463: 463] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.711960 14720 usertrap_amd64.go:122] [ 463: 463] Allocate a new trap: 0xc0067bcff0 41 D0613 11:13:09.711985 14720 usertrap_amd64.go:225] [ 463: 463] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.718786 14720 usertrap_amd64.go:212] [ 463: 463] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.718849 14720 usertrap_amd64.go:122] [ 463: 463] Allocate a new trap: 0xc0067bcff0 42 D0613 11:13:09.718867 14720 usertrap_amd64.go:225] [ 463: 463] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.720191 14720 task_exit.go:204] [ 463: 463] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.720248 14720 task_exit.go:204] [ 463: 463] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.720278 14720 task_signals.go:204] [ 463: 464] Signal 463, PID: 464, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.720296 14720 task_exit.go:204] [ 463: 464] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.720649 14720 task_exit.go:204] [ 463: 464] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.720674 14720 task_exit.go:204] [ 463: 464] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.720698 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.721621 14720 task_exit.go:204] [ 463: 463] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) D0613 11:13:09.732348 14720 usertrap_amd64.go:212] [ 465: 465] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.732404 14720 usertrap_amd64.go:122] [ 465: 465] Allocate a new trap: 0xc007f63c80 39 D0613 11:13:09.732530 14720 usertrap_amd64.go:225] [ 465: 465] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.733925 14720 usertrap_amd64.go:212] [ 465: 465] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.734004 14720 usertrap_amd64.go:122] [ 465: 465] Allocate a new trap: 0xc007f63c80 40 D0613 11:13:09.734028 14720 usertrap_amd64.go:225] [ 465: 465] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.741409 14720 usertrap_amd64.go:212] [ 465: 465] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.741453 14720 usertrap_amd64.go:122] [ 465: 465] Allocate a new trap: 0xc007f63c80 41 D0613 11:13:09.741471 14720 usertrap_amd64.go:225] [ 465: 465] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.749813 14720 usertrap_amd64.go:212] [ 465: 465] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:09.749900 14720 usertrap_amd64.go:122] [ 465: 465] Allocate a new trap: 0xc007f63c80 42 D0613 11:13:09.749926 14720 usertrap_amd64.go:225] [ 465: 465] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.751511 14720 task_exit.go:204] [ 465: 465] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.751614 14720 task_exit.go:204] [ 465: 465] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.751664 14720 task_signals.go:204] [ 465: 466] Signal 465, PID: 466, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:09.751711 14720 task_exit.go:204] [ 465: 466] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:09.752352 14720 task_exit.go:204] [ 465: 466] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:09.752446 14720 task_exit.go:204] [ 465: 466] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:09.752477 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.753096 14720 task_exit.go:204] [ 465: 465] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "ff07a7460a040000000000000000000400"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r2 = gettid() tkill(r2, 0x14) D0613 11:13:09.760227 14720 usertrap_amd64.go:212] [ 467: 467] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:09.760267 14720 usertrap_amd64.go:122] [ 467: 467] Allocate a new trap: 0xc0067bd020 39 D0613 11:13:09.760389 14720 usertrap_amd64.go:225] [ 467: 467] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:09.761502 14720 usertrap_amd64.go:212] [ 467: 467] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:09.761553 14720 usertrap_amd64.go:122] [ 467: 467] Allocate a new trap: 0xc0067bd020 40 D0613 11:13:09.761573 14720 usertrap_amd64.go:225] [ 467: 467] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:09.770606 14720 usertrap_amd64.go:212] [ 467: 467] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:09.770686 14720 usertrap_amd64.go:122] [ 467: 467] Allocate a new trap: 0xc0067bd020 41 D0613 11:13:09.770713 14720 usertrap_amd64.go:225] [ 467: 467] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:09.778846 14720 usertrap_amd64.go:212] [ 467: 468] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:09.778911 14720 usertrap_amd64.go:122] [ 467: 468] Allocate a new trap: 0xc0067bd020 42 D0613 11:13:09.778931 14720 usertrap_amd64.go:225] [ 467: 468] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:09.848761 14720 task_signals.go:470] [ 467: 469] Notified of signal 20 D0613 11:13:09.848884 14720 task_signals.go:808] [ 467: 469] Signal 20: stopping 3 threads in thread group D0613 11:13:09.848901 14720 task_stop.go:118] [ 467: 469] Entering internal stop (*kernel.groupStop)(nil) D0613 11:13:09.848935 14720 task_stop.go:118] [ 467: 468] Entering internal stop (*kernel.groupStop)(nil) D0613 11:13:09.849010 14720 task_signals.go:885] [ 467: 467] Completing group stop D0613 11:13:09.849019 14720 task_stop.go:118] [ 467: 467] Entering internal stop (*kernel.groupStop)(nil) D0613 11:13:09.849030 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.857518 14720 task_signals.go:828] [ 467: 467] Ending complete group stop with 0 threads pending D0613 11:13:09.857614 14720 task_stop.go:138] [ 467: 467] Leaving internal stop (*kernel.groupStop)(nil) D0613 11:13:09.857654 14720 task_stop.go:138] [ 467: 468] Leaving internal stop (*kernel.groupStop)(nil) D0613 11:13:09.857678 14720 task_stop.go:138] [ 467: 469] Leaving internal stop (*kernel.groupStop)(nil) D0613 11:13:09.857686 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:09.857766 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:09.857787 14720 task_run.go:183] [ 467: 467] Restarting syscall 202 with restart block: not interrupted by handled signal D0613 11:13:09.859662 14720 usertrap_amd64.go:212] [ 467: 467] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:09.859710 14720 usertrap_amd64.go:122] [ 467: 467] Allocate a new trap: 0xc0067bd020 43 D0613 11:13:09.859733 14720 usertrap_amd64.go:225] [ 467: 467] Apply the binary patch addr 560439736eba trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:09.859759 14720 task_run.go:186] [ 467: 468] Restarting syscall 0: not interrupted by handled signal D0613 11:13:09.917424 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:09.978035 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.037053 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.097955 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.157999 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.218476 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.277944 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.337233 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.398096 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.457353 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.517082 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.577330 14720 task_signals.go:443] [ 467: 467] Discarding ignored signal 18 D0613 11:13:10.605176 14720 usertrap_amd64.go:212] [ 467: 467] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.605251 14720 usertrap_amd64.go:122] [ 467: 467] Allocate a new trap: 0xc0067bd020 44 D0613 11:13:10.605274 14720 usertrap_amd64.go:225] [ 467: 467] Apply the binary patch addr 5604396c4044 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0613 11:13:10.605606 14720 task_exit.go:204] [ 467: 467] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.605681 14720 task_exit.go:204] [ 467: 467] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.605742 14720 task_signals.go:204] [ 467: 468] Signal 467, PID: 468, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.605769 14720 task_exit.go:204] [ 467: 468] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.605781 14720 task_exit.go:204] [ 467: 468] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.605786 14720 task_exit.go:204] [ 467: 468] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.605808 14720 task_signals.go:204] [ 467: 469] Signal 467, PID: 469, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.605826 14720 task_exit.go:204] [ 467: 469] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.606318 14720 task_exit.go:204] [ 467: 469] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.606361 14720 task_exit.go:204] [ 467: 469] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.606377 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.607424 14720 task_exit.go:204] [ 467: 467] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{}, "c5682b61487d667f", "c3eec9edb7d92b642a72c546a907b1a7", '$\x00\f.', "3688c7dc339cbcdd"}, 0x28) D0613 11:13:10.622297 14720 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.622361 14720 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc007f63e60 39 D0613 11:13:10.622480 14720 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.630040 14720 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.630124 14720 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc007f63e60 40 D0613 11:13:10.630146 14720 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.640070 14720 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.640137 14720 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc007f63e60 41 D0613 11:13:10.640158 14720 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.677508 14720 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.677673 14720 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc007f63e60 42 D0613 11:13:10.677792 14720 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.680759 14720 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.680922 14720 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.681035 14720 task_signals.go:204] [ 470: 471] Signal 470, PID: 471, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.681144 14720 task_exit.go:204] [ 470: 471] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.681699 14720 task_exit.go:204] [ 470: 471] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.681793 14720 task_exit.go:204] [ 470: 471] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.681817 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.682865 14720 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f00000002c0)={'fscrypt:', @auto=[0x0, 0x38, 0x61, 0x31, 0x32, 0x33, 0x1, 0x0, 0x30, 0x34, 0x63, 0x64, 0x39, 0x64]}, &(0x7f0000000300)={0x0, "07f57eb4a16b5db5595797833ef7234b1acd55be371c84a56fe1d9993f58a8ef02985b8c06b70b58f04a0174247482cd00e81eb3c168cce1a88449d7d87ba8f2"}, 0x48, 0xfffffffffffffffb) D0613 11:13:10.695453 14720 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.695522 14720 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc003378870 39 D0613 11:13:10.695712 14720 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.706899 14720 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.706973 14720 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc003378870 40 D0613 11:13:10.706998 14720 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.715179 14720 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.715251 14720 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc003378870 41 D0613 11:13:10.715272 14720 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.718582 14720 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.718620 14720 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc003378870 42 D0613 11:13:10.718643 14720 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.719286 14720 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.719335 14720 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.719364 14720 task_signals.go:204] [ 472: 473] Signal 472, PID: 473, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.719383 14720 task_exit.go:204] [ 472: 473] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.719764 14720 task_exit.go:204] [ 472: 473] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.719796 14720 task_exit.go:204] [ 472: 473] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.719812 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.720511 14720 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: setitimer(0x0, &(0x7f00000000c0)={{}, {0xffffffff}}, 0x0) D0613 11:13:10.734401 14720 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.734461 14720 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc0002ad7a0 39 D0613 11:13:10.734572 14720 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.735428 14720 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.735461 14720 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc0002ad7a0 40 D0613 11:13:10.735476 14720 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.739897 14720 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.739924 14720 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc0002ad7a0 41 D0613 11:13:10.739936 14720 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.742751 14720 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.742775 14720 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc0002ad7a0 42 D0613 11:13:10.742788 14720 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.743366 14720 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.743410 14720 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.743408 14720 task_signals.go:204] [ 474: 475] Signal 474, PID: 475, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.743445 14720 task_exit.go:204] [ 474: 475] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.743962 14720 task_exit.go:204] [ 474: 475] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.743996 14720 task_exit.go:204] [ 474: 475] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.744019 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.744044 14720 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8) D0613 11:13:10.753115 14720 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.753159 14720 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc003378ab0 39 D0613 11:13:10.753335 14720 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.754672 14720 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.754750 14720 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc003378ab0 40 D0613 11:13:10.754772 14720 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.762108 14720 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.762149 14720 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc003378ab0 41 D0613 11:13:10.762165 14720 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.767960 14720 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.767995 14720 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc003378ab0 42 D0613 11:13:10.768009 14720 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.769813 14720 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.769881 14720 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.769940 14720 task_signals.go:204] [ 476: 477] Signal 476, PID: 477, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.769963 14720 task_exit.go:204] [ 476: 477] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.770521 14720 task_exit.go:204] [ 476: 477] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.770577 14720 task_exit.go:204] [ 476: 477] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.770598 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.771360 14720 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) D0613 11:13:10.778354 14720 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.778391 14720 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc007f63f80 39 D0613 11:13:10.778464 14720 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.779499 14720 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.779551 14720 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc007f63f80 40 D0613 11:13:10.779566 14720 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.787053 14720 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.787137 14720 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc007f63f80 41 D0613 11:13:10.787171 14720 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.795556 14720 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.795647 14720 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc007f63f80 42 D0613 11:13:10.795676 14720 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.798840 14720 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.798925 14720 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.798968 14720 task_signals.go:204] [ 478: 479] Signal 478, PID: 479, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.798989 14720 task_exit.go:204] [ 478: 479] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.799491 14720 task_exit.go:204] [ 478: 479] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.799532 14720 task_exit.go:204] [ 478: 479] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.799558 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.799676 14720 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x5}, 0x0, 0x0) pipe(&(0x7f0000000ec0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)) select(0x40, &(0x7f0000000180)={0x1}, &(0x7f00000001c0)={0x3}, &(0x7f0000000200)={0x58}, 0x0) D0613 11:13:10.810460 14720 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.810557 14720 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc00b1f4090 39 D0613 11:13:10.810827 14720 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.812386 14720 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.812449 14720 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc00b1f4090 40 D0613 11:13:10.812469 14720 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.818814 14720 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.818867 14720 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc00b1f4090 41 D0613 11:13:10.818884 14720 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.824435 14720 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.824480 14720 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc00b1f4090 42 D0613 11:13:10.824494 14720 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.825080 14720 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.825126 14720 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.825162 14720 task_signals.go:204] [ 480: 481] Signal 480, PID: 481, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.825206 14720 task_exit.go:204] [ 480: 481] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.825528 14720 task_exit.go:204] [ 480: 481] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.825551 14720 task_exit.go:204] [ 480: 481] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.825569 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.826669 14720 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:10.842620 14720 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.842713 14720 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc003378ba0 39 D0613 11:13:10.842856 14720 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.843990 14720 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.844026 14720 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc003378ba0 40 D0613 11:13:10.844044 14720 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.851989 14720 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.852057 14720 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc003378ba0 41 D0613 11:13:10.852075 14720 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.858523 14720 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.858585 14720 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc003378ba0 42 D0613 11:13:10.858618 14720 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.859582 14720 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.859642 14720 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.859677 14720 task_signals.go:204] [ 482: 483] Signal 482, PID: 483, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.859710 14720 task_exit.go:204] [ 482: 483] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.860160 14720 task_exit.go:204] [ 482: 483] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.860184 14720 task_exit.go:204] [ 482: 483] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.860206 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.861419 14720 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:10.869695 14720 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.869760 14720 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc00541c2d0 39 D0613 11:13:10.869935 14720 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.871587 14720 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.871691 14720 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc00541c2d0 40 D0613 11:13:10.871721 14720 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.878638 14720 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.878718 14720 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc00541c2d0 41 D0613 11:13:10.878740 14720 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.884679 14720 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.884758 14720 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc00541c2d0 42 D0613 11:13:10.884783 14720 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.888168 14720 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.888265 14720 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.888306 14720 task_signals.go:204] [ 484: 485] Signal 484, PID: 485, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.888324 14720 task_exit.go:204] [ 484: 485] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.888866 14720 task_exit.go:204] [ 484: 485] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.888995 14720 task_exit.go:204] [ 484: 485] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.889031 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.889831 14720 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0xb000) D0613 11:13:10.898790 14720 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.898835 14720 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc00541c3f0 39 D0613 11:13:10.898942 14720 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.900354 14720 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.900435 14720 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc00541c3f0 40 D0613 11:13:10.900458 14720 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.910975 14720 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.911052 14720 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc00541c3f0 41 D0613 11:13:10.911074 14720 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.915158 14720 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.915199 14720 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc00541c3f0 42 D0613 11:13:10.915216 14720 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.916086 14720 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.916147 14720 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.916175 14720 task_signals.go:204] [ 486: 487] Signal 486, PID: 487, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.916190 14720 task_exit.go:204] [ 486: 487] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.916551 14720 task_exit.go:204] [ 486: 487] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.916582 14720 task_exit.go:204] [ 486: 487] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.916605 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.917112 14720 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: socket(0x28, 0x0, 0x2570000) D0613 11:13:10.926162 14720 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.926252 14720 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc00b1f4180 39 D0613 11:13:10.926575 14720 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.929169 14720 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.929229 14720 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc00b1f4180 40 D0613 11:13:10.929248 14720 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.937086 14720 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.937151 14720 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc00b1f4180 41 D0613 11:13:10.937175 14720 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.944438 14720 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.944522 14720 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc00b1f4180 42 D0613 11:13:10.944547 14720 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.947435 14720 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.947558 14720 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.947643 14720 task_signals.go:204] [ 488: 489] Signal 488, PID: 489, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.947737 14720 task_exit.go:204] [ 488: 489] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.948534 14720 task_exit.go:204] [ 488: 489] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.948600 14720 task_exit.go:204] [ 488: 489] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.948630 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.949059 14720 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:10.961921 14720 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.962075 14720 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc0002add40 39 D0613 11:13:10.962291 14720 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.964402 14720 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.964511 14720 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc0002add40 40 D0613 11:13:10.964538 14720 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:10.975094 14720 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:10.975151 14720 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc0002add40 41 D0613 11:13:10.975169 14720 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:10.979580 14720 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:10.979623 14720 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc0002add40 42 D0613 11:13:10.979642 14720 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:10.981117 14720 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.981176 14720 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.981217 14720 task_signals.go:204] [ 490: 491] Signal 490, PID: 491, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:10.981232 14720 task_exit.go:204] [ 490: 491] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:10.981887 14720 task_exit.go:204] [ 490: 491] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:10.981979 14720 task_exit.go:204] [ 490: 491] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:10.982007 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:10.982564 14720 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:10 executing program 0: prctl$PR_SET_VMA(0x7, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:10.996579 14720 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:10.996633 14720 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc0067bdb60 39 D0613 11:13:10.996760 14720 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:10.997287 14720 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:10.997324 14720 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc0067bdb60 40 D0613 11:13:10.997342 14720 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.005084 14720 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.005132 14720 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc0067bdb60 41 D0613 11:13:11.005154 14720 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.009447 14720 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.009511 14720 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc0067bdb60 42 D0613 11:13:11.009527 14720 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.010571 14720 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.010622 14720 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.010664 14720 task_signals.go:204] [ 492: 493] Signal 492, PID: 493, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.010683 14720 task_exit.go:204] [ 492: 493] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.011210 14720 task_exit.go:204] [ 492: 493] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.011330 14720 task_exit.go:204] [ 492: 493] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.011363 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.012621 14720 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: prctl$PR_SET_VMA(0x3, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:11.020451 14720 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.020505 14720 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc0112ed980 39 D0613 11:13:11.020624 14720 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.022296 14720 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.022360 14720 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc0112ed980 40 D0613 11:13:11.022382 14720 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.033757 14720 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.033812 14720 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc0112ed980 41 D0613 11:13:11.033831 14720 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.038074 14720 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.038151 14720 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc0112ed980 42 D0613 11:13:11.038178 14720 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.039080 14720 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.039133 14720 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.039159 14720 task_signals.go:204] [ 494: 495] Signal 494, PID: 495, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.039176 14720 task_exit.go:204] [ 494: 495] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.039535 14720 task_exit.go:204] [ 494: 495] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.039576 14720 task_exit.go:204] [ 494: 495] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.039604 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.040842 14720 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}]}, 0xffffff35) D0613 11:13:11.053584 14720 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.053774 14720 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc00b1f44e0 39 D0613 11:13:11.053968 14720 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.056137 14720 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.056190 14720 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc00b1f44e0 40 D0613 11:13:11.056209 14720 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.066083 14720 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.066138 14720 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc00b1f44e0 41 D0613 11:13:11.066159 14720 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.072138 14720 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.072188 14720 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc00b1f44e0 42 D0613 11:13:11.072218 14720 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.073384 14720 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.073448 14720 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.073483 14720 task_signals.go:204] [ 496: 497] Signal 496, PID: 497, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.073503 14720 task_exit.go:204] [ 496: 497] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.074005 14720 task_exit.go:204] [ 496: 497] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.074027 14720 task_exit.go:204] [ 496: 497] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.074057 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.074944 14720 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @local}}}}) D0613 11:13:11.083196 14720 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.083271 14720 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc003fa4060 39 D0613 11:13:11.083511 14720 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.085097 14720 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.085143 14720 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc003fa4060 40 D0613 11:13:11.085161 14720 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.094318 14720 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.094385 14720 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc003fa4060 41 D0613 11:13:11.094401 14720 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.100129 14720 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.100174 14720 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc003fa4060 42 D0613 11:13:11.100191 14720 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.101069 14720 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.101123 14720 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.101159 14720 task_signals.go:204] [ 498: 499] Signal 498, PID: 499, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.101188 14720 task_exit.go:204] [ 498: 499] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.101629 14720 task_exit.go:204] [ 498: 499] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.101661 14720 task_exit.go:204] [ 498: 499] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.101687 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.101971 14720 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000200)) D0613 11:13:11.114305 14720 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.114366 14720 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc003378d50 39 D0613 11:13:11.114529 14720 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.115468 14720 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.115499 14720 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc003378d50 40 D0613 11:13:11.115514 14720 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.123338 14720 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.123439 14720 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc003378d50 41 D0613 11:13:11.123469 14720 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.131368 14720 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.131435 14720 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc003378d50 42 D0613 11:13:11.131459 14720 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.133210 14720 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.133305 14720 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.133355 14720 task_signals.go:204] [ 500: 501] Signal 500, PID: 501, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.133375 14720 task_exit.go:204] [ 500: 501] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.134024 14720 task_exit.go:204] [ 500: 501] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.134068 14720 task_exit.go:204] [ 500: 501] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.134094 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.135458 14720 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000040)='/dev/dri/card#\x00') D0613 11:13:11.145517 14720 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.145580 14720 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0112ede60 39 D0613 11:13:11.145660 14720 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.147021 14720 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.147132 14720 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0112ede60 40 D0613 11:13:11.147171 14720 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.155993 14720 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.156049 14720 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0112ede60 41 D0613 11:13:11.156086 14720 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.162856 14720 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.162921 14720 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0112ede60 42 D0613 11:13:11.162942 14720 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.163784 14720 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.163840 14720 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.163868 14720 task_signals.go:204] [ 502: 503] Signal 502, PID: 503, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.163889 14720 task_exit.go:204] [ 502: 503] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.164271 14720 task_exit.go:204] [ 502: 503] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.164296 14720 task_exit.go:204] [ 502: 503] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.164319 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.165399 14720 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff7000/0x9000)=nil, 0x9000, &(0x7f0000000000)='&\',,(%\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f00003fe000/0xc00000)=nil, 0xc00000, 0x0) D0613 11:13:11.178827 14720 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.178886 14720 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0112ede90 39 D0613 11:13:11.179017 14720 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.179805 14720 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.179840 14720 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0112ede90 40 D0613 11:13:11.179867 14720 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.187941 14720 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.187995 14720 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0112ede90 41 D0613 11:13:11.188019 14720 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.193173 14720 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.193224 14720 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0112ede90 42 D0613 11:13:11.193242 14720 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.194201 14720 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.194274 14720 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.194369 14720 task_signals.go:204] [ 504: 505] Signal 504, PID: 505, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.194410 14720 task_exit.go:204] [ 504: 505] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.195009 14720 task_exit.go:204] [ 504: 505] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.195038 14720 task_exit.go:204] [ 504: 505] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.195056 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.196506 14720 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: prctl$PR_SET_VMA(0x2, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:11.203488 14720 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.203526 14720 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc0112edec0 39 D0613 11:13:11.203654 14720 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.205164 14720 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.205418 14720 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc0112edec0 40 D0613 11:13:11.205508 14720 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.213794 14720 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.213867 14720 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc0112edec0 41 D0613 11:13:11.213894 14720 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.218388 14720 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.218448 14720 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc0112edec0 42 D0613 11:13:11.218468 14720 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.219398 14720 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.219460 14720 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.219508 14720 task_signals.go:204] [ 506: 507] Signal 506, PID: 507, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.219595 14720 task_exit.go:204] [ 506: 507] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.220057 14720 task_exit.go:204] [ 506: 507] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.220089 14720 task_exit.go:204] [ 506: 507] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.220110 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.220933 14720 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89ff, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:11.229503 14720 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.229744 14720 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc003379440 39 D0613 11:13:11.229997 14720 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.231742 14720 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.231808 14720 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc003379440 40 D0613 11:13:11.231832 14720 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.241509 14720 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.241604 14720 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc003379440 41 D0613 11:13:11.241644 14720 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.253358 14720 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.253442 14720 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc003379440 42 D0613 11:13:11.253466 14720 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.254293 14720 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.254355 14720 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.254410 14720 task_signals.go:204] [ 508: 509] Signal 508, PID: 509, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.254442 14720 task_exit.go:204] [ 508: 509] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.254950 14720 task_exit.go:204] [ 508: 509] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.255037 14720 task_exit.go:204] [ 508: 509] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.255133 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.257109 14720 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000300)='cpu.pressure\x00', 0x2, 0x0) D0613 11:13:11.275321 14720 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.275384 14720 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc00cfda030 39 D0613 11:13:11.275541 14720 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.277293 14720 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.277326 14720 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc00cfda030 40 D0613 11:13:11.277340 14720 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.285401 14720 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.285476 14720 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc00cfda030 41 D0613 11:13:11.285501 14720 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.291467 14720 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.291530 14720 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc00cfda030 42 D0613 11:13:11.291657 14720 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.293061 14720 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.293138 14720 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.293175 14720 task_signals.go:204] [ 510: 511] Signal 510, PID: 511, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.293192 14720 task_exit.go:204] [ 510: 511] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.293826 14720 task_exit.go:204] [ 510: 511] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.293873 14720 task_exit.go:204] [ 510: 511] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.293892 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.294409 14720 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:11.301772 14720 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.301846 14720 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0033795f0 39 D0613 11:13:11.301994 14720 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.303469 14720 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.303546 14720 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0033795f0 40 D0613 11:13:11.303568 14720 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.313059 14720 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.313123 14720 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0033795f0 41 D0613 11:13:11.313150 14720 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.319838 14720 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.319934 14720 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0033795f0 42 D0613 11:13:11.319955 14720 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.321046 14720 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.321109 14720 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.321131 14720 task_signals.go:204] [ 512: 513] Signal 512, PID: 513, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.321159 14720 task_exit.go:204] [ 512: 513] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.322225 14720 task_exit.go:204] [ 512: 513] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.322304 14720 task_exit.go:204] [ 512: 513] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.322336 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.322395 14720 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000002d80)='ns/ipc\x00') D0613 11:13:11.334095 14720 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.334160 14720 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc00b1f46c0 39 D0613 11:13:11.334458 14720 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.336498 14720 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.336568 14720 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc00b1f46c0 40 D0613 11:13:11.336589 14720 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.344201 14720 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.344267 14720 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc00b1f46c0 41 D0613 11:13:11.344291 14720 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.350978 14720 usertrap_amd64.go:212] [ 514: 515] Found the pattern at ip 5604396c431d:sysno 257 D0613 11:13:11.351070 14720 usertrap_amd64.go:122] [ 514: 515] Allocate a new trap: 0xc00b1f46c0 42 D0613 11:13:11.351099 14720 usertrap_amd64.go:225] [ 514: 515] Apply the binary patch addr 5604396c431d trap addr 62d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.357049 14720 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.357112 14720 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc00b1f46c0 43 D0613 11:13:11.357130 14720 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 5604396c4044 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0613 11:13:11.357257 14720 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.357333 14720 task_signals.go:204] [ 514: 515] Signal 514, PID: 515, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.357427 14720 task_exit.go:204] [ 514: 515] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.357478 14720 task_exit.go:204] [ 514: 515] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.357505 14720 task_exit.go:204] [ 514: 515] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.357998 14720 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.358068 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.359394 14720 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) D0613 11:13:11.386605 14720 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.386672 14720 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc003fa4120 39 D0613 11:13:11.386786 14720 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.387390 14720 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.387425 14720 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc003fa4120 40 D0613 11:13:11.387438 14720 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.393740 14720 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.393792 14720 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc003fa4120 41 D0613 11:13:11.393813 14720 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.399041 14720 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.399083 14720 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc003fa4120 42 D0613 11:13:11.399098 14720 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.400882 14720 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.401049 14720 task_signals.go:204] [ 516: 517] Signal 516, PID: 517, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.401058 14720 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.401106 14720 task_exit.go:204] [ 516: 517] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.401700 14720 task_exit.go:204] [ 516: 517] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.401735 14720 task_exit.go:204] [ 516: 517] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.401755 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.402478 14720 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: shmget$private(0x2, 0x3000, 0xd28f7f21a55def59, &(0x7f0000ffa000/0x3000)=nil) D0613 11:13:11.417491 14720 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.417578 14720 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc00b1f4780 39 D0613 11:13:11.417999 14720 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.419734 14720 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.419776 14720 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc00b1f4780 40 D0613 11:13:11.419796 14720 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.426234 14720 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.426304 14720 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc00b1f4780 41 D0613 11:13:11.426325 14720 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.432720 14720 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.432768 14720 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc00b1f4780 42 D0613 11:13:11.432789 14720 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.433399 14720 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.433462 14720 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.433463 14720 task_signals.go:204] [ 518: 519] Signal 518, PID: 519, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.433507 14720 task_exit.go:204] [ 518: 519] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.433905 14720 task_exit.go:204] [ 518: 519] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.433955 14720 task_exit.go:204] [ 518: 519] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.433975 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.434928 14720 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f6, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) D0613 11:13:11.443707 14720 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.443754 14720 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc00cfda3c0 39 D0613 11:13:11.443890 14720 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.445605 14720 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.445705 14720 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc00cfda3c0 40 D0613 11:13:11.445730 14720 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.455166 14720 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.455226 14720 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc00cfda3c0 41 D0613 11:13:11.455259 14720 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.460480 14720 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.460521 14720 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc00cfda3c0 42 D0613 11:13:11.460535 14720 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.461881 14720 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.461929 14720 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.461962 14720 task_signals.go:204] [ 520: 521] Signal 520, PID: 521, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.462001 14720 task_exit.go:204] [ 520: 521] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.462402 14720 task_exit.go:204] [ 520: 521] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.462428 14720 task_exit.go:204] [ 520: 521] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.462444 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.462643 14720 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89fd, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:11.472087 14720 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.472132 14720 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00b1f47b0 39 D0613 11:13:11.472237 14720 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.473704 14720 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.473739 14720 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00b1f47b0 40 D0613 11:13:11.473757 14720 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.483350 14720 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.483431 14720 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00b1f47b0 41 D0613 11:13:11.483458 14720 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.489499 14720 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.489551 14720 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00b1f47b0 42 D0613 11:13:11.489567 14720 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.490320 14720 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.490392 14720 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.490449 14720 task_signals.go:204] [ 522: 523] Signal 522, PID: 523, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.490465 14720 task_exit.go:204] [ 522: 523] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.491280 14720 task_exit.go:204] [ 522: 523] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.491379 14720 task_exit.go:204] [ 522: 523] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.491407 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.492432 14720 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:11.509493 14720 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.509695 14720 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc007975f80 39 D0613 11:13:11.509934 14720 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.513689 14720 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.513737 14720 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc007975f80 40 D0613 11:13:11.513760 14720 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.520302 14720 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.520351 14720 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc007975f80 41 D0613 11:13:11.520369 14720 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.529227 14720 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.529297 14720 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc007975f80 42 D0613 11:13:11.529323 14720 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.531511 14720 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.531622 14720 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.531684 14720 task_signals.go:204] [ 524: 525] Signal 524, PID: 525, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.531727 14720 task_exit.go:204] [ 524: 525] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.532278 14720 task_exit.go:204] [ 524: 525] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.532319 14720 task_exit.go:204] [ 524: 525] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.532345 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.532461 14720 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f4, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) D0613 11:13:11.546131 14720 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.546263 14720 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00cfda630 39 D0613 11:13:11.546411 14720 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.548354 14720 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.548419 14720 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00cfda630 40 D0613 11:13:11.548442 14720 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.566144 14720 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.566214 14720 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00cfda630 41 D0613 11:13:11.566239 14720 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.575027 14720 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.575103 14720 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00cfda630 42 D0613 11:13:11.575128 14720 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.576331 14720 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.576421 14720 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.576477 14720 task_signals.go:204] [ 526: 527] Signal 526, PID: 527, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.576547 14720 task_exit.go:204] [ 526: 527] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.577182 14720 task_exit.go:204] [ 526: 527] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.577240 14720 task_exit.go:204] [ 526: 527] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.577266 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.579536 14720 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:11.602055 14720 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.602137 14720 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc00b1f4990 39 D0613 11:13:11.602286 14720 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.603280 14720 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.603330 14720 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc00b1f4990 40 D0613 11:13:11.603348 14720 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.609662 14720 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.609833 14720 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc00b1f4990 41 D0613 11:13:11.609922 14720 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.616581 14720 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.616644 14720 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc00b1f4990 42 D0613 11:13:11.616666 14720 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.617270 14720 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.617328 14720 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.617367 14720 task_signals.go:204] [ 528: 529] Signal 528, PID: 529, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.617399 14720 task_exit.go:204] [ 528: 529] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.617811 14720 task_exit.go:204] [ 528: 529] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.617847 14720 task_exit.go:204] [ 528: 529] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.617869 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.618408 14720 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89fd, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) D0613 11:13:11.627323 14720 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.627372 14720 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc00b1f49c0 39 D0613 11:13:11.627495 14720 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.628182 14720 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.628214 14720 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc00b1f49c0 40 D0613 11:13:11.628230 14720 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.632357 14720 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.632396 14720 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc00b1f49c0 41 D0613 11:13:11.632409 14720 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.637426 14720 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.637473 14720 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc00b1f49c0 42 D0613 11:13:11.637489 14720 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.638728 14720 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.638825 14720 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.638875 14720 task_signals.go:204] [ 530: 531] Signal 530, PID: 531, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.638894 14720 task_exit.go:204] [ 530: 531] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.639296 14720 task_exit.go:204] [ 530: 531] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.639317 14720 task_exit.go:204] [ 530: 531] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.639332 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.639455 14720 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: prctl$PR_SET_VMA(0x2f, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:11.647475 14720 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.647532 14720 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc0067bdc50 39 D0613 11:13:11.647636 14720 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.648498 14720 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.648535 14720 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc0067bdc50 40 D0613 11:13:11.648548 14720 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.654167 14720 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.654222 14720 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc0067bdc50 41 D0613 11:13:11.654237 14720 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.658615 14720 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.658656 14720 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc0067bdc50 42 D0613 11:13:11.658672 14720 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.659415 14720 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.659480 14720 task_signals.go:204] [ 532: 533] Signal 532, PID: 533, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.659501 14720 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.659511 14720 task_exit.go:204] [ 532: 533] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.660006 14720 task_exit.go:204] [ 532: 533] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.660046 14720 task_exit.go:204] [ 532: 533] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.660068 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.660090 14720 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890a, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:11.669846 14720 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.669911 14720 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00b1f4cf0 39 D0613 11:13:11.670226 14720 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.672539 14720 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.672582 14720 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00b1f4cf0 40 D0613 11:13:11.672601 14720 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.679992 14720 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.680066 14720 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00b1f4cf0 41 D0613 11:13:11.680092 14720 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.685102 14720 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.685157 14720 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00b1f4cf0 42 D0613 11:13:11.685184 14720 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.685802 14720 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.685861 14720 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.685894 14720 task_signals.go:204] [ 534: 535] Signal 534, PID: 535, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.685913 14720 task_exit.go:204] [ 534: 535] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.686256 14720 task_exit.go:204] [ 534: 535] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.686293 14720 task_exit.go:204] [ 534: 535] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.686311 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.687018 14720 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:11.695078 14720 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.695110 14720 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc00b1f4db0 39 D0613 11:13:11.695225 14720 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.696753 14720 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.696795 14720 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc00b1f4db0 40 D0613 11:13:11.696813 14720 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.704322 14720 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.704397 14720 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc00b1f4db0 41 D0613 11:13:11.704424 14720 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.712492 14720 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.712554 14720 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc00b1f4db0 42 D0613 11:13:11.712582 14720 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.713550 14720 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.713626 14720 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.713738 14720 task_signals.go:204] [ 536: 537] Signal 536, PID: 537, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.713772 14720 task_exit.go:204] [ 536: 537] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.715658 14720 task_exit.go:204] [ 536: 537] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.715688 14720 task_exit.go:204] [ 536: 537] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.715706 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.717005 14720 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: socket(0x1e, 0x0, 0x3) D0613 11:13:11.723937 14720 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.724005 14720 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc00b1f4f60 39 D0613 11:13:11.724105 14720 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.725849 14720 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.725877 14720 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc00b1f4f60 40 D0613 11:13:11.725891 14720 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.735837 14720 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.735895 14720 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc00b1f4f60 41 D0613 11:13:11.735912 14720 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.741054 14720 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.741147 14720 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc00b1f4f60 42 D0613 11:13:11.741171 14720 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.742894 14720 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.742969 14720 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.742973 14720 task_signals.go:204] [ 538: 539] Signal 538, PID: 539, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.743039 14720 task_exit.go:204] [ 538: 539] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.743716 14720 task_exit.go:204] [ 538: 539] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.743829 14720 task_exit.go:204] [ 538: 539] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.743857 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.744708 14720 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1}}}}) D0613 11:13:11.755180 14720 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.755259 14720 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc0067bddd0 39 D0613 11:13:11.755432 14720 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.756712 14720 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.756751 14720 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc0067bddd0 40 D0613 11:13:11.756767 14720 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.765548 14720 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.765616 14720 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc0067bddd0 41 D0613 11:13:11.765639 14720 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.772436 14720 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.772501 14720 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc0067bddd0 42 D0613 11:13:11.772521 14720 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.773475 14720 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.773538 14720 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.773573 14720 task_signals.go:204] [ 540: 541] Signal 540, PID: 541, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.773602 14720 task_exit.go:204] [ 540: 541] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.773962 14720 task_exit.go:204] [ 540: 541] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.773987 14720 task_exit.go:204] [ 540: 541] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.774018 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.774871 14720 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: prctl$PR_SET_VMA(0x43, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:11.791879 14720 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.791949 14720 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc0067bde90 39 D0613 11:13:11.792131 14720 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.794604 14720 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.794934 14720 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc0067bde90 40 D0613 11:13:11.794985 14720 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.802408 14720 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.802462 14720 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc0067bde90 41 D0613 11:13:11.802481 14720 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.809242 14720 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.809291 14720 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc0067bde90 42 D0613 11:13:11.809312 14720 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.810678 14720 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.810794 14720 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.810847 14720 task_signals.go:204] [ 542: 543] Signal 542, PID: 543, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.810881 14720 task_exit.go:204] [ 542: 543] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.811322 14720 task_exit.go:204] [ 542: 543] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.811366 14720 task_exit.go:204] [ 542: 543] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.811386 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.812548 14720 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:11.822620 14720 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.822671 14720 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc00541d560 39 D0613 11:13:11.822767 14720 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.823388 14720 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.823416 14720 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc00541d560 40 D0613 11:13:11.823429 14720 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.831156 14720 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.831233 14720 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc00541d560 41 D0613 11:13:11.831265 14720 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.840744 14720 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.840809 14720 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc00541d560 42 D0613 11:13:11.840829 14720 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.841896 14720 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.842000 14720 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.842035 14720 task_signals.go:204] [ 544: 545] Signal 544, PID: 545, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.842102 14720 task_exit.go:204] [ 544: 545] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.843148 14720 task_exit.go:204] [ 544: 545] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.843211 14720 task_exit.go:204] [ 544: 545] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.843239 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.847072 14720 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: socket$inet(0x2, 0x0, 0x800) D0613 11:13:11.859078 14720 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.859249 14720 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc0044165a0 39 D0613 11:13:11.859489 14720 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.860743 14720 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.860778 14720 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc0044165a0 40 D0613 11:13:11.860792 14720 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.869427 14720 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.869485 14720 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc0044165a0 41 D0613 11:13:11.869508 14720 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.877354 14720 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.877425 14720 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc0044165a0 42 D0613 11:13:11.877451 14720 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.878357 14720 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.878431 14720 task_signals.go:204] [ 546: 547] Signal 546, PID: 547, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.878481 14720 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.878509 14720 task_exit.go:204] [ 546: 547] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.878965 14720 task_exit.go:204] [ 546: 547] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.879000 14720 task_exit.go:204] [ 546: 547] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.879015 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.879729 14720 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x252000, 0x0) D0613 11:13:11.893280 14720 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.893338 14720 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc00541d6b0 39 D0613 11:13:11.893439 14720 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.894167 14720 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.894189 14720 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc00541d6b0 40 D0613 11:13:11.894202 14720 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.901072 14720 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.901120 14720 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc00541d6b0 41 D0613 11:13:11.901139 14720 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.908274 14720 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.908322 14720 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc00541d6b0 42 D0613 11:13:11.908342 14720 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.909913 14720 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.910028 14720 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.910081 14720 task_signals.go:204] [ 548: 549] Signal 548, PID: 549, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.910102 14720 task_exit.go:204] [ 548: 549] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.913247 14720 task_exit.go:204] [ 548: 549] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.913305 14720 task_exit.go:204] [ 548: 549] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.913329 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.914467 14720 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001180)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @remote}}}}) D0613 11:13:11.929546 14720 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.929612 14720 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc00541d7a0 39 D0613 11:13:11.929730 14720 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.931898 14720 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.931963 14720 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc00541d7a0 40 D0613 11:13:11.931985 14720 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.938919 14720 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.939006 14720 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc00541d7a0 41 D0613 11:13:11.939033 14720 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.947081 14720 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.947145 14720 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc00541d7a0 42 D0613 11:13:11.947166 14720 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.948329 14720 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.948439 14720 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.948479 14720 task_signals.go:204] [ 550: 551] Signal 550, PID: 551, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.948503 14720 task_exit.go:204] [ 550: 551] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.949102 14720 task_exit.go:204] [ 550: 551] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.949141 14720 task_exit.go:204] [ 550: 551] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.949167 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.949251 14720 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f0000000040)=0x2) D0613 11:13:11.963044 14720 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:11.963113 14720 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc00541d950 39 D0613 11:13:11.963444 14720 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:11.965470 14720 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:11.965529 14720 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc00541d950 40 D0613 11:13:11.965546 14720 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:11.974803 14720 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:11.974893 14720 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc00541d950 41 D0613 11:13:11.974919 14720 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:11.982679 14720 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:11.982753 14720 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc00541d950 42 D0613 11:13:11.982771 14720 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:11.984361 14720 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.984436 14720 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.984465 14720 task_signals.go:204] [ 552: 553] Signal 552, PID: 553, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:11.984497 14720 task_exit.go:204] [ 552: 553] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:11.985292 14720 task_exit.go:204] [ 552: 553] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:11.985377 14720 task_exit.go:204] [ 552: 553] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:11.985406 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:11.985723 14720 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:11 executing program 0: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0xacc5c0bc83dee2f4) D0613 11:13:12.002898 14720 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.002964 14720 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc00d206390 39 D0613 11:13:12.003287 14720 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.005358 14720 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.005405 14720 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc00d206390 40 D0613 11:13:12.005423 14720 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.017715 14720 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.017795 14720 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc00d206390 41 D0613 11:13:12.017818 14720 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.023773 14720 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.023860 14720 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc00d206390 42 D0613 11:13:12.023883 14720 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.025233 14720 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.025325 14720 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.025380 14720 task_signals.go:204] [ 554: 555] Signal 554, PID: 555, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.025426 14720 task_exit.go:204] [ 554: 555] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.025863 14720 task_exit.go:204] [ 554: 555] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.025876 14720 task_exit.go:204] [ 554: 555] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.025896 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.026046 14720 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) D0613 11:13:12.045759 14720 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.045850 14720 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00cfda8d0 39 D0613 11:13:12.046002 14720 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.049669 14720 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.049759 14720 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00cfda8d0 40 D0613 11:13:12.049782 14720 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.060797 14720 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.060864 14720 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00cfda8d0 41 D0613 11:13:12.060885 14720 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.065945 14720 task_syscall.go:245] [ 556: 557] Syscall 202: killed by seccomp D0613 11:13:12.066001 14720 task_exit.go:204] [ 556: 557] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.066033 14720 task_exit.go:204] [ 556: 557] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.066042 14720 task_exit.go:204] [ 556: 557] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.114590 14720 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.114663 14720 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00cfda8d0 42 D0613 11:13:12.114690 14720 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.115651 14720 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.116091 14720 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.116145 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.116805 14720 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', 0x0}) D0613 11:13:12.129631 14720 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.129710 14720 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc00c52a240 39 D0613 11:13:12.129820 14720 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.131690 14720 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.131751 14720 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc00c52a240 40 D0613 11:13:12.131772 14720 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.141388 14720 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.141457 14720 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc00c52a240 41 D0613 11:13:12.141476 14720 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.148677 14720 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.148741 14720 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc00c52a240 42 D0613 11:13:12.148764 14720 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.150154 14720 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.150234 14720 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.150286 14720 task_signals.go:204] [ 558: 559] Signal 558, PID: 559, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.150329 14720 task_exit.go:204] [ 558: 559] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.150880 14720 task_exit.go:204] [ 558: 559] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.150908 14720 task_exit.go:204] [ 558: 559] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.150931 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.150967 14720 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89fe, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:12.163323 14720 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.163522 14720 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc00c52a2d0 39 D0613 11:13:12.163795 14720 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.165022 14720 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.165080 14720 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc00c52a2d0 40 D0613 11:13:12.165098 14720 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.172013 14720 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.172047 14720 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc00c52a2d0 41 D0613 11:13:12.172062 14720 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.178298 14720 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.178340 14720 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc00c52a2d0 42 D0613 11:13:12.178359 14720 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.179751 14720 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.179830 14720 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.179855 14720 task_signals.go:204] [ 560: 561] Signal 560, PID: 561, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.179884 14720 task_exit.go:204] [ 560: 561] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.180259 14720 task_exit.go:204] [ 560: 561] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.180282 14720 task_exit.go:204] [ 560: 561] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.180298 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.181170 14720 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000080), 0x0, 0x0) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) D0613 11:13:12.190204 14720 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.190248 14720 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc00541dbc0 39 D0613 11:13:12.190334 14720 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.191256 14720 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.191279 14720 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc00541dbc0 40 D0613 11:13:12.191292 14720 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.198336 14720 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.198410 14720 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc00541dbc0 41 D0613 11:13:12.198432 14720 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.205849 14720 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.205932 14720 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc00541dbc0 42 D0613 11:13:12.205969 14720 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.207141 14720 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.207207 14720 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.207260 14720 task_signals.go:204] [ 562: 563] Signal 562, PID: 563, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.207342 14720 task_exit.go:204] [ 562: 563] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.208015 14720 task_exit.go:204] [ 562: 563] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.208086 14720 task_exit.go:204] [ 562: 563] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.208120 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.209098 14720 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: socket(0x29, 0x2, 0x1) D0613 11:13:12.219307 14720 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.219377 14720 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc00b1f5800 39 D0613 11:13:12.219489 14720 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.220232 14720 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.220258 14720 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc00b1f5800 40 D0613 11:13:12.220274 14720 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.228755 14720 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.228819 14720 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc00b1f5800 41 D0613 11:13:12.228843 14720 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.235039 14720 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.235117 14720 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc00b1f5800 42 D0613 11:13:12.235141 14720 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.236380 14720 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.236483 14720 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.236530 14720 task_signals.go:204] [ 564: 565] Signal 564, PID: 565, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.236568 14720 task_exit.go:204] [ 564: 565] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.237266 14720 task_exit.go:204] [ 564: 565] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.237335 14720 task_exit.go:204] [ 564: 565] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.237351 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.238028 14720 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000f80)=[{{&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) D0613 11:13:12.248900 14720 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.249007 14720 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc00b1f58c0 39 D0613 11:13:12.249131 14720 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.250526 14720 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.250554 14720 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc00b1f58c0 40 D0613 11:13:12.250573 14720 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.260015 14720 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.260089 14720 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc00b1f58c0 41 D0613 11:13:12.260112 14720 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.272110 14720 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.272182 14720 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc00b1f58c0 42 D0613 11:13:12.272208 14720 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.273414 14720 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.273494 14720 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.273542 14720 task_signals.go:204] [ 566: 567] Signal 566, PID: 567, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.273628 14720 task_exit.go:204] [ 566: 567] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.274119 14720 task_exit.go:204] [ 566: 567] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.274173 14720 task_exit.go:204] [ 566: 567] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.274192 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.275361 14720 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote}}}}) D0613 11:13:12.294582 14720 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.294776 14720 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00c52a4e0 39 D0613 11:13:12.294966 14720 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.296623 14720 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.296668 14720 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00c52a4e0 40 D0613 11:13:12.296686 14720 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.303125 14720 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.303166 14720 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00c52a4e0 41 D0613 11:13:12.303185 14720 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.312033 14720 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.312120 14720 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00c52a4e0 42 D0613 11:13:12.312143 14720 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.313850 14720 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.313934 14720 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.313966 14720 task_signals.go:204] [ 568: 569] Signal 568, PID: 569, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.314022 14720 task_exit.go:204] [ 568: 569] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.314384 14720 task_exit.go:204] [ 568: 569] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.314424 14720 task_exit.go:204] [ 568: 569] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.314440 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.315455 14720 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8931, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:12.326413 14720 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.326468 14720 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc00541dfb0 39 D0613 11:13:12.326590 14720 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.327374 14720 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.327409 14720 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc00541dfb0 40 D0613 11:13:12.327425 14720 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.336560 14720 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.336589 14720 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc00541dfb0 41 D0613 11:13:12.336613 14720 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.342735 14720 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.342750 14720 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc00541dfb0 42 D0613 11:13:12.342763 14720 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.345713 14720 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.345889 14720 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.346027 14720 task_signals.go:204] [ 570: 571] Signal 570, PID: 571, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.346090 14720 task_exit.go:204] [ 570: 571] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.346497 14720 task_exit.go:204] [ 570: 571] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.346535 14720 task_exit.go:204] [ 570: 571] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.346558 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.346656 14720 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev}}}}) D0613 11:13:12.359543 14720 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.359582 14720 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc00b1f5c20 39 D0613 11:13:12.359729 14720 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.361068 14720 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.361102 14720 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc00b1f5c20 40 D0613 11:13:12.361116 14720 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.367191 14720 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.367227 14720 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc00b1f5c20 41 D0613 11:13:12.367239 14720 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.373222 14720 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.373267 14720 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc00b1f5c20 42 D0613 11:13:12.373284 14720 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.374556 14720 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.374595 14720 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.374630 14720 task_signals.go:204] [ 572: 573] Signal 572, PID: 573, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.374651 14720 task_exit.go:204] [ 572: 573] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.375026 14720 task_exit.go:204] [ 572: 573] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.375060 14720 task_exit.go:204] [ 572: 573] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.375077 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.375110 14720 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x2d}]}) D0613 11:13:12.383851 14720 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.383930 14720 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc00cfdaf30 39 D0613 11:13:12.384149 14720 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.386162 14720 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.386234 14720 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc00cfdaf30 40 D0613 11:13:12.386260 14720 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.394305 14720 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.394376 14720 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc00cfdaf30 41 D0613 11:13:12.394401 14720 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.398578 14720 sys_seccomp.go:68] [ 574: 575] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0613 11:13:12.399498 14720 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.399536 14720 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc00cfdaf30 42 D0613 11:13:12.399558 14720 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.400668 14720 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.400718 14720 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.400747 14720 task_signals.go:204] [ 574: 575] Signal 574, PID: 575, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.400775 14720 task_exit.go:204] [ 574: 575] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.401540 14720 task_exit.go:204] [ 574: 575] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.401579 14720 task_exit.go:204] [ 574: 575] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.401603 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.401868 14720 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='\xc6/(\x00') D0613 11:13:12.417811 14720 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.417876 14720 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc00c52a5a0 39 D0613 11:13:12.418012 14720 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.418761 14720 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.418789 14720 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc00c52a5a0 40 D0613 11:13:12.418804 14720 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.429980 14720 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.430049 14720 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc00c52a5a0 41 D0613 11:13:12.430067 14720 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.436920 14720 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.437039 14720 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc00c52a5a0 42 D0613 11:13:12.437061 14720 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.438375 14720 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.438529 14720 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.438577 14720 task_signals.go:204] [ 576: 577] Signal 576, PID: 577, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.438698 14720 task_exit.go:204] [ 576: 577] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.439191 14720 task_exit.go:204] [ 576: 577] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.439217 14720 task_exit.go:204] [ 576: 577] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.439244 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.439917 14720 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f4, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:12.449075 14720 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.449137 14720 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00b1f5dd0 39 D0613 11:13:12.449287 14720 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.450625 14720 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.450657 14720 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00b1f5dd0 40 D0613 11:13:12.450671 14720 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.461903 14720 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.461975 14720 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00b1f5dd0 41 D0613 11:13:12.461998 14720 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.469803 14720 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.469884 14720 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00b1f5dd0 42 D0613 11:13:12.469915 14720 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.471171 14720 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.471282 14720 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.471315 14720 task_signals.go:204] [ 578: 579] Signal 578, PID: 579, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.471363 14720 task_exit.go:204] [ 578: 579] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.471781 14720 task_exit.go:204] [ 578: 579] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.471815 14720 task_exit.go:204] [ 578: 579] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.471831 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.472255 14720 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff7000/0x9000)=nil, 0x9000, &(0x7f0000000000)='&\',,(%\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f00003fe000/0xc00000)=nil, 0xc00000, &(0x7f00000001c0)='/sys/kernel/debug/sync/info\x00') D0613 11:13:12.481847 14720 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.481901 14720 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc00c52a630 39 D0613 11:13:12.482008 14720 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.482456 14720 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.482484 14720 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc00c52a630 40 D0613 11:13:12.482494 14720 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.492721 14720 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.492795 14720 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc00c52a630 41 D0613 11:13:12.492819 14720 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.501262 14720 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.501329 14720 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc00c52a630 42 D0613 11:13:12.501352 14720 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.502643 14720 task_exit.go:204] [ 580: 580] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.502713 14720 task_exit.go:204] [ 580: 580] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.502751 14720 task_signals.go:204] [ 580: 581] Signal 580, PID: 581, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.502782 14720 task_exit.go:204] [ 580: 581] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.503296 14720 task_exit.go:204] [ 580: 581] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.503334 14720 task_exit.go:204] [ 580: 581] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.503365 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.503608 14720 task_exit.go:204] [ 580: 580] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x0, 0x0, 0x0) D0613 11:13:12.516364 14720 usertrap_amd64.go:212] [ 582: 582] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.516426 14720 usertrap_amd64.go:122] [ 582: 582] Allocate a new trap: 0xc00b1f5fb0 39 D0613 11:13:12.516580 14720 usertrap_amd64.go:225] [ 582: 582] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.517950 14720 usertrap_amd64.go:212] [ 582: 582] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.517988 14720 usertrap_amd64.go:122] [ 582: 582] Allocate a new trap: 0xc00b1f5fb0 40 D0613 11:13:12.518005 14720 usertrap_amd64.go:225] [ 582: 582] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.526906 14720 usertrap_amd64.go:212] [ 582: 582] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.526970 14720 usertrap_amd64.go:122] [ 582: 582] Allocate a new trap: 0xc00b1f5fb0 41 D0613 11:13:12.526988 14720 usertrap_amd64.go:225] [ 582: 582] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.534027 14720 usertrap_amd64.go:212] [ 582: 582] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.534070 14720 usertrap_amd64.go:122] [ 582: 582] Allocate a new trap: 0xc00b1f5fb0 42 D0613 11:13:12.534085 14720 usertrap_amd64.go:225] [ 582: 582] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.535085 14720 task_exit.go:204] [ 582: 582] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.535178 14720 task_exit.go:204] [ 582: 582] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.535220 14720 task_signals.go:204] [ 582: 583] Signal 582, PID: 583, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.535277 14720 task_exit.go:204] [ 582: 583] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.535824 14720 task_exit.go:204] [ 582: 583] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.535875 14720 task_exit.go:204] [ 582: 583] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.535899 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.536844 14720 task_exit.go:204] [ 582: 582] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) D0613 11:13:12.557273 14720 usertrap_amd64.go:212] [ 584: 584] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.557345 14720 usertrap_amd64.go:122] [ 584: 584] Allocate a new trap: 0xc00c52a8a0 39 D0613 11:13:12.557537 14720 usertrap_amd64.go:225] [ 584: 584] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.559100 14720 usertrap_amd64.go:212] [ 584: 584] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.559141 14720 usertrap_amd64.go:122] [ 584: 584] Allocate a new trap: 0xc00c52a8a0 40 D0613 11:13:12.559161 14720 usertrap_amd64.go:225] [ 584: 584] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.569619 14720 usertrap_amd64.go:212] [ 584: 584] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.569700 14720 usertrap_amd64.go:122] [ 584: 584] Allocate a new trap: 0xc00c52a8a0 41 D0613 11:13:12.569724 14720 usertrap_amd64.go:225] [ 584: 584] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.575234 14720 usertrap_amd64.go:212] [ 584: 584] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.575307 14720 usertrap_amd64.go:122] [ 584: 584] Allocate a new trap: 0xc00c52a8a0 42 D0613 11:13:12.575334 14720 usertrap_amd64.go:225] [ 584: 584] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.577539 14720 task_exit.go:204] [ 584: 584] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.577644 14720 task_exit.go:204] [ 584: 584] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.577714 14720 task_signals.go:204] [ 584: 585] Signal 584, PID: 585, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.577790 14720 task_exit.go:204] [ 584: 585] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.578242 14720 task_exit.go:204] [ 584: 585] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.578287 14720 task_exit.go:204] [ 584: 585] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.578311 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.578458 14720 task_exit.go:204] [ 584: 584] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) D0613 11:13:12.589323 14720 usertrap_amd64.go:212] [ 586: 586] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.589382 14720 usertrap_amd64.go:122] [ 586: 586] Allocate a new trap: 0xc00da30240 39 D0613 11:13:12.589549 14720 usertrap_amd64.go:225] [ 586: 586] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.592356 14720 usertrap_amd64.go:212] [ 586: 586] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.592422 14720 usertrap_amd64.go:122] [ 586: 586] Allocate a new trap: 0xc00da30240 40 D0613 11:13:12.592443 14720 usertrap_amd64.go:225] [ 586: 586] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.602787 14720 usertrap_amd64.go:212] [ 586: 586] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.602994 14720 usertrap_amd64.go:122] [ 586: 586] Allocate a new trap: 0xc00da30240 41 D0613 11:13:12.603050 14720 usertrap_amd64.go:225] [ 586: 586] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.609651 14720 usertrap_amd64.go:212] [ 586: 586] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.609718 14720 usertrap_amd64.go:122] [ 586: 586] Allocate a new trap: 0xc00da30240 42 D0613 11:13:12.609740 14720 usertrap_amd64.go:225] [ 586: 586] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.610556 14720 task_exit.go:204] [ 586: 586] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.610612 14720 task_exit.go:204] [ 586: 586] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.610644 14720 task_signals.go:204] [ 586: 587] Signal 586, PID: 587, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.610665 14720 task_exit.go:204] [ 586: 587] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.611175 14720 task_exit.go:204] [ 586: 587] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.611282 14720 task_exit.go:204] [ 586: 587] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.611302 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.612096 14720 task_exit.go:204] [ 586: 586] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000f80)=[{{&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000f40)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) D0613 11:13:12.628363 14720 usertrap_amd64.go:212] [ 588: 588] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.628412 14720 usertrap_amd64.go:122] [ 588: 588] Allocate a new trap: 0xc00cfdb200 39 D0613 11:13:12.628517 14720 usertrap_amd64.go:225] [ 588: 588] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.629938 14720 usertrap_amd64.go:212] [ 588: 588] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.629968 14720 usertrap_amd64.go:122] [ 588: 588] Allocate a new trap: 0xc00cfdb200 40 D0613 11:13:12.629989 14720 usertrap_amd64.go:225] [ 588: 588] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.640219 14720 usertrap_amd64.go:212] [ 588: 588] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.640264 14720 usertrap_amd64.go:122] [ 588: 588] Allocate a new trap: 0xc00cfdb200 41 D0613 11:13:12.640284 14720 usertrap_amd64.go:225] [ 588: 588] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.649220 14720 usertrap_amd64.go:212] [ 588: 588] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.649301 14720 usertrap_amd64.go:122] [ 588: 588] Allocate a new trap: 0xc00cfdb200 42 D0613 11:13:12.649330 14720 usertrap_amd64.go:225] [ 588: 588] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.654032 14720 task_exit.go:204] [ 588: 588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.654128 14720 task_exit.go:204] [ 588: 588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.654165 14720 task_signals.go:204] [ 588: 589] Signal 588, PID: 589, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.654218 14720 task_exit.go:204] [ 588: 589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.654745 14720 task_exit.go:204] [ 588: 589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.654786 14720 task_exit.go:204] [ 588: 589] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.654809 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.655794 14720 task_exit.go:204] [ 588: 588] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89fb, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) D0613 11:13:12.665550 14720 usertrap_amd64.go:212] [ 590: 590] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.665606 14720 usertrap_amd64.go:122] [ 590: 590] Allocate a new trap: 0xc00c52abd0 39 D0613 11:13:12.665722 14720 usertrap_amd64.go:225] [ 590: 590] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.666840 14720 usertrap_amd64.go:212] [ 590: 590] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.666884 14720 usertrap_amd64.go:122] [ 590: 590] Allocate a new trap: 0xc00c52abd0 40 D0613 11:13:12.666902 14720 usertrap_amd64.go:225] [ 590: 590] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.675661 14720 usertrap_amd64.go:212] [ 590: 590] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.675713 14720 usertrap_amd64.go:122] [ 590: 590] Allocate a new trap: 0xc00c52abd0 41 D0613 11:13:12.675730 14720 usertrap_amd64.go:225] [ 590: 590] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.683376 14720 usertrap_amd64.go:212] [ 590: 590] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.683452 14720 usertrap_amd64.go:122] [ 590: 590] Allocate a new trap: 0xc00c52abd0 42 D0613 11:13:12.683477 14720 usertrap_amd64.go:225] [ 590: 590] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.685444 14720 task_exit.go:204] [ 590: 590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.685560 14720 task_exit.go:204] [ 590: 590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.685645 14720 task_signals.go:204] [ 590: 591] Signal 590, PID: 591, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.685724 14720 task_exit.go:204] [ 590: 591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.687141 14720 task_exit.go:204] [ 590: 591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.687260 14720 task_exit.go:204] [ 590: 591] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.687284 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.687496 14720 task_exit.go:204] [ 590: 590] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/219) D0613 11:13:12.697215 14720 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.697277 14720 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc003fa4750 39 D0613 11:13:12.697374 14720 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.698256 14720 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.698278 14720 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc003fa4750 40 D0613 11:13:12.698293 14720 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.704242 14720 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.704380 14720 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc003fa4750 41 D0613 11:13:12.704404 14720 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.710234 14720 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.710290 14720 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc003fa4750 42 D0613 11:13:12.710308 14720 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.711574 14720 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.711654 14720 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.711695 14720 task_signals.go:204] [ 592: 593] Signal 592, PID: 593, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.711740 14720 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.712207 14720 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.712245 14720 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.712260 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.713055 14720 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)=ANY=[]}) D0613 11:13:12.730165 14720 usertrap_amd64.go:212] [ 594: 594] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.730224 14720 usertrap_amd64.go:122] [ 594: 594] Allocate a new trap: 0xc00da30540 39 D0613 11:13:12.730332 14720 usertrap_amd64.go:225] [ 594: 594] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.730944 14720 usertrap_amd64.go:212] [ 594: 594] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.730985 14720 usertrap_amd64.go:122] [ 594: 594] Allocate a new trap: 0xc00da30540 40 D0613 11:13:12.730998 14720 usertrap_amd64.go:225] [ 594: 594] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.736445 14720 usertrap_amd64.go:212] [ 594: 594] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.736483 14720 usertrap_amd64.go:122] [ 594: 594] Allocate a new trap: 0xc00da30540 41 D0613 11:13:12.736501 14720 usertrap_amd64.go:225] [ 594: 594] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.742848 14720 usertrap_amd64.go:212] [ 594: 594] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.742900 14720 usertrap_amd64.go:122] [ 594: 594] Allocate a new trap: 0xc00da30540 42 D0613 11:13:12.742922 14720 usertrap_amd64.go:225] [ 594: 594] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.743907 14720 task_exit.go:204] [ 594: 594] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.743969 14720 task_exit.go:204] [ 594: 594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.744003 14720 task_signals.go:204] [ 594: 595] Signal 594, PID: 595, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.744025 14720 task_exit.go:204] [ 594: 595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.744435 14720 task_exit.go:204] [ 594: 595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.744460 14720 task_exit.go:204] [ 594: 595] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.744485 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.744674 14720 task_exit.go:204] [ 594: 594] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: prctl$PR_SET_VMA(0x38, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:12.753728 14720 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.753770 14720 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc00c52ac00 39 D0613 11:13:12.753931 14720 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.755703 14720 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.755785 14720 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc00c52ac00 40 D0613 11:13:12.755811 14720 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.763289 14720 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.763341 14720 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc00c52ac00 41 D0613 11:13:12.763359 14720 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.768688 14720 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.768760 14720 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc00c52ac00 42 D0613 11:13:12.768785 14720 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.770981 14720 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.771066 14720 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.771128 14720 task_signals.go:204] [ 596: 597] Signal 596, PID: 597, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.771206 14720 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.771842 14720 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.771978 14720 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.772003 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.772258 14720 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote}}}}) D0613 11:13:12.784008 14720 usertrap_amd64.go:212] [ 598: 598] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.784068 14720 usertrap_amd64.go:122] [ 598: 598] Allocate a new trap: 0xc01e2787e0 39 D0613 11:13:12.784277 14720 usertrap_amd64.go:225] [ 598: 598] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.786103 14720 usertrap_amd64.go:212] [ 598: 598] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.786169 14720 usertrap_amd64.go:122] [ 598: 598] Allocate a new trap: 0xc01e2787e0 40 D0613 11:13:12.786197 14720 usertrap_amd64.go:225] [ 598: 598] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.797274 14720 usertrap_amd64.go:212] [ 598: 598] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.797335 14720 usertrap_amd64.go:122] [ 598: 598] Allocate a new trap: 0xc01e2787e0 41 D0613 11:13:12.797358 14720 usertrap_amd64.go:225] [ 598: 598] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.808567 14720 usertrap_amd64.go:212] [ 598: 598] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.808645 14720 usertrap_amd64.go:122] [ 598: 598] Allocate a new trap: 0xc01e2787e0 42 D0613 11:13:12.808679 14720 usertrap_amd64.go:225] [ 598: 598] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.811882 14720 task_exit.go:204] [ 598: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.812026 14720 task_exit.go:204] [ 598: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.812073 14720 task_signals.go:204] [ 598: 599] Signal 598, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.812115 14720 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.812615 14720 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.812651 14720 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.812677 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.813472 14720 task_exit.go:204] [ 598: 598] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89ff, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}}}}) D0613 11:13:12.851897 14720 usertrap_amd64.go:212] [ 600: 600] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.851968 14720 usertrap_amd64.go:122] [ 600: 600] Allocate a new trap: 0xc00da30720 39 D0613 11:13:12.852398 14720 usertrap_amd64.go:225] [ 600: 600] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.853861 14720 usertrap_amd64.go:212] [ 600: 600] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.853947 14720 usertrap_amd64.go:122] [ 600: 600] Allocate a new trap: 0xc00da30720 40 D0613 11:13:12.853977 14720 usertrap_amd64.go:225] [ 600: 600] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.869593 14720 usertrap_amd64.go:212] [ 600: 600] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.869639 14720 usertrap_amd64.go:122] [ 600: 600] Allocate a new trap: 0xc00da30720 41 D0613 11:13:12.869662 14720 usertrap_amd64.go:225] [ 600: 600] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.876132 14720 usertrap_amd64.go:212] [ 600: 600] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.876179 14720 usertrap_amd64.go:122] [ 600: 600] Allocate a new trap: 0xc00da30720 42 D0613 11:13:12.876198 14720 usertrap_amd64.go:225] [ 600: 600] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.877513 14720 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.877637 14720 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.877697 14720 task_signals.go:204] [ 600: 601] Signal 600, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.877729 14720 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.878105 14720 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.878153 14720 task_exit.go:204] [ 600: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.878171 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.879245 14720 task_exit.go:204] [ 600: 600] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:12.889557 14720 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.889631 14720 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc00cfdb710 39 D0613 11:13:12.889724 14720 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.890791 14720 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.890824 14720 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc00cfdb710 40 D0613 11:13:12.890842 14720 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.896648 14720 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.896691 14720 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc00cfdb710 41 D0613 11:13:12.896710 14720 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.901668 14720 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.901789 14720 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc00cfdb710 42 D0613 11:13:12.901837 14720 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.902542 14720 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.902587 14720 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.902619 14720 task_signals.go:204] [ 602: 603] Signal 602, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.902639 14720 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.903079 14720 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.903126 14720 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.903150 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.903233 14720 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, &(0x7f0000000080)="62855e24afea7bb2f3c43b950800", 0xe, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0xfdf3) D0613 11:13:12.917596 14720 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.917661 14720 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc003fa47e0 39 D0613 11:13:12.917865 14720 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.918725 14720 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.918763 14720 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc003fa47e0 40 D0613 11:13:12.918778 14720 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.926062 14720 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.926140 14720 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc003fa47e0 41 D0613 11:13:12.926169 14720 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.933589 14720 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.933663 14720 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc003fa47e0 42 D0613 11:13:12.933691 14720 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.936807 14720 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.936907 14720 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.936989 14720 task_signals.go:204] [ 604: 605] Signal 604, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.937064 14720 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.937889 14720 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.937998 14720 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.938054 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.939108 14720 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: prctl$PR_SET_VMA(0x33, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:12.952258 14720 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.952327 14720 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc004416de0 39 D0613 11:13:12.952459 14720 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.953425 14720 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.953465 14720 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc004416de0 40 D0613 11:13:12.953486 14720 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.960919 14720 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.961005 14720 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc004416de0 41 D0613 11:13:12.961024 14720 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:12.966501 14720 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:12.966563 14720 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc004416de0 42 D0613 11:13:12.966586 14720 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:12.967848 14720 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.967924 14720 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.967998 14720 task_signals.go:204] [ 606: 607] Signal 606, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:12.968033 14720 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:12.968609 14720 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:12.968712 14720 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:12.968735 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:12.969575 14720 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:12.983746 14720 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:12.983802 14720 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc003fa48a0 39 D0613 11:13:12.983886 14720 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:12.984576 14720 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:12.984618 14720 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc003fa48a0 40 D0613 11:13:12.984633 14720 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:12.993894 14720 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:12.993947 14720 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc003fa48a0 41 D0613 11:13:12.993967 14720 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.002268 14720 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.002348 14720 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc003fa48a0 42 D0613 11:13:13.002372 14720 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.004336 14720 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.004408 14720 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.004482 14720 task_signals.go:204] [ 608: 609] Signal 608, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.004567 14720 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.005190 14720 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.005274 14720 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.005296 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.006431 14720 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb000, 0xbd06439a48743944, &(0x7f0000ff3000/0xb000)=nil) D0613 11:13:13.017284 14720 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.017357 14720 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc0044171d0 39 D0613 11:13:13.017503 14720 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.018394 14720 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.018437 14720 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc0044171d0 40 D0613 11:13:13.018454 14720 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.026276 14720 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.026327 14720 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc0044171d0 41 D0613 11:13:13.026347 14720 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.031605 14720 usertrap_amd64.go:212] [ 610: 610] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.031670 14720 usertrap_amd64.go:122] [ 610: 610] Allocate a new trap: 0xc0044171d0 42 D0613 11:13:13.031696 14720 usertrap_amd64.go:225] [ 610: 610] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.033427 14720 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.033502 14720 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.033542 14720 task_signals.go:204] [ 610: 611] Signal 610, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.033563 14720 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.034040 14720 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.034066 14720 task_exit.go:204] [ 610: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.034083 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.034302 14720 task_exit.go:204] [ 610: 610] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}}}}) D0613 11:13:13.050965 14720 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.051048 14720 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00d206600 39 D0613 11:13:13.051164 14720 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.052256 14720 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.052290 14720 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00d206600 40 D0613 11:13:13.052312 14720 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.064144 14720 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.064205 14720 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00d206600 41 D0613 11:13:13.064226 14720 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.072993 14720 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.073077 14720 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00d206600 42 D0613 11:13:13.073106 14720 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.074584 14720 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.074657 14720 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.074706 14720 task_signals.go:204] [ 612: 613] Signal 612, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.074803 14720 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.075469 14720 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.075520 14720 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.075557 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.076459 14720 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: prctl$PR_SET_VMA(0x22, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:13.085769 14720 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.085816 14720 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc00c52ac90 39 D0613 11:13:13.086093 14720 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.087303 14720 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.087344 14720 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc00c52ac90 40 D0613 11:13:13.087359 14720 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.095981 14720 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.096031 14720 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc00c52ac90 41 D0613 11:13:13.096049 14720 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.101842 14720 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.102039 14720 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc00c52ac90 42 D0613 11:13:13.102094 14720 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.103870 14720 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.103944 14720 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.103986 14720 task_signals.go:204] [ 614: 615] Signal 614, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.104018 14720 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.104422 14720 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.104455 14720 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.104476 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.105976 14720 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000080)='\x81L\xdf_\xe1\xe3\x06ld{}\x8c\xef\xe0c\xd2\x88GDr\xf6\xc8\x11\xafWw\xe0\xa1\x15{\xcf\x17\x06\"\xed\xc5~\x11\xf7\x81x\xb6\x05\x1d\xf4m%\x84\xab\xa3\xe4\xf8yk\xa0X\xea\x9a \xa3\xec\xda\xa8\x8cq\xf1:\xe1H\x10\xb1\x9f^\x9aT\xd1\xf8X{M\x17\xc9\xe7\x0e\xe0_g\xfa\xb2\x89\xd0\x89l\xb2\v\xbd\xcb4D\xbd\xee\xe4\x98p\b\b\x92\xb2\x02Pv\xb2\xdd\xf5\xc9}\xf5\x15n\xc7\x8e\x8f\xf7\xbe\x7f\xd9\xdf\xbc\xed~\xe9p\xf0c\xc6Y\x9d-\xcf\x00\xf7E\xe2\'\xf2\f\a\xa9*\x04\x9dGa\xc7pB\xa6] \x92\x88\xec\xe6\xe9d\'\n\xc1)\a\xafea\xc1}\xa5\xd1\xef7\xf5\x81\x8a\xdf\xfc\x00#m\xc9ovx\xdf\xc6 \"\xe3y\x8e\x1bx\xab\xd9\xf9\n\x91\xa5\x84\xb5\xd2\x7fW\xd6e\xf0T\xe2?\xde\xe7\xa6\xe9\xc2\n\x80\xff\x99\xb9=.\xc8\xa6\xa9Dt\x03\x06C2\xb8\x12\xa7M%+\xe0\xdc\x86\xee\xe718\x85\xf2\xa0\x1d\xe3\xec4\xa1\x14K\x15\xf8\x064\xdf6c\xf1\xbb5\xf4&\x04~\x16C\x06\x7f\xb1I2\xd1\xe4\\\x96\nyp9\x93\\\xea\xd5\xb9o\x87\xb4\xcfyL\x8d\x7f\v<~B^\x16;\x00') D0613 11:13:13.114960 14720 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.115016 14720 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc00c52ad50 39 D0613 11:13:13.115151 14720 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.117304 14720 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.117334 14720 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc00c52ad50 40 D0613 11:13:13.117352 14720 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.124202 14720 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.124266 14720 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc00c52ad50 41 D0613 11:13:13.124287 14720 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.129976 14720 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.130013 14720 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc00c52ad50 42 D0613 11:13:13.130031 14720 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.131046 14720 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.131161 14720 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.131220 14720 task_signals.go:204] [ 616: 617] Signal 616, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.131278 14720 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.132155 14720 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.132232 14720 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.132254 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.132743 14720 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: syz_clone(0x0, &(0x7f0000002bc0), 0x0, 0x0, 0x0, &(0x7f0000002c80)='K') D0613 11:13:13.154040 14720 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.154102 14720 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc01e278ba0 39 D0613 11:13:13.154220 14720 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.154890 14720 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.154924 14720 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc01e278ba0 40 D0613 11:13:13.154935 14720 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.162524 14720 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.162593 14720 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc01e278ba0 41 D0613 11:13:13.162618 14720 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.169507 14720 task_run.go:312] [ 620: 620] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0613 11:13:13.169576 14720 task_log.go:87] [ 620: 620] Registers: D0613 11:13:13.169604 14720 task_log.go:94] [ 620: 620] Cs = 0000000000000033 D0613 11:13:13.169615 14720 task_log.go:94] [ 620: 620] Ds = 0000000000000000 D0613 11:13:13.169636 14720 task_log.go:94] [ 620: 620] Eflags = 0000000000010217 D0613 11:13:13.169643 14720 task_log.go:94] [ 620: 620] Es = 0000000000000000 D0613 11:13:13.169650 14720 task_log.go:94] [ 620: 620] Fs = 0000000000000000 D0613 11:13:13.169656 14720 task_log.go:94] [ 620: 620] Fs_base = 00007eddfda49700 D0613 11:13:13.169662 14720 task_log.go:94] [ 620: 620] Gs = 0000000000000000 D0613 11:13:13.169668 14720 task_log.go:94] [ 620: 620] Gs_base = 0000000000000000 D0613 11:13:13.169675 14720 task_log.go:94] [ 620: 620] Orig_rax = ffffffffffffffff D0613 11:13:13.169681 14720 task_log.go:94] [ 620: 620] R10 = 0000000000000000 D0613 11:13:13.169696 14720 task_log.go:94] [ 620: 620] R11 = 0000000000000246 D0613 11:13:13.169703 14720 task_log.go:94] [ 620: 620] R12 = 0000000000000000 D0613 11:13:13.169709 14720 task_log.go:94] [ 620: 620] R13 = 00007ec90075b35f D0613 11:13:13.169715 14720 task_log.go:94] [ 620: 620] R14 = 00007eddfda49300 D0613 11:13:13.169720 14720 task_log.go:94] [ 620: 620] R15 = 0000000000022000 D0613 11:13:13.169727 14720 task_log.go:94] [ 620: 620] R8 = 0000000020002c80 D0613 11:13:13.169734 14720 task_log.go:94] [ 620: 620] R9 = 0000000020002c80 D0613 11:13:13.169742 14720 task_log.go:94] [ 620: 620] Rax = 0000000000000000 D0613 11:13:13.169749 14720 task_log.go:94] [ 620: 620] Rbp = 000056043976dca1 D0613 11:13:13.169755 14720 task_log.go:94] [ 620: 620] Rbx = 0000560439831f80 D0613 11:13:13.169760 14720 task_log.go:94] [ 620: 620] Rcx = 0000560439712199 D0613 11:13:13.169767 14720 task_log.go:94] [ 620: 620] Rdi = 0000000000000000 D0613 11:13:13.169773 14720 task_log.go:94] [ 620: 620] Rdx = 0000000000000000 D0613 11:13:13.169784 14720 task_log.go:94] [ 620: 620] Rip = 0000000000000000 D0613 11:13:13.169790 14720 task_log.go:94] [ 620: 620] Rsi = 0000000020002bc0 D0613 11:13:13.169797 14720 task_log.go:94] [ 620: 620] Rsp = 0000000020002bc8 D0613 11:13:13.169804 14720 task_log.go:94] [ 620: 620] Ss = 000000000000002b D0613 11:13:13.169820 14720 task_log.go:111] [ 620: 620] Stack: D0613 11:13:13.169844 14720 task_log.go:128] [ 620: 620] 20002bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169855 14720 task_log.go:128] [ 620: 620] 20002bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169862 14720 task_log.go:128] [ 620: 620] 20002be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169869 14720 task_log.go:128] [ 620: 620] 20002bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169876 14720 task_log.go:128] [ 620: 620] 20002c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169883 14720 task_log.go:128] [ 620: 620] 20002c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169891 14720 task_log.go:128] [ 620: 620] 20002c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169899 14720 task_log.go:128] [ 620: 620] 20002c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169906 14720 task_log.go:128] [ 620: 620] 20002c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169913 14720 task_log.go:128] [ 620: 620] 20002c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169919 14720 task_log.go:128] [ 620: 620] 20002c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169927 14720 task_log.go:128] [ 620: 620] 20002c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169934 14720 task_log.go:128] [ 620: 620] 20002c80: 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169941 14720 task_log.go:128] [ 620: 620] 20002c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169956 14720 task_log.go:128] [ 620: 620] 20002ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169963 14720 task_log.go:128] [ 620: 620] 20002cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169970 14720 task_log.go:128] [ 620: 620] 20002cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169986 14720 task_log.go:128] [ 620: 620] 20002cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169992 14720 task_log.go:128] [ 620: 620] 20002ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.169999 14720 task_log.go:128] [ 620: 620] 20002cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170007 14720 task_log.go:128] [ 620: 620] 20002d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170022 14720 task_log.go:128] [ 620: 620] 20002d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170031 14720 task_log.go:128] [ 620: 620] 20002d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170046 14720 task_log.go:128] [ 620: 620] 20002d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170063 14720 task_log.go:128] [ 620: 620] 20002d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170071 14720 task_log.go:128] [ 620: 620] 20002d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170078 14720 task_log.go:128] [ 620: 620] 20002d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170085 14720 task_log.go:128] [ 620: 620] 20002d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170095 14720 task_log.go:128] [ 620: 620] 20002d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170103 14720 task_log.go:128] [ 620: 620] 20002d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170125 14720 task_log.go:128] [ 620: 620] 20002da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170135 14720 task_log.go:128] [ 620: 620] 20002db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170143 14720 task_log.go:128] [ 620: 620] 20002dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170156 14720 task_log.go:128] [ 620: 620] 20002dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170164 14720 task_log.go:128] [ 620: 620] 20002de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170171 14720 task_log.go:128] [ 620: 620] 20002df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170178 14720 task_log.go:128] [ 620: 620] 20002e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170185 14720 task_log.go:128] [ 620: 620] 20002e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170195 14720 task_log.go:128] [ 620: 620] 20002e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170213 14720 task_log.go:128] [ 620: 620] 20002e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170227 14720 task_log.go:128] [ 620: 620] 20002e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170234 14720 task_log.go:128] [ 620: 620] 20002e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170373 14720 task_log.go:128] [ 620: 620] 20002e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170384 14720 task_log.go:128] [ 620: 620] 20002e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170390 14720 task_log.go:128] [ 620: 620] 20002e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170397 14720 task_log.go:128] [ 620: 620] 20002e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170403 14720 task_log.go:128] [ 620: 620] 20002ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170409 14720 task_log.go:128] [ 620: 620] 20002eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170415 14720 task_log.go:128] [ 620: 620] 20002ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170421 14720 task_log.go:128] [ 620: 620] 20002ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170428 14720 task_log.go:128] [ 620: 620] 20002ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170442 14720 task_log.go:128] [ 620: 620] 20002ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170448 14720 task_log.go:128] [ 620: 620] 20002f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170454 14720 task_log.go:128] [ 620: 620] 20002f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170460 14720 task_log.go:128] [ 620: 620] 20002f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170466 14720 task_log.go:128] [ 620: 620] 20002f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170473 14720 task_log.go:128] [ 620: 620] 20002f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170479 14720 task_log.go:128] [ 620: 620] 20002f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170486 14720 task_log.go:128] [ 620: 620] 20002f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170492 14720 task_log.go:128] [ 620: 620] 20002f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170501 14720 task_log.go:128] [ 620: 620] 20002f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170508 14720 task_log.go:128] [ 620: 620] 20002f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170515 14720 task_log.go:128] [ 620: 620] 20002fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170522 14720 task_log.go:128] [ 620: 620] 20002fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0613 11:13:13.170528 14720 task_log.go:149] [ 620: 620] Code: D0613 11:13:13.170535 14720 task_log.go:170] [ 620: 620] Error reading stack at address ffffffffffffffc0: bad address D0613 11:13:13.170554 14720 task_log.go:71] [ 620: 620] Mappings: VMAs: 00062000-00067000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2e020000-1b2e420000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560439686000-5604396aa000 r--p 00000000 00:09 8 /syz-executor 5604396aa000-56043975c000 r-xp 00024000 00:09 8 /syz-executor 56043975c000-5604397af000 r--p 000d6000 00:09 8 /syz-executor 5604397af000-560439809000 r--p 00128000 00:09 8 /syz-executor 560439809000-560439812000 rw-p 00182000 00:09 8 /syz-executor 560439816000-56043a362000 rw-p 00000000 00:00 0 56043a362000-56043a384000 rw-p 00000000 00:00 0 [heap] 7ec8fff5c000-7ec90075c000 rw-p 00000000 00:00 0 [stack] 7eddfce00000-7eddfd000000 rw-s 00000000 00:00 0 [kcov:63268] 7eddfd000000-7eddfd200000 rw-s 00000000 00:00 0 [kcov:63268] 7eddfd200000-7eddfd400000 rw-s 00000000 00:00 0 [kcov:63268] 7eddfd400000-7eddfd600000 rw-s 00000000 00:00 0 [kcov:63268] 7eddfd600000-7eddfda00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eddfda29000-7eddfda2a000 ---p 00000000 00:00 0 7eddfda2a000-7eddfda4a000 rw-p 00000000 00:00 0 7eddfda4a000-7eddfda4b000 r--p 00000000 00:00 0 [vvar] 7eddfda4b000-7eddfda4d000 r-xp 00000000 00:00 0 PMAs: 00062000-00063000 r-xp 03dfa000 *pgalloc.MemoryFile 00063000-00067000 r-xp 01545000 *pgalloc.MemoryFile 20000000-20200000 r-xp 09600000 *pgalloc.MemoryFile 560439686000-5604396aa000 r--p 04752000 *pgalloc.MemoryFile 5604396c3000-5604396c4000 r-xp 03dfd000 *pgalloc.MemoryFile 5604396c4000-5604396c5000 r-xp 03e14000 *pgalloc.MemoryFile 5604396c5000-5604396c6000 r-xp 03dfb000 *pgalloc.MemoryFile 56043970f000-560439710000 r-xp 03e1d000 *pgalloc.MemoryFile 560439710000-560439711000 r-xp 03dfc000 *pgalloc.MemoryFile 560439711000-560439712000 r-xp 03e21000 *pgalloc.MemoryFile 560439712000-560439713000 r-xp 035fc000 *pgalloc.MemoryFile 560439713000-560439714000 r-xp 043e4000 *pgalloc.MemoryFile 560439736000-560439737000 r-xp 03e20000 *pgalloc.MemoryFile 560439737000-560439738000 r-xp 03e15000 *pgalloc.MemoryFile 56043974f000-560439750000 r-xp 03dfe000 *pgalloc.MemoryFile 56043975b000-56043975c000 r-xp 009ff000 *pgalloc.MemoryFile 56043975c000-5604397af000 r--p 0560a000 *pgalloc.MemoryFile 5604397af000-560439800000 r--p 05e1a000 *pgalloc.MemoryFile 560439800000-560439812000 r--p 06877000 *pgalloc.MemoryFile 560439816000-560439a00000 r--p 09800000 *pgalloc.MemoryFile 56043a200000-56043a362000 r--p 08e80000 *pgalloc.MemoryFile 56043a362000-56043a363000 r--p 0154b000 *pgalloc.MemoryFile 56043a363000-56043a384000 r--p 06cba000 *pgalloc.MemoryFile 7ec900600000-7ec900758000 r--p 06ae0000 *pgalloc.MemoryFile 7ec900758000-7ec90075a000 r--p 05bc2000 *pgalloc.MemoryFile 7ec90075a000-7ec90075c000 r--p 05cae000 *pgalloc.MemoryFile 7eddfda2a000-7eddfda4a000 r--p 06899000 *pgalloc.MemoryFile D0613 11:13:13.170858 14720 task_log.go:73] [ 620: 620] FDTable: fd:215 => name /sys/kernel/debug/kcov fd:216 => name /sys/kernel/debug/kcov fd:220 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:1 => name pipe:[2599] fd:200 => name /dev/net/tun fd:222 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:201 => name / fd:217 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:0 => name pipe:[2599] fd:2 => name pipe:[2599] D0613 11:13:13.170954 14720 task_signals.go:470] [ 620: 620] Notified of signal 11 D0613 11:13:13.170972 14720 task_signals.go:220] [ 620: 620] Signal 11: delivering to handler D0613 11:13:13.171818 14720 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.172307 14720 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.177158 14720 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.177199 14720 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc01e278ba0 42 D0613 11:13:13.177251 14720 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.178344 14720 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.178404 14720 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.178463 14720 task_signals.go:204] [ 618: 619] Signal 618, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.178499 14720 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.178990 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.179035 14720 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.179045 14720 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.179060 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.179751 14720 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.194807 14720 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.198221 14720 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.198293 14720 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc00d206720 39 D0613 11:13:13.198403 14720 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.199153 14720 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.199179 14720 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc00d206720 40 D0613 11:13:13.199191 14720 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.207237 14720 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.207316 14720 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc00d206720 41 D0613 11:13:13.207337 14720 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.214225 14720 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.214291 14720 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc00d206720 42 D0613 11:13:13.214312 14720 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.215020 14720 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.215076 14720 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.215105 14720 task_signals.go:204] [ 621: 622] Signal 621, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.215122 14720 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.215438 14720 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.215466 14720 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.215480 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.216076 14720 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000f80)=[{{&(0x7f0000000a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e80)=[{0x0}, {0x0}], 0x2, &(0x7f0000000f40)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}}], 0x1, 0x0) D0613 11:13:13.226433 14720 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.226490 14720 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00da30c30 39 D0613 11:13:13.226586 14720 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.227517 14720 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.227559 14720 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00da30c30 40 D0613 11:13:13.227576 14720 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.236995 14720 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.237048 14720 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00da30c30 41 D0613 11:13:13.237069 14720 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.244061 14720 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.244143 14720 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00da30c30 42 D0613 11:13:13.244166 14720 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.246337 14720 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.246453 14720 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.246503 14720 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.246531 14720 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.247170 14720 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.247263 14720 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.247287 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.247780 14720 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={0x0, "dd731bb5127518c77843370360f89e51eed595a119102610102d77cccd6f5b3aa0bd0a6d2e0d2e4fea4633eb8e3f309d335378c2060ab7964b23100cf6374b38"}, 0x48, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)='logon\x00') D0613 11:13:13.260053 14720 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.260112 14720 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc00c52b290 39 D0613 11:13:13.260551 14720 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.262558 14720 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.262634 14720 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc00c52b290 40 D0613 11:13:13.262663 14720 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.270399 14720 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.270542 14720 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc00c52b290 41 D0613 11:13:13.270567 14720 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.276869 14720 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.276994 14720 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc00c52b290 42 D0613 11:13:13.277028 14720 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.278224 14720 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.278304 14720 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.278340 14720 task_signals.go:204] [ 625: 626] Signal 625, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.278361 14720 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.278757 14720 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.278799 14720 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.278817 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.279993 14720 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.288608 14720 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.288675 14720 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc00d2067b0 39 D0613 11:13:13.288996 14720 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.290892 14720 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.290928 14720 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc00d2067b0 40 D0613 11:13:13.290945 14720 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.299535 14720 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.299607 14720 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc00d2067b0 41 D0613 11:13:13.299643 14720 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.307340 14720 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.307415 14720 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc00d2067b0 42 D0613 11:13:13.307450 14720 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.308797 14720 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.308869 14720 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.308910 14720 task_signals.go:204] [ 627: 628] Signal 627, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.308930 14720 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.309596 14720 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.309662 14720 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.309684 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.310801 14720 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote}}}}) D0613 11:13:13.319970 14720 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.320029 14720 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc00c52b2c0 39 D0613 11:13:13.320134 14720 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.323204 14720 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.323240 14720 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc00c52b2c0 40 D0613 11:13:13.323257 14720 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.334178 14720 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.334220 14720 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc00c52b2c0 41 D0613 11:13:13.334239 14720 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.344627 14720 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.344714 14720 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc00c52b2c0 42 D0613 11:13:13.344740 14720 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.349904 14720 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.350016 14720 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.350075 14720 task_signals.go:204] [ 629: 630] Signal 629, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.350133 14720 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.350639 14720 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.350744 14720 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.350769 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.351983 14720 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: syz_clone(0x51000a00, 0x0, 0x0, 0x0, 0x0, 0x0) D0613 11:13:13.359709 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:13:13.359858 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:13:13.359972 14720 task_signals.go:470] [ 7: 21] Notified of signal 23 D0613 11:13:13.360097 14720 task_signals.go:470] [ 7: 24] Notified of signal 23 D0613 11:13:13.360188 14720 task_signals.go:470] [ 7: 50421] Notified of signal 23 D0613 11:13:13.360237 14720 task_signals.go:470] [ 7: 2893] Notified of signal 23 D0613 11:13:13.360276 14720 task_signals.go:470] [ 7: 2894] Notified of signal 23 D0613 11:13:13.360308 14720 task_signals.go:470] [ 7: 38624] Notified of signal 23 D0613 11:13:13.360299 14720 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0613 11:13:13.360339 14720 task_signals.go:470] [ 7: 25] Notified of signal 23 D0613 11:13:13.360372 14720 task_signals.go:470] [ 7: 21089] Notified of signal 23 D0613 11:13:13.360396 14720 task_signals.go:220] [ 7: 50421] Signal 23: delivering to handler D0613 11:13:13.360399 14720 task_signals.go:179] [ 7: 21089] Restarting syscall 202: interrupted by signal 23 D0613 11:13:13.360409 14720 task_signals.go:220] [ 7: 2894] Signal 23: delivering to handler D0613 11:13:13.360426 14720 task_signals.go:220] [ 7: 21089] Signal 23: delivering to handler D0613 11:13:13.360472 14720 task_signals.go:470] [ 7: 12] Notified of signal 23 D0613 11:13:13.360505 14720 task_signals.go:220] [ 7: 2893] Signal 23: delivering to handler D0613 11:13:13.360525 14720 task_signals.go:220] [ 7: 38624] Signal 23: delivering to handler D0613 11:13:13.360538 14720 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0613 11:13:13.360576 14720 task_signals.go:470] [ 7: 21] Notified of signal 23 D0613 11:13:13.360618 14720 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0613 11:13:13.360680 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:13:13.360727 14720 task_signals.go:470] [ 7: 2893] Notified of signal 23 D0613 11:13:13.360792 14720 task_signals.go:220] [ 7: 2893] Signal 23: delivering to handler D0613 11:13:13.360840 14720 task_signals.go:220] [ 7: 24] Signal 23: delivering to handler D0613 11:13:13.360929 14720 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0613 11:13:13.361061 14720 task_signals.go:470] [ 7: 7530] Notified of signal 23 D0613 11:13:13.361089 14720 task_signals.go:179] [ 7: 7530] Restarting syscall 202: interrupted by signal 23 D0613 11:13:13.361098 14720 task_signals.go:220] [ 7: 7530] Signal 23: delivering to handler D0613 11:13:13.361161 14720 task_signals.go:470] [ 7: 24] Notified of signal 23 D0613 11:13:13.361219 14720 task_signals.go:220] [ 7: 24] Signal 23: delivering to handler D0613 11:13:13.361286 14720 task_signals.go:470] [ 7: 24] Notified of signal 23 D0613 11:13:13.361332 14720 task_signals.go:470] [ 7: 12] Notified of signal 23 D0613 11:13:13.361343 14720 task_signals.go:220] [ 7: 24] Signal 23: delivering to handler D0613 11:13:13.361376 14720 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0613 11:13:13.361424 14720 task_signals.go:470] [ 7: 12] Notified of signal 23 D0613 11:13:13.361438 14720 task_signals.go:470] [ 7: 2893] Notified of signal 23 D0613 11:13:13.361460 14720 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0613 11:13:13.361485 14720 task_signals.go:179] [ 7: 2893] Restarting syscall 202: interrupted by signal 23 D0613 11:13:13.361524 14720 task_signals.go:220] [ 7: 2893] Signal 23: delivering to handler D0613 11:13:13.361545 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:13:13.361635 14720 task_signals.go:470] [ 7: 15] Notified of signal 23 D0613 11:13:13.361686 14720 task_signals.go:179] [ 7: 15] Restarting syscall 202: interrupted by signal 23 D0613 11:13:13.361694 14720 task_signals.go:220] [ 7: 15] Signal 23: delivering to handler D0613 11:13:13.372059 14720 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.372119 14720 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00da312c0 39 D0613 11:13:13.372230 14720 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.373489 14720 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.373520 14720 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00da312c0 40 D0613 11:13:13.373533 14720 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.382772 14720 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.382891 14720 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00da312c0 41 D0613 11:13:13.382962 14720 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.388441 14720 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.388504 14720 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc00da312c0 42 D0613 11:13:13.388527 14720 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.389505 14720 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.389615 14720 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.389659 14720 task_signals.go:204] [ 631: 632] Signal 631, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.389675 14720 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.390412 14720 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.390435 14720 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.390448 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.390614 14720 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.398637 14720 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.398741 14720 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc004417e30 39 D0613 11:13:13.398896 14720 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.399896 14720 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.399922 14720 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc004417e30 40 D0613 11:13:13.399936 14720 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.411433 14720 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.411508 14720 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc004417e30 41 D0613 11:13:13.411529 14720 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.417333 14720 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.417401 14720 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc004417e30 42 D0613 11:13:13.417427 14720 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.418737 14720 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.418804 14720 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.418845 14720 task_signals.go:204] [ 633: 634] Signal 633, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.418867 14720 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.419317 14720 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.419363 14720 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.419380 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.420256 14720 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: setxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', 0x0, 0x0, 0x0, 0x0) D0613 11:13:13.432036 14720 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.432118 14720 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0176005d0 39 D0613 11:13:13.432339 14720 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.434108 14720 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.434154 14720 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0176005d0 40 D0613 11:13:13.434173 14720 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.441291 14720 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.441364 14720 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0176005d0 41 D0613 11:13:13.441384 14720 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.448576 14720 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.448651 14720 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0176005d0 42 D0613 11:13:13.448694 14720 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.450462 14720 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.450554 14720 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.450577 14720 task_signals.go:204] [ 635: 636] Signal 635, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.450647 14720 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.451397 14720 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.451682 14720 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.451741 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.451892 14720 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8924, 0xffffffffffffffff) D0613 11:13:13.464780 14720 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.464868 14720 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc00c74a090 39 D0613 11:13:13.465240 14720 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.467832 14720 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.467901 14720 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc00c74a090 40 D0613 11:13:13.467921 14720 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.477575 14720 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.477630 14720 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc00c74a090 41 D0613 11:13:13.477652 14720 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.482185 14720 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.482264 14720 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc00c74a090 42 D0613 11:13:13.482290 14720 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.483963 14720 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.484058 14720 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.484123 14720 task_signals.go:204] [ 637: 638] Signal 637, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.484192 14720 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.485889 14720 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.485965 14720 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.486001 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.486453 14720 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.501412 14720 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.501462 14720 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc01e279440 39 D0613 11:13:13.501712 14720 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.503915 14720 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.503950 14720 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc01e279440 40 D0613 11:13:13.503963 14720 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.517558 14720 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.517675 14720 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc01e279440 41 D0613 11:13:13.517700 14720 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.524605 14720 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.524702 14720 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc01e279440 42 D0613 11:13:13.524727 14720 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.526092 14720 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.526190 14720 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.526241 14720 task_signals.go:204] [ 639: 640] Signal 639, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.526280 14720 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.526976 14720 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.527074 14720 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.527095 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.528024 14720 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000080)=0x8011, 0x80, 0x2) D0613 11:13:13.544914 14720 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.545061 14720 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00da313e0 39 D0613 11:13:13.545231 14720 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.546441 14720 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.546480 14720 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00da313e0 40 D0613 11:13:13.546498 14720 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.553377 14720 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.553439 14720 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00da313e0 41 D0613 11:13:13.553458 14720 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.562719 14720 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.562766 14720 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00da313e0 42 D0613 11:13:13.562786 14720 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.564368 14720 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.564432 14720 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.564471 14720 task_signals.go:204] [ 641: 642] Signal 641, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.564492 14720 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.564885 14720 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.564928 14720 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.564985 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.565845 14720 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)='K') D0613 11:13:13.595276 14720 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.595343 14720 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00da31410 39 D0613 11:13:13.595494 14720 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.596776 14720 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.596812 14720 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00da31410 40 D0613 11:13:13.596830 14720 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.602403 14720 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.602457 14720 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00da31410 41 D0613 11:13:13.602477 14720 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.611912 14720 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 560439736eba:sysno 230 D0613 11:13:13.612072 14720 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc0176009c0 42 D0613 11:13:13.612260 14720 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 560439736eba trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.621271 14720 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.621334 14720 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00da31410 42 D0613 11:13:13.621360 14720 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.622815 14720 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.622879 14720 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.622912 14720 task_signals.go:204] [ 643: 644] Signal 643, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.622982 14720 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.623520 14720 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.623548 14720 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.623572 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.624310 14720 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xf, 0x0, &(0x7f0000000200)) D0613 11:13:13.634270 14720 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.634327 14720 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00da316b0 39 D0613 11:13:13.634407 14720 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.635373 14720 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.635474 14720 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00da316b0 40 D0613 11:13:13.635512 14720 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.643549 14720 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.643605 14720 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00da316b0 41 D0613 11:13:13.643621 14720 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.648443 14720 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.648488 14720 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00da316b0 42 D0613 11:13:13.648508 14720 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.649645 14720 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.649760 14720 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.649813 14720 task_signals.go:204] [ 646: 647] Signal 646, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.649832 14720 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.650547 14720 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.650659 14720 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.650692 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.652062 14720 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000200)) D0613 11:13:13.664002 14720 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.664060 14720 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc00d206d20 39 D0613 11:13:13.664232 14720 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.665252 14720 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.665309 14720 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc00d206d20 40 D0613 11:13:13.665327 14720 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.677522 14720 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.677616 14720 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc00d206d20 41 D0613 11:13:13.677639 14720 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.684904 14720 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.685074 14720 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc00d206d20 42 D0613 11:13:13.685106 14720 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.687428 14720 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.687521 14720 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.687564 14720 task_signals.go:204] [ 648: 649] Signal 648, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.687585 14720 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.688098 14720 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.688135 14720 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.688159 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.688276 14720 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.702475 14720 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.702542 14720 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc01e279590 39 D0613 11:13:13.702784 14720 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.706730 14720 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.706804 14720 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc01e279590 40 D0613 11:13:13.706830 14720 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.715623 14720 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.715692 14720 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc01e279590 41 D0613 11:13:13.715714 14720 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.723221 14720 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.723268 14720 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc01e279590 42 D0613 11:13:13.723298 14720 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.724791 14720 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.724853 14720 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.724893 14720 task_signals.go:204] [ 650: 651] Signal 650, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.724919 14720 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.726066 14720 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.726098 14720 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.726118 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.727133 14720 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}}, 0x0) D0613 11:13:13.739140 14720 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.739224 14720 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc00d206ed0 39 D0613 11:13:13.739404 14720 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.740857 14720 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.740931 14720 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc00d206ed0 40 D0613 11:13:13.741013 14720 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.751435 14720 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.751491 14720 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc00d206ed0 41 D0613 11:13:13.751516 14720 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.757166 14720 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.757231 14720 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc00d206ed0 42 D0613 11:13:13.757253 14720 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.758235 14720 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.758326 14720 task_signals.go:204] [ 652: 653] Signal 652, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.758369 14720 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.758444 14720 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.759037 14720 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.759072 14720 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.759089 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.759851 14720 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: prctl$PR_SET_VMA(0x17, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:13.763889 14720 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.764652 14720 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.764834 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.766683 14720 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.769468 14720 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.769543 14720 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc00c74a1e0 39 D0613 11:13:13.769780 14720 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.771399 14720 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.771447 14720 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc00c74a1e0 40 D0613 11:13:13.771468 14720 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.779641 14720 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.779724 14720 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc00c74a1e0 41 D0613 11:13:13.779751 14720 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.784545 14720 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.784605 14720 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc00c74a1e0 42 D0613 11:13:13.784633 14720 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.786229 14720 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.786351 14720 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.786412 14720 task_signals.go:204] [ 654: 655] Signal 654, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.786446 14720 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.787197 14720 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.787287 14720 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.787315 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.788424 14720 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x18, &(0x7f0000000080)="868bd77a", 0x4) D0613 11:13:13.801053 14720 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.801119 14720 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc00d207080 39 D0613 11:13:13.801209 14720 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.802638 14720 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.802710 14720 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc00d207080 40 D0613 11:13:13.802731 14720 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.813652 14720 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.813716 14720 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc00d207080 41 D0613 11:13:13.813740 14720 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.819281 14720 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.819323 14720 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc00d207080 42 D0613 11:13:13.819338 14720 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.820690 14720 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.820750 14720 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.820751 14720 task_signals.go:204] [ 656: 657] Signal 656, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.820776 14720 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.821270 14720 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.821306 14720 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.821331 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.822346 14720 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000000040)='/dev/dri/card#\x00') mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) D0613 11:13:13.834150 14720 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.834201 14720 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc00c74a570 39 D0613 11:13:13.834312 14720 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.835445 14720 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.835521 14720 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc00c74a570 40 D0613 11:13:13.835544 14720 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.842410 14720 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.842454 14720 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc00c74a570 41 D0613 11:13:13.842473 14720 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.848902 14720 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.849041 14720 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc00c74a570 42 D0613 11:13:13.849072 14720 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.850195 14720 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.850290 14720 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.850445 14720 task_signals.go:204] [ 658: 659] Signal 658, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.850483 14720 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.851287 14720 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.851390 14720 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.851420 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.851875 14720 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89fa, &(0x7f0000000080)={'erspan0\x00', 0x0}) D0613 11:13:13.862262 14720 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.862307 14720 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc00c74a720 39 D0613 11:13:13.862441 14720 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.863077 14720 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.863107 14720 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc00c74a720 40 D0613 11:13:13.863119 14720 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.871678 14720 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.871750 14720 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc00c74a720 41 D0613 11:13:13.871771 14720 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.878497 14720 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.878543 14720 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc00c74a720 42 D0613 11:13:13.878565 14720 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.880469 14720 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.880560 14720 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.880603 14720 task_signals.go:204] [ 660: 661] Signal 660, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.880642 14720 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.881364 14720 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.881468 14720 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.881498 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.881660 14720 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.895577 14720 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.895652 14720 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00c74a750 39 D0613 11:13:13.895892 14720 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.898175 14720 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.898227 14720 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00c74a750 40 D0613 11:13:13.898246 14720 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.905273 14720 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.905334 14720 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00c74a750 41 D0613 11:13:13.905357 14720 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.909972 14720 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.910017 14720 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00c74a750 42 D0613 11:13:13.910035 14720 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.911452 14720 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.911509 14720 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.911539 14720 task_signals.go:204] [ 662: 663] Signal 662, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.911556 14720 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.911949 14720 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.911989 14720 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.912006 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.912197 14720 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: prctl$PR_SET_VMA(0x2c, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) D0613 11:13:13.924552 14720 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.924639 14720 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc017c442a0 39 D0613 11:13:13.924805 14720 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.926473 14720 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.926540 14720 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc017c442a0 40 D0613 11:13:13.926565 14720 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.935590 14720 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.935658 14720 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc017c442a0 41 D0613 11:13:13.935680 14720 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) I0613 11:13:13.941680 14720 compat.go:120] Unsupported syscall prctl(0x2c,0x0,0x20ffb000,0x2000,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/prctl for more information. D0613 11:13:13.942524 14720 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.942566 14720 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc017c442a0 42 D0613 11:13:13.942586 14720 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.943995 14720 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.944058 14720 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.944105 14720 task_signals.go:204] [ 664: 665] Signal 664, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.944127 14720 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.944765 14720 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.944808 14720 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.944826 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.945508 14720 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f0000000140)={'sit0\x00', 0x0}) D0613 11:13:13.954381 14720 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.954445 14720 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc017c443f0 39 D0613 11:13:13.954608 14720 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.955731 14720 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.955775 14720 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc017c443f0 40 D0613 11:13:13.955789 14720 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.962613 14720 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.962665 14720 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc017c443f0 41 D0613 11:13:13.962686 14720 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.970461 14720 usertrap_amd64.go:212] [ 666: 666] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.970562 14720 usertrap_amd64.go:122] [ 666: 666] Allocate a new trap: 0xc017c443f0 42 D0613 11:13:13.970590 14720 usertrap_amd64.go:225] [ 666: 666] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.972100 14720 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.972182 14720 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.972272 14720 task_signals.go:204] [ 666: 667] Signal 666, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.972309 14720 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.973350 14720 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.973434 14720 task_exit.go:204] [ 666: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.973456 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.974186 14720 task_exit.go:204] [ 666: 666] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x5}, {}, {}, {}]}) D0613 11:13:13.981547 14720 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:13.981591 14720 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc00da31770 39 D0613 11:13:13.982107 14720 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:13.983386 14720 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:13.983446 14720 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc00da31770 40 D0613 11:13:13.983464 14720 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:13.992544 14720 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:13.992603 14720 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc00da31770 41 D0613 11:13:13.992625 14720 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:13.996847 14720 sys_seccomp.go:68] [ 668: 669] Invalid seccomp-bpf filter: at l3: last instruction must be a return D0613 11:13:13.997750 14720 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:13.997794 14720 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc00da31770 42 D0613 11:13:13.997814 14720 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:13.998664 14720 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.998711 14720 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.998736 14720 task_signals.go:204] [ 668: 669] Signal 668, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:13.998759 14720 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:13.999083 14720 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:13.999113 14720 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:13.999142 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:13.999522 14720 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:14 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f00000001c0)={&(0x7f0000000140), 0x8}) D0613 11:13:14.018382 14720 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:14.018467 14720 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc017c446f0 39 D0613 11:13:14.018589 14720 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:14.021126 14720 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:14.021174 14720 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc017c446f0 40 D0613 11:13:14.021196 14720 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:14.032249 14720 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:14.032304 14720 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc017c446f0 41 D0613 11:13:14.032332 14720 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:14.047370 14720 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:14.047436 14720 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc017c446f0 42 D0613 11:13:14.047459 14720 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:14.049219 14720 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.049291 14720 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.049353 14720 task_signals.go:204] [ 670: 671] Signal 670, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:14.049447 14720 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.050040 14720 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.050090 14720 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:14.050119 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:14.050396 14720 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x7ff}]}) D0613 11:13:14.057001 14720 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:14.057028 14720 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0176013b0 39 D0613 11:13:14.057128 14720 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:14.058129 14720 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:14.058150 14720 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0176013b0 40 D0613 11:13:14.058171 14720 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:14.067615 14720 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:14.067694 14720 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0176013b0 41 D0613 11:13:14.067739 14720 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:14.071441 14720 sys_seccomp.go:68] [ 672: 673] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0613 11:13:14.073089 14720 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:14.073202 14720 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0176013b0 42 D0613 11:13:14.073224 14720 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:14.074565 14720 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.074619 14720 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.074650 14720 task_signals.go:204] [ 672: 673] Signal 672, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:14.074677 14720 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.075200 14720 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.075272 14720 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:14.075294 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:14.075427 14720 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:14 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000040)='\xc6/(\x00') get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) D0613 11:13:14.087551 14720 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:14.087655 14720 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00da31830 39 D0613 11:13:14.087804 14720 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:14.089086 14720 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:14.089123 14720 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00da31830 40 D0613 11:13:14.089145 14720 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:14.105831 14720 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:14.105906 14720 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00da31830 41 D0613 11:13:14.105931 14720 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:14.116365 14720 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:14.116442 14720 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00da31830 42 D0613 11:13:14.116464 14720 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:14.118892 14720 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.118944 14720 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.118979 14720 task_signals.go:204] [ 674: 675] Signal 674, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:14.118999 14720 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.119781 14720 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.119806 14720 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:14.119821 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:14.120635 14720 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:14 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000080), 0x80, 0x8) D0613 11:13:14.138398 14720 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:14.138459 14720 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc00d2072f0 39 D0613 11:13:14.138562 14720 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:14.138974 14720 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:14.139004 14720 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc00d2072f0 40 D0613 11:13:14.139017 14720 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:14.148208 14720 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 5604397135ba:sysno 56 D0613 11:13:14.148255 14720 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc00d2072f0 41 D0613 11:13:14.148271 14720 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 5604397135ba trap addr 62cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 44 6 0]) D0613 11:13:14.153461 14720 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 5604396c4044:sysno 3 D0613 11:13:14.153536 14720 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc00d2072f0 42 D0613 11:13:14.153559 14720 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 5604396c4044 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0613 11:13:14.154326 14720 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.154401 14720 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.154458 14720 task_signals.go:204] [ 676: 677] Signal 676, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0613 11:13:14.154569 14720 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:13:14.154938 14720 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:13:14.154987 14720 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:13:14.155012 14720 task_signals.go:443] [ 63269: 63269] Discarding ignored signal 17 D0613 11:13:14.155731 14720 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitZombie to TaskExitDead 11:13:14 executing program 0: socket(0xa, 0x3, 0x3a) D0613 11:13:14.161463 14720 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 560439737530:sysno 109 D0613 11:13:14.161502 14720 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc00c74ab70 39 D0613 11:13:14.161645 14720 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 560439737530 trap addr 62c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:14.167793 14720 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 560439711ad0:sysno 266 D0613 11:13:14.167840 14720 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc00c74ab70 40 D0613 11:13:14.167861 14720 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 560439711ad0 trap addr 62c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 44 6 0]) D0613 11:13:17.158708 14720 usertrap_amd64.go:212] [ 63269: 63269] Found the pattern at ip 5604396cb3f0:sysno 62 D0613 11:13:17.158792 14720 usertrap_amd64.go:122] [ 63269: 63269] Allocate a new trap: 0xc015249920 39 D0613 11:13:17.158835 14720 usertrap_amd64.go:225] [ 63269: 63269] Apply the binary patch addr 5604396cb3f0 trap addr 62c30 ([184 62 0 0 0 15 5] -> [255 36 37 48 44 6 0]) D0613 11:13:17.159630 14720 task_signals.go:481] [ 678: 678] No task notified of signal 9 D0613 11:13:17.159896 14720 task_signals.go:458] [ 678: 678] Discarding duplicate signal 9 I0613 11:13:17.559097 14720 watchdog.go:295] Watchdog starting loop, tasks: 45, discount: 0s D0613 11:13:27.958060 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:13:27.958320 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:13:39.957670 14720 task_signals.go:470] [ 7: 26] Notified of signal 23 D0613 11:13:39.957822 14720 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0613 11:13:51.958105 14720 task_signals.go:470] [ 7: 26] Notified of signal 23 D0613 11:13:51.958253 14720 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler I0613 11:14:02.559950 14720 watchdog.go:295] Watchdog starting loop, tasks: 45, discount: 0s D0613 11:14:03.957664 14720 task_signals.go:470] [ 7: 26] Notified of signal 23 D0613 11:14:03.957840 14720 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0613 11:14:04.158631 14720 task_signals.go:470] [ 7: 12] Notified of signal 23 D0613 11:14:04.158792 14720 task_signals.go:470] [ 63268: 63268] Notified of signal 9 D0613 11:14:04.158820 14720 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0613 11:14:04.158875 14720 task_signals.go:204] [ 63268: 63268] Signal 63268, PID: 63268, TID: 0, fault addr: 0x9: terminating thread group D0613 11:14:04.158894 14720 task_exit.go:204] [ 63268: 63268] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:14:04.160356 14720 task_signals.go:470] [ 63269: 63269] Notified of signal 9 D0613 11:14:04.160424 14720 task_exit.go:204] [ 63268: 63268] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:14:04.160441 14720 task_signals.go:470] [ 7: 7] Notified of signal 17 D0613 11:14:04.160486 14720 task_signals.go:204] [ 63269: 63269] Signal 63269, PID: 63269, TID: 0, fault addr: 0x9: terminating thread group D0613 11:14:04.160511 14720 task_exit.go:204] [ 63269: 63269] Transitioning from exit state TaskExitNone to TaskExitInitiated D0613 11:14:04.160521 14720 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0613 11:14:04.160547 14720 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0613 11:14:04.160801 14720 task_exit.go:204] [ 63268: 63268] Transitioning from exit state TaskExitZombie to TaskExitDead D0613 11:14:04.161247 14720 task_exit.go:358] [ 63269: 63269] Init process terminating, killing namespace D0613 11:14:04.161333 14720 task_signals.go:458] [ 678: 678] Discarding duplicate signal 9 D0613 11:14:04.161357 14720 task_signals.go:458] [ 678: 678] Discarding duplicate signal 9 D0613 11:14:04.161377 14720 task_exit.go:204] [ 63269: 63269] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0613 11:14:04.161405 14720 task_signals.go:470] [ 1: 1] Notified of signal 17 D0613 11:14:04.161569 14720 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0613 11:14:04.161606 14720 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0613 11:14:15.957492 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:14:15.957670 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler D0613 11:14:27.958112 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:14:27.958281 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler D0613 11:14:39.957850 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:14:39.957971 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler I0613 11:14:47.560870 14720 watchdog.go:295] Watchdog starting loop, tasks: 44, discount: 0s D0613 11:14:51.957231 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:14:51.957440 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:15:03.957438 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:15:03.957581 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:15:13.788076 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:15:13.788194 14720 task_signals.go:470] [ 7: 26] Notified of signal 23 D0613 11:15:13.788216 14720 task_signals.go:470] [ 7: 38624] Notified of signal 23 D0613 11:15:13.788248 14720 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0613 11:15:13.788274 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler D0613 11:15:13.788330 14720 task_signals.go:220] [ 7: 38624] Signal 23: delivering to handler D0613 11:15:13.788487 14720 task_signals.go:470] [ 7: 24] Notified of signal 23 D0613 11:15:13.788648 14720 task_signals.go:220] [ 7: 24] Signal 23: delivering to handler D0613 11:15:13.788826 14720 task_signals.go:470] [ 7: 38624] Notified of signal 23 D0613 11:15:13.788881 14720 task_signals.go:470] [ 7: 50421] Notified of signal 23 D0613 11:15:13.788897 14720 task_signals.go:220] [ 7: 38624] Signal 23: delivering to handler D0613 11:15:13.788926 14720 task_signals.go:470] [ 7: 2894] Notified of signal 23 D0613 11:15:13.788913 14720 task_signals.go:220] [ 7: 50421] Signal 23: delivering to handler D0613 11:15:13.788977 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:15:13.789049 14720 task_signals.go:470] [ 7: 2893] Notified of signal 23 D0613 11:15:13.789082 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:15:13.789113 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:15:13.789129 14720 task_signals.go:220] [ 7: 2894] Signal 23: delivering to handler D0613 11:15:13.789145 14720 task_signals.go:470] [ 7: 15] Notified of signal 23 D0613 11:15:13.789157 14720 task_signals.go:470] [ 7: 25] Notified of signal 23 D0613 11:15:13.789183 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:15:13.789263 14720 task_signals.go:470] [ 7: 54887] Notified of signal 23 D0613 11:15:13.789324 14720 task_signals.go:220] [ 7: 2893] Signal 23: delivering to handler D0613 11:15:13.789334 14720 task_signals.go:220] [ 7: 54887] Signal 23: delivering to handler D0613 11:15:13.789373 14720 task_signals.go:470] [ 7: 21] Notified of signal 23 D0613 11:15:13.789395 14720 task_signals.go:470] [ 7: 38624] Notified of signal 23 D0613 11:15:13.789410 14720 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0613 11:15:13.789434 14720 task_signals.go:470] [ 7: 21089] Notified of signal 23 D0613 11:15:13.789449 14720 task_signals.go:470] [ 7: 3245] Notified of signal 23 D0613 11:15:13.789463 14720 task_signals.go:220] [ 7: 38624] Signal 23: delivering to handler D0613 11:15:13.789501 14720 task_signals.go:179] [ 7: 21089] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.789586 14720 task_signals.go:220] [ 7: 21089] Signal 23: delivering to handler D0613 11:15:13.789516 14720 task_signals.go:481] [ 7: 25] No task notified of signal 23 D0613 11:15:13.789686 14720 task_signals.go:179] [ 7: 3245] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.789708 14720 task_signals.go:220] [ 7: 3245] Signal 23: delivering to handler D0613 11:15:13.789743 14720 task_signals.go:470] [ 7: 4895] Notified of signal 23 D0613 11:15:13.789771 14720 task_signals.go:470] [ 7: 2894] Notified of signal 23 D0613 11:15:13.789786 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:15:13.789803 14720 task_signals.go:179] [ 7: 4895] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.789843 14720 task_signals.go:220] [ 7: 4895] Signal 23: delivering to handler D0613 11:15:13.789817 14720 task_signals.go:470] [ 7: 12] Notified of signal 23 D0613 11:15:13.789889 14720 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0613 11:15:13.789919 14720 task_signals.go:179] [ 7: 2894] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.789968 14720 task_signals.go:220] [ 7: 15] Signal 23: delivering to handler D0613 11:15:13.789969 14720 task_signals.go:220] [ 7: 2894] Signal 23: delivering to handler D0613 11:15:13.790001 14720 task_signals.go:470] [ 7: 26] Notified of signal 23 D0613 11:15:13.790022 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler D0613 11:15:13.790024 14720 task_signals.go:179] [ 7: 26] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.790065 14720 task_signals.go:470] [ 7: 7530] Notified of signal 23 D0613 11:15:13.790071 14720 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0613 11:15:13.790049 14720 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0613 11:15:13.790104 14720 task_signals.go:220] [ 7: 7530] Signal 23: delivering to handler D0613 11:15:13.790151 14720 task_signals.go:470] [ 7: 24] Notified of signal 23 D0613 11:15:13.790208 14720 task_signals.go:179] [ 7: 24] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.790229 14720 task_signals.go:220] [ 7: 24] Signal 23: delivering to handler D0613 11:15:13.790422 14720 task_signals.go:470] [ 7: 3244] Notified of signal 23 D0613 11:15:13.790451 14720 task_signals.go:470] [ 7: 7530] Notified of signal 23 D0613 11:15:13.790514 14720 task_signals.go:470] [ 7: 25] Notified of signal 23 D0613 11:15:13.790544 14720 task_signals.go:220] [ 7: 3244] Signal 23: delivering to handler D0613 11:15:13.790571 14720 task_signals.go:470] [ 7: 15] Notified of signal 23 D0613 11:15:13.790562 14720 task_signals.go:220] [ 7: 12] Signal 23: delivering to handler D0613 11:15:13.790589 14720 task_signals.go:220] [ 7: 7530] Signal 23: delivering to handler D0613 11:15:13.790601 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:15:13.790630 14720 task_signals.go:220] [ 7: 15] Signal 23: delivering to handler D0613 11:15:13.790655 14720 task_signals.go:220] [ 7: 25] Signal 23: delivering to handler D0613 11:15:13.790657 14720 task_signals.go:179] [ 7: 11] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.790669 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0613 11:15:13.790698 14720 task_signals.go:470] [ 7: 50421] Notified of signal 23 D0613 11:15:13.790719 14720 task_signals.go:470] [ 7: 7530] Notified of signal 23 D0613 11:15:13.790789 14720 task_signals.go:470] [ 7: 23] Notified of signal 23 D0613 11:15:13.790812 14720 task_signals.go:220] [ 7: 7530] Signal 23: delivering to handler D0613 11:15:13.790836 14720 task_signals.go:179] [ 7: 23] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.790841 14720 task_signals.go:220] [ 7: 23] Signal 23: delivering to handler D0613 11:15:13.791174 14720 task_signals.go:470] [ 7: 7] Notified of signal 23 D0613 11:15:13.791230 14720 task_signals.go:220] [ 7: 50421] Signal 23: delivering to handler D0613 11:15:13.791296 14720 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 23 D0613 11:15:13.791310 14720 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0613 11:15:13.793543 14720 task_signals.go:470] [ 7: 7530] Notified of signal 23 D0613 11:15:13.793751 14720 task_signals.go:220] [ 7: 7530] Signal 23: delivering to handler I0613 11:15:32.561281 14720 watchdog.go:295] Watchdog starting loop, tasks: 44, discount: 0s I0613 11:16:17.562349 14720 watchdog.go:295] Watchdog starting loop, tasks: 44, discount: 0s D0613 11:16:27.957285 14720 task_signals.go:470] [ 7: 11] Notified of signal 23 D0613 11:16:27.957437 14720 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler I0613 11:17:02.563112 14720 watchdog.go:295] Watchdog starting loop, tasks: 44, discount: 0s W0613 11:17:02.572241 14720 log.go:359] Sentry detected 1 stuck task(s): Task tid: 678 (goroutine 2148855), entered RunSys state 3m41.3s ago. Search for 'goroutine ' in the stack dump to find the offending goroutine(s): goroutine 241 [running]: gvisor.dev/gvisor/pkg/log.Stacks(0x98?) pkg/log/log.go:319 +0x8a gvisor.dev/gvisor/pkg/log.TracebackAll({0xc0007a4300, 0xb7}, {0x0, 0x0, 0x0}) pkg/log/log.go:358 +0x4e gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).doAction(0xc002e6fdb8?, 0x14b01d0?, 0x50?, 0xc002e6fdb8) pkg/sentry/watchdog/watchdog.go:366 +0x23f gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).report(0xc000224700, 0xc01252d200, 0x0?, {0x0?}) pkg/sentry/watchdog/watchdog.go:338 +0x291 gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).runTurn(0xc000224700) pkg/sentry/watchdog/watchdog.go:320 +0x598 gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).loop(0xc000224700) pkg/sentry/watchdog/watchdog.go:255 +0x3d created by gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).Start pkg/sentry/watchdog/watchdog.go:206 +0x1ef goroutine 1 [semacquire, 43 minutes]: sync.runtime_Semacquire(0xc000341310?) GOROOT/src/runtime/sema.go:62 +0x27 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x4b gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1124 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000702000) runsc/boot/loader.go:1197 +0x38 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000228840, {0xc000222100?, 0xc0002738c0?}, 0xc00019a4e0, {0xc0002738c0, 0x2, 0x1b?}) runsc/cmd/boot.go:457 +0x15e5 github.com/google/subcommands.(*Commander).Execute(0xc000224000, {0x16b8878, 0xc000210000}, {0xc0002738c0, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x3a2 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:260 +0x6c85 main.main() runsc/main.go:31 +0x17 goroutine 130 [sync.Cond.Wait, 43 minutes]: sync.runtime_notifyListWait(0xc0001bbb30, 0x0) GOROOT/src/runtime/sema.go:527 +0x14c sync.(*Cond).Wait(0xc0001bb500?) GOROOT/src/sync/cond.go:70 +0x8c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0001bb500) pkg/sentry/pgalloc/pgalloc.go:1276 +0x148 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0001bb500) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 131 [chan receive, 12 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 132 [sync.Cond.Wait]: sync.runtime_notifyListWait(0xc0001bde30, 0xa7ff) GOROOT/src/runtime/sema.go:527 +0x14c sync.(*Cond).Wait(0xc0001bd800?) GOROOT/src/sync/cond.go:70 +0x8c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0001bd800) pkg/sentry/pgalloc/pgalloc.go:1276 +0x148 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0001bd800) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 133 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x1a5 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater pkg/sentry/kernel/timekeeper.go:224 +0xed goroutine 134 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a018, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a000, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 135 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a0a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a090, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 136 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a138, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a120, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 137 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a1c8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a1b0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 138 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a258, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a240, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 139 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a2e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a2d0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 140 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a378, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a360, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 141 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a408, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a3f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 142 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a498, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a480, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 143 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a528, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a510, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 144 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a5b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a5a0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 145 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a648, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a630, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 146 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a6d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a6c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 147 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a768, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a750, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 148 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a7f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a7e0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 149 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a888, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a870, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 150 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a918, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a900, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 151 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069a9a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069a990, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 152 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069aa38, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069aa20, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 153 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069aac8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069aab0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 154 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ab58, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ab40, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 155 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069abe8, 0x1, 0xcf?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066cf96?, 0x15?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069abd0, 0x13?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 156 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ac78, 0x1, 0xe1?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066e467?, 0x18?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ac60, 0x1a?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 157 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ad08, 0x1, 0xf6?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066f712?, 0xd?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069acf0, 0x3f?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 158 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ad98, 0x1, 0xb?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000670c0e?, 0x11?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ad80, 0x13?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 159 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ae28, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ae10, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 160 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069aeb8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069aea0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 161 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069af48, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069af30, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 162 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069afd8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069afc0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 163 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b068, 0x1, 0x2f?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000662f46?, 0x9?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b050, 0xe?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 164 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b0f8, 0x1, 0x44?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000664449?, 0x15?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b0e0, 0x13?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 165 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b188, 0x1, 0x56?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066591f?, 0x18?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b170, 0x1a?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 166 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b218, 0x1, 0x6b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000666bc0?, 0xd?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b200, 0x3f?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 167 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b2a8, 0x1, 0x80?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006680b6?, 0x11?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b290, 0x13?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 168 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b338, 0x1, 0x92?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000669327?, 0x13?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b320, 0x14?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 169 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b3c8, 0x1, 0xa7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066a824?, 0xf?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b3b0, 0xe?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 170 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b458, 0x1, 0xba?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00066ba9d?, 0x9?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b440, 0xe?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 171 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b4e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b4d0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 172 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b578, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x1?, 0xee?, 0x44?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b560, 0x8?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 173 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b608, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x8?, 0x5?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b5f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 174 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b698, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xb?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b680, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 175 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b728, 0x1, 0xe0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00065e06e?, 0xd?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b710, 0x3f?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 176 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b7b8, 0x1, 0xf5?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00065f565?, 0x11?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b7a0, 0x13?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 177 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b848, 0x1, 0x7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006607d1?, 0x13?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b830, 0x14?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 178 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b8d8, 0x1, 0x1c?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000661ccc?, 0xf?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b8c0, 0xe?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 179 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b968, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x7?, 0xe6?, 0x99?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b950, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 180 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069b9f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x43?, 0x57?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069b9e0, 0x8?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 181 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ba88, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ba70, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 182 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bb18, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bb00, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 183 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bba8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bb90, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 184 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bc38, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bc20, 0x5?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 185 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bcc8, 0x1, 0xcd?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bcb0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 186 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bd58, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bd40, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 187 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bde8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x43?, 0x57?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bdd0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 188 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069be78, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x2?, 0x23?, 0xcd?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069be60, 0x6?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 189 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bf08, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bef0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 190 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069bf98, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x3?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069bf80, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 191 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c028, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c010, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 192 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c0b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0xbe?, 0x22?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c0a0, 0x7?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 193 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c148, 0x1, 0xcd?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c130, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 194 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c1d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c1c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 195 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c268, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xb?, 0x53?, 0x5c?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c250, 0xb?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 196 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c2f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xf?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c2e0, 0x5?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 197 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c388, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c370, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 198 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c418, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c400, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 199 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c4a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xb?, 0x23?, 0xcd?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c490, 0xb?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 200 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c538, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0xe6?, 0x99?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c520, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 201 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c5c8, 0x1, 0x5c?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c5b0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 202 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c658, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c640, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 203 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c6e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x6?, 0xbe?, 0x22?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c6d0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 204 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c778, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c760, 0x7?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 205 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c808, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xb?, 0x2?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c7f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 206 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c898, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c880, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 207 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c928, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x2?, 0x23?, 0xcd?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c910, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 208 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069c9b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069c9a0, 0x6?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 209 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ca48, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x17?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ca30, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 210 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cad8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cac0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 211 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cb68, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x6?, 0xbe?, 0x22?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cb50, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 212 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cbf8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x1?, 0xee?, 0x44?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cbe0, 0x6?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 213 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cc88, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x3?, 0x3?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cc70, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 214 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cd18, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cd00, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 215 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cda8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cd90, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 216 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069ce38, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ce20, 0x2?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 217 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cec8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069ceb0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 218 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cf58, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cf40, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 219 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069cfe8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069cfd0, 0xc?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 220 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d078, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0xe6?, 0x99?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d060, 0x5?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 221 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d108, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d0f0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 222 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d198, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d180, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 223 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d228, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d210, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 224 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d2b8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x4?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d2a0, 0x5?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 225 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d348, 0x1, 0x5b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x1455c53?, 0xc?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d330, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 226 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d3d8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d3c0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 227 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d468, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x3?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d450, 0x3?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 228 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d4f8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xf?, 0x1e?, 0xa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d4e0, 0x1?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 229 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00069d588, 0x1, 0x57?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00069d570, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 231 [syscall, 43 minutes]: syscall.Syscall6(0x0?, 0x0?, 0xffffffffffffffff?, 0x0?, 0xb?, 0xffffffffffffffff?, 0xc000712684?) GOROOT/src/syscall/syscall_linux.go:91 +0x36 gvisor.dev/gvisor/pkg/unet.(*Socket).wait(0xc000598690, 0x0) pkg/unet/unet_unsafe.go:53 +0xf0 gvisor.dev/gvisor/pkg/unet.(*ServerSocket).Accept(0xc000012180) pkg/unet/unet.go:528 +0x158 gvisor.dev/gvisor/pkg/control/server.(*Server).serve(0xc000273460) pkg/control/server/server.go:101 +0x45 gvisor.dev/gvisor/pkg/control/server.(*Server).StartServing.func1() pkg/control/server/server.go:89 +0x2c created by gvisor.dev/gvisor/pkg/control/server.(*Server).StartServing pkg/control/server/server.go:88 +0x96 goroutine 244 [semacquire, 43 minutes]: sync.runtime_Semacquire(0x0?) GOROOT/src/runtime/sema.go:62 +0x27 sync.(*WaitGroup).Wait(0xc00051b490?) GOROOT/src/sync/waitgroup.go:116 +0x4b gvisor.dev/gvisor/pkg/sentry/kernel.(*ThreadGroup).WaitExited(...) pkg/sentry/kernel/task_run.go:388 gvisor.dev/gvisor/runsc/boot.(*Loader).wait(0xc000702000?, 0xc00072c800) runsc/boot/loader.go:1185 +0x31 gvisor.dev/gvisor/runsc/boot.(*Loader).waitContainer(0xc000702000, {0xc00019e280, 0x1b}, 0xc0001c83b0) runsc/boot/loader.go:1131 +0xd2 gvisor.dev/gvisor/runsc/boot.(*containerManager).Wait(0xc0000114d0, 0xc000142bd0, 0xc0001c83b0) runsc/boot/controller.go:542 +0xb7 reflect.Value.call({0xc00019afc0?, 0xc000012660?, 0xc00051bc20?}, {0x144d082, 0x4}, {0xc00051be70, 0x3, 0xc00051bc50?}) GOROOT/src/reflect/value.go:586 +0xb0b reflect.Value.Call({0xc00019afc0?, 0xc000012660?, 0xc000142bd0?}, {0xc00051be70?, 0xc000142bd0?, 0x16?}) GOROOT/src/reflect/value.go:370 +0xbc gvisor.dev/gvisor/pkg/urpc.(*Server).handleOne(0xc000268d70, 0xc00084c120) pkg/urpc/urpc.go:338 +0x52f gvisor.dev/gvisor/pkg/urpc.(*Server).handleRegistered(0x0?, 0x0?) pkg/urpc/urpc.go:433 +0x45 gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling.func1() pkg/urpc/urpc.go:453 +0x74 created by gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling pkg/urpc/urpc.go:451 +0x8a goroutine 103 [syscall]: syscall.Syscall6(0x5982a8?, 0x557068?, 0xc000000002?, 0xc000661a48?, 0x598569?, 0x0?, 0xc000661a48?) GOROOT/src/syscall/syscall_linux.go:91 +0x36 gvisor.dev/gvisor/pkg/fdnotifier.epollWait(0xc000831578?, {0xc000661af8?, 0x726f736900000021?, 0x6d6c5f6668616c20?}, 0x67656c5f706d6320?) pkg/fdnotifier/poll_unsafe.go:77 +0x66 gvisor.dev/gvisor/pkg/fdnotifier.(*notifier).waitAndNotify(0xc000451800) pkg/fdnotifier/fdnotifier.go:149 +0x7d created by gvisor.dev/gvisor/pkg/fdnotifier.newNotifier pkg/fdnotifier/fdnotifier.go:64 +0xc5 goroutine 104 [syscall, 43 minutes]: syscall.Syscall6(0xc0001cc020?, 0x1224260?, 0xc0001c8048?, 0x1224b60?, 0xc0001cc030?, 0xc00065eeb0?, 0x594773?) GOROOT/src/syscall/syscall_linux.go:91 +0x36 golang.org/x/sys/unix.ppoll(0x1?, 0x1?, 0x1393b40?, 0xc0004510b0?) external/org_golang_x_sys/unix/zsyscall_linux.go:124 +0x58 golang.org/x/sys/unix.Ppoll({0xc00065ef58?, 0x1b?, 0xc0001cc000?}, 0x0?, 0x0?) external/org_golang_x_sys/unix/syscall_linux.go:149 +0x45 gvisor.dev/gvisor/runsc/boot.(*Loader).startGoferMonitor.func1.1(...) runsc/boot/loader.go:1003 gvisor.dev/gvisor/runsc/specutils.RetryEintr(...) runsc/specutils/specutils.go:644 gvisor.dev/gvisor/runsc/boot.(*Loader).startGoferMonitor.func1() runsc/boot/loader.go:1001 +0x105 created by gvisor.dev/gvisor/runsc/boot.(*Loader).startGoferMonitor runsc/boot/loader.go:993 +0xaa goroutine 105 [syscall, 43 minutes]: syscall.Syscall6(0x0?, 0x0?, 0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/syscall/syscall_linux.go:91 +0x36 golang.org/x/sys/unix.ppoll(0x0?, 0x0?, 0x0?, 0x0?) external/org_golang_x_sys/unix/zsyscall_linux.go:124 +0x58 golang.org/x/sys/unix.Ppoll({0xc00083cf78?, 0x0?, 0x0?}, 0x0?, 0x0?) external/org_golang_x_sys/unix/syscall_linux.go:149 +0x45 gvisor.dev/gvisor/pkg/lisafs.(*Client).watchdog(0xc000846000) pkg/lisafs/client.go:172 +0xe6 created by gvisor.dev/gvisor/pkg/lisafs.NewClient pkg/lisafs/client.go:84 +0x1f6 goroutine 233 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0008d8280) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 63 [syscall, 43 minutes]: os/signal.signal_recv() GOROOT/src/runtime/sigqueue.go:152 +0x2f os/signal.loop() GOROOT/src/os/signal/signal_unix.go:23 +0x19 created by os/signal.Notify.func1.1 GOROOT/src/os/signal/signal.go:151 +0x2a goroutine 64 [select, 43 minutes]: reflect.rselect({0xc000688900, 0x22, 0x4169eb?}) GOROOT/src/runtime/select.go:589 +0x2ee reflect.Select({0xc0001e8000?, 0x22, 0x0?}) GOROOT/src/reflect/value.go:3052 +0x58a gvisor.dev/gvisor/pkg/sighandling.handleSignals({0xc000206200, 0x21, 0x0?}, 0xc000142770, 0x0?, 0x0?) pkg/sighandling/sighandling.go:44 +0x39b created by gvisor.dev/gvisor/pkg/sighandling.StartSignalForwarding pkg/sighandling/sighandling.go:107 +0x29b goroutine 242 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).runCPUClockTicker(0xc00025ca80) pkg/sentry/kernel/task_sched.go:359 +0x233 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).Start pkg/sentry/kernel/kernel.go:955 +0x17c goroutine 243 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000002a80, 0xc0007a21e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0001c61e0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000002a80, 0x16aa2a0?, 0x1, 0x5c2f268, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000002a80, 0x2e?, {{0x5c2f268}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000002a80, 0xca, {{0x5c2f268}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000002a80, 0xc00021c240?, {{0x5c2f268}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00017de00?, 0xd5f639?, {{0x5c2f268}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0009485b0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0008d8380?, 0xc000002a80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000002a80, 0x1) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 235 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0008d8380) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 106 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 107 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00097c000, 0xc0006b2d80, 0xc0006b2de0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc00097c000, 0x0?, 0x0?, {0x0?}) pkg/sentry/kernel/task_block.go:93 +0x7b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00097c000, 0xc00097a000?, 0xf0?, 0x394d1b7c) pkg/sentry/kernel/task_block.go:46 +0x115 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00097c000, 0xc000218b40?, 0x0, 0x5c2f620, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00097c000, 0xc00018d980?, {{0x5c2f620}, {0x80}, {0x0}, {0xc000143eb0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00097c000, 0xca, {{0x5c2f620}, {0x80}, {0x0}, {0xc000143eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00097c000, 0xc00097a0c0?, {{0x5c2f620}, {0x80}, {0x0}, {0xc000143eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00018de00?, 0xd5f639?, {{0x5c2f620}, {0x80}, {0x0}, {0xc000143eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006812b0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a8400?, 0xc00097c000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00097c000, 0x2) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 108 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8400) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 245 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001cc000, 0xc001c81020, 0xc000201ec0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc0001cc000, 0xc0001df6f8?, 0x0?, {0x10?}) pkg/sentry/kernel/task_block.go:93 +0x7b gvisor.dev/gvisor/pkg/sentry/syscalls/linux.waitEpoll(0xb442f4?, 0x1cc000?, 0x16c74f0?, 0x80, 0x39e048c0) pkg/sentry/syscalls/linux/sys_epoll.go:178 +0x4f4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollWait(0xc000134548?, 0x0?, {{0x3}, {0xc000145840}, {0x80}, {0x3cb}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_epoll.go:196 +0x66 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollPwait(0xc0001cc000?, 0x2e?, {{0x3}, {0xc000145840}, {0x80}, {0x3cb}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_epoll.go:208 +0xb3 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001cc000, 0x119, {{0x3}, {0xc000145840}, {0x80}, {0x3cb}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001cc000, 0xc00019bb60?, {{0x3}, {0xc000145840}, {0x80}, {0x3cb}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0001dfe00?, 0xd5f639?, {{0x3}, {0xc000145840}, {0x80}, {0x3cb}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0001b7450?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000224800?, 0xc0001cc000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001cc000, 0x3) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 246 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000224800) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 109 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00097ca80, 0xc0006b2f00, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc00097a180?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00097ca80, 0x16c74f0?, 0x1, 0xc000134948, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00097ca80, 0xc0006808f0?, {{0xc000134948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00097ca80, 0xca, {{0xc000134948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00097ca80, 0xc00097a240?, {{0xc000134948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000611e00?, 0xd5f639?, {{0xc000134948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000681380?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a8480?, 0xc00097ca80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00097ca80, 0x4) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 110 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8480) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 77 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001cca80, 0xc0001fe0c0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x10?, 0xc0007ad140?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0001cca80, 0xb7d285?, 0x1, 0xc000134d48, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0001cca80, 0x0?, {{0xc000134d48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001cca80, 0xca, {{0xc000134d48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001cca80, 0xc0007ad200?, {{0xc000134d48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000954e00?, 0xd5f639?, {{0xc000134d48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0004161a0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0001d0000?, 0xc0001cca80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001cca80, 0x5) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 78 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0001d0000) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 236 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000003500, 0xc0007a2720, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0001c7260?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000003500, 0x16c74f0?, 0x1, 0xc000518148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000003500, 0xc0006808f0?, {{0xc000518148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000003500, 0xca, {{0xc000518148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000003500, 0xc0001c7320?, {{0xc000518148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00095be00?, 0xd5f639?, {{0xc000518148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000948750?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0008d8400?, 0xc000003500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000003500, 0x6) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 237 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0008d8400) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 111 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8680) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 273 [chan receive, 32 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 112 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00097d500, 0xc0006b3380, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc00097a720?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00097d500, 0x16aa2a0?, 0x1, 0x1ed65e8, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00097d500, 0x2e?, {{0x1ed65e8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00097d500, 0xca, {{0x1ed65e8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00097d500, 0xc00097a7e0?, {{0x1ed65e8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0001e1e00?, 0xd5f639?, {{0x1ed65e8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000630340?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00097d500?, 0xc00097d500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00097d500, 0x7) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 247 [select, 9 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000224880) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 259 [semacquire, 43 minutes]: sync.runtime_Semacquire(0x0?) GOROOT/src/runtime/sema.go:62 +0x27 sync.(*WaitGroup).Wait(0xc00051f450?) GOROOT/src/sync/waitgroup.go:116 +0x4b gvisor.dev/gvisor/pkg/sentry/kernel.(*ThreadGroup).WaitExited(...) pkg/sentry/kernel/task_run.go:388 gvisor.dev/gvisor/runsc/boot.(*Loader).wait(0xc000702000?, 0xc00096f000) runsc/boot/loader.go:1185 +0x31 gvisor.dev/gvisor/runsc/boot.(*Loader).waitPID(0xc000702000, 0x7, {0xc00019e2c0, 0x1b}, 0xc0001c8b58) runsc/boot/loader.go:1154 +0x305 gvisor.dev/gvisor/runsc/boot.(*containerManager).WaitPID(0xc0000114d0, 0xc0000102b8, 0xc0001c8b58) runsc/boot/controller.go:559 +0xf4 reflect.Value.call({0xc00019b020?, 0xc0000126b8?, 0xc00051fc20?}, {0x144d082, 0x4}, {0xc00051fe70, 0x3, 0xc00051fc50?}) GOROOT/src/reflect/value.go:586 +0xb0b reflect.Value.Call({0xc00019b020?, 0xc0000126b8?, 0xc0000102b8?}, {0xc00051fe70?, 0xc0000102b8?, 0x16?}) GOROOT/src/reflect/value.go:370 +0xbc gvisor.dev/gvisor/pkg/urpc.(*Server).handleOne(0xc000268d70, 0xc000440360) pkg/urpc/urpc.go:338 +0x52f gvisor.dev/gvisor/pkg/urpc.(*Server).handleRegistered(0x8?, 0x144d59e?) pkg/urpc/urpc.go:433 +0x45 gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling.func1() pkg/urpc/urpc.go:453 +0x74 created by gvisor.dev/gvisor/pkg/urpc.(*Server).StartHandling pkg/urpc/urpc.go:451 +0x8a goroutine 274 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000646000, 0xc0006b34a0, 0xc0006b3500) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc000646000, 0x0?, 0x0?, {0x0?}) pkg/sentry/kernel/task_block.go:93 +0x7b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc000646000, 0xc00097a840?, 0xf0?, 0x3a3dfa9d) pkg/sentry/kernel/task_block.go:46 +0x115 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000646000, 0xc000218b40?, 0x0, 0x1ed69a0, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000646000, 0xc000753980?, {{0x1ed69a0}, {0x80}, {0x0}, {0xc000139eb0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000646000, 0xca, {{0x1ed69a0}, {0x80}, {0x0}, {0xc000139eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000646000, 0xc00097a900?, {{0x1ed69a0}, {0x80}, {0x0}, {0xc000139eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000753e00?, 0xd5f639?, {{0x1ed69a0}, {0x80}, {0x0}, {0xc000139eb0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006304e0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000646000?, 0xc000646000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000646000, 0x8) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 275 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8780) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 276 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000646a80, 0xc0006b3620, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778e0bcfd7b?, 0xc00097a9c0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000646a80, 0x16aa2a0?, 0x1, 0xc00012a548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000646a80, 0x2e?, {{0xc00012a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000646a80, 0xca, {{0xc00012a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000646a80, 0xc00097aa80?, {{0xc00012a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00060de00?, 0xd5f639?, {{0xc00012a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006305b0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a8800?, 0xc000646a80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000646a80, 0x9) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 277 [select, 25 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8800) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 278 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000647500, 0xc0006b37a0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc00097aba0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000647500, 0x16aa2a0?, 0x1, 0xc00012a948, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000647500, 0x2e?, {{0xc00012a948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000647500, 0xca, {{0xc00012a948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000647500, 0xc00097ac60?, {{0xc00012a948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00074fe00?, 0xd5f639?, {{0xc00012a948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000630680?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a8880?, 0xc000647500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000647500, 0xa) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 279 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8880) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 117 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00054a000, 0xc000548060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0004f0360?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00054a000, 0x16c74f0?, 0x1, 0xc00018e148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00054a000, 0x2e?, {{0xc00018e148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00054a000, 0xca, {{0xc00018e148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00054a000, 0xc0004f0420?, {{0xc00018e148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000751e00?, 0xd5f639?, {{0xc00018e148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0007bc270?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00054e000?, 0xc00054a000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00054a000, 0xb) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 118 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00054e000) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 119 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00054aa80, 0xc0005481e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x9de80f?, 0xc0004f04e0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00054aa80, 0x9d11e0?, 0x1, 0xc000594148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00054aa80, 0x2e?, {{0xc000594148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00054aa80, 0xca, {{0xc000594148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00054aa80, 0xc0004f05a0?, {{0xc000594148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000995e00?, 0xd5f639?, {{0xc000594148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0007bc8f0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00054e280?, 0xc00054aa80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00054aa80, 0xc) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 120 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00054e280) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 79 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0001cd500, 0xc0001fe240, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0007ad620?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0001cd500, 0x16aa2a0?, 0x1, 0xc0007ec148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0001cd500, 0x2e?, {{0xc0007ec148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0001cd500, 0xca, {{0xc0007ec148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0001cd500, 0xc0007ad6e0?, {{0xc0007ec148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000907e00?, 0xd5f639?, {{0xc0007ec148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000416270?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0001d0080?, 0xc0001cd500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0001cd500, 0xd) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 80 [select, 6 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0001d0080) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 289 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000898000, 0xc00088a0c0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc000886840?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000898000, 0x16c74f0?, 0x1, 0x1f05f80, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000898000, 0x2e?, {{0x1f05f80}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000898000, 0xca, {{0x1f05f80}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000898000, 0xc000886900?, {{0x1f05f80}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000613e00?, 0xd5f639?, {{0x1f05f80}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00089c000?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0008a0000?, 0xc000898000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000898000, 0xe) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 290 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0008a0000) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 305 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00090a000, 0xc0001fe3c0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x2027fb07e9a9a8?, 0xc0007adbc0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00090a000, 0x16aa2a0?, 0x1, 0xc0008a8148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00090a000, 0x2e?, {{0xc0008a8148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00090a000, 0xca, {{0xc0008a8148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00090a000, 0xc0007adc80?, {{0xc0008a8148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000903e00?, 0xd5f639?, {{0xc0008a8148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000416410?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00090a000?, 0xc00090a000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00090a000, 0xf) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 306 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0001d0100) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 280 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000658000, 0xc0006b3aa0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x10?, 0xc00097af60?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000658000, 0xb7d285?, 0x1, 0xc00012b148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000658000, 0x2e?, {{0xc00012b148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000658000, 0xca, {{0xc00012b148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000658000, 0xc00097b020?, {{0xc00012b148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000991e00?, 0xd5f639?, {{0xc00012b148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000630750?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a8900?, 0xc000658000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000658000, 0x10) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 281 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a8900) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 121 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00054b500, 0xc000548360, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0004f0600?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00054b500, 0x16c74f0?, 0x1, 0x1f05dd8, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00054b500, 0x0?, {{0x1f05dd8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00054b500, 0xca, {{0x1f05dd8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00054b500, 0xc0004f06c0?, {{0x1f05dd8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000955e00?, 0xd5f639?, {{0x1f05dd8}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0007bc9c0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00054e300?, 0xc00054b500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00054b500, 0x11) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 122 [select, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00054e300) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 248 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00076a000, 0xc0004fe1e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc00019bec0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00076a000, 0x16c74f0?, 0x1, 0xc0008b4148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00076a000, 0x2e?, {{0xc0008b4148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00076a000, 0xca, {{0xc0008b4148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00076a000, 0xc00019bf80?, {{0xc0008b4148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000909e00?, 0xd5f639?, {{0xc0008b4148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0001b7520?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00076a000?, 0xc00076a000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00076a000, 0x12) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 249 [select, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000224900) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 307 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00090aa80, 0xc0001fe5a0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0007adce0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00090aa80, 0x16aa2a0?, 0x1, 0xc000e08148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00090aa80, 0x2e?, {{0xc000e08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00090aa80, 0xca, {{0xc000e08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00090aa80, 0xc0007adda0?, {{0xc000e08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0009d9e00?, 0xd5f639?, {{0xc000e08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000416680?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00090aa80?, 0xc00090aa80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00090aa80, 0x13) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 308 [select, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0001d0180) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 286 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000659500, 0xc000aaa1e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778da3bbc53?, 0xc00097b8c0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000659500, 0x16aa2a0?, 0x1, 0xc0007fe948, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000659500, 0x2e?, {{0xc0007fe948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000659500, 0xca, {{0xc0007fe948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000659500, 0xc00097b980?, {{0xc0007fe948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000b1fe00?, 0xd5f639?, {{0xc0007fe948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0006312b0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0007a9800?, 0xc000659500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000659500, 0x16) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 287 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0007a9800) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 285 [chan receive, 31 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 309 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00090b500, 0xc0001feb40, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc00090b500?, 0xc00091a540?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00090b500, 0x16aa2a0?, 0x1, 0xc0007fe548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00090b500, 0x2e?, {{0xc0007fe548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00090b500, 0xca, {{0xc0007fe548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00090b500, 0xc00091a600?, {{0xc0007fe548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000b23e00?, 0xd5f639?, {{0xc0007fe548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000416750?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0001d0a80?, 0xc00090b500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00090b500, 0x15) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 310 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0001d0a80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 250 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000a34000, 0xc000a221e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc000a085a0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000a34000, 0x16aa2a0?, 0x1, 0xc0008b4548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000a34000, 0x2e?, {{0xc0008b4548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000a34000, 0xca, {{0xc0008b4548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000a34000, 0xc000776420?, {{0xc0008b4548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000ac3e00?, 0xd5f639?, {{0xc0008b4548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0007781a0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000a34000?, 0xc000a34000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000a34000, 0x17) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 251 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000224980) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 321 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000b36000, 0xc000b34060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc000b12360?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000b36000, 0x16aa2a0?, 0x1, 0xc0007fed48, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000b36000, 0x2e?, {{0xc0007fed48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000b36000, 0xca, {{0xc0007fed48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000b36000, 0xc00097b9e0?, {{0xc0007fed48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0009d7e00?, 0xd5f639?, {{0xc0007fed48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000b38000?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000b36000?, 0xc000b36000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000b36000, 0x18) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 322 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000b3c000) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 337 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc000c24000, 0xc000c20060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x9de80f?, 0xc000c22000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc000c24000, 0x9d11e0?, 0x1, 0xc0007ff148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc000c24000, 0x2e?, {{0xc0007ff148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000c24000, 0xca, {{0xc0007ff148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000c24000, 0xc000c220c0?, {{0xc0007ff148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000ac5e00?, 0xd5f639?, {{0xc0007ff148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000c26000?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000c24000?, 0xc000c24000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000c24000, 0x19) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 338 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000c12080) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 339 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0009f0000, 0xc0009ac1e0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0009b00c0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0009f0000, 0x16aa2a0?, 0x1, 0xc0007ff548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0009f0000, 0x2e?, {{0xc0007ff548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0009f0000, 0xca, {{0xc0007ff548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0009f0000, 0xc000c22240?, {{0xc0007ff548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0008dbe00?, 0xd5f639?, {{0xc0007ff548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000c260d0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000c12100?, 0xc0009f0000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0009f0000, 0x1a) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 340 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000c12100) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070043 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6778, 0x1, 0xfc?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x2b?, 0xf4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6760, 0xc01305a800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 238 [chan receive, 35 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069978 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c42e8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c42d0, 0xf717?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070022 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5ba8, 0x1, 0x9b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x87?, 0xe3?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5b90, 0xc005627680?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070052 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6c88, 0x1, 0xc7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x75?, 0x83?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6c70, 0xc006409a00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070020 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5a88, 0x1, 0x50?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xd?, 0x35?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5a70, 0xc0095b7580?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070023 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5c38, 0x1, 0x92?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x9a?, 0x9f?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5c20, 0xc003504a80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070064 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7348, 0x1, 0xee?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7330, 0xe335?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069991 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4a38, 0x1, 0xfe?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe5?, 0xa2?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4a20, 0xc001d8b680?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070029 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5f98, 0x1, 0xd?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xcc?, 0xdd?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5f80, 0xc00ddf7d80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 237404 [chan receive, 19 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23857 [chan receive, 34 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 315 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 97897 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc006d8d500, 0xc004202240, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc006d8d500?, 0xc008176000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc006d8d500, 0x16c74f0?, 0x1, 0xc002188148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc006d8d500, 0x2e?, {{0xc002188148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc006d8d500, 0xca, {{0xc002188148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc006d8d500, 0xc003e99e60?, {{0xc002188148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc002d73e00?, 0xd5f639?, {{0xc002188148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc007c65860?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc006d8d500?, 0xc006d8d500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc006d8d500, 0xcac) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070048 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6a48, 0x1, 0xf7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6a30, 0xd57d?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23882 [chan receive, 33 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 681406 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc0083ba000, 0xc0024a00c0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x2027fb07e194a2?, 0xc0067fa000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc0083ba000, 0x16aa2a0?, 0x1, 0xc0007ff948, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc0083ba000, 0x2e?, {{0xc0007ff948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc0083ba000, 0xca, {{0xc0007ff948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc0083ba000, 0xc0054ca7e0?, {{0xc0007ff948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00341fe00?, 0xd5f639?, {{0xc0007ff948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00a17af70?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc0083ba000?, 0xc0083ba000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc0083ba000, 0x5261) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 323751 [chan receive, 19 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070051 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6bf8, 0x1, 0xf?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x82?, 0xbc?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6be0, 0xc0097a9180?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070058 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6fe8, 0x1, 0xe7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x42?, 0x91?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6fd0, 0xc013b77680?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 702 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069980 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4408, 0x1, 0xe2?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x4d?, 0x91?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c43f0, 0xc00ce9f480?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 5860 [chan receive, 14 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069999 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4eb8, 0x1, 0x47?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x13?, 0xc2?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4ea0, 0xc005f67c80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 5732 [chan receive, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069997 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4d98, 0x1, 0x59?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x7a?, 0x9d?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4d80, 0xc00ad28d00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069993 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4b58, 0x1, 0x86?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x14?, 0xd4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4b40, 0xc015245780?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 97911 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc007b77500, 0xc000d5f680, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc004889260?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc007b77500, 0x16aa2a0?, 0x1, 0xc001c02148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc007b77500, 0x2e?, {{0xc001c02148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc007b77500, 0xca, {{0xc001c02148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc007b77500, 0xc004889320?, {{0xc001c02148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc002d59e00?, 0xd5f639?, {{0xc001c02148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc007740680?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc008d48d00?, 0xc007b77500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc007b77500, 0xcad) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070045 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6898, 0x1, 0xfb?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x4e?, 0x99?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6880, 0xc00b402280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070039 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6538, 0x1, 0x6?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xa4?, 0x41?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6520, 0xc00905fe80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23785 [chan receive, 36 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 1286579 [select, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc009eca080) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 23944 [chan receive, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23860 [chan receive, 41 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 5810 [chan receive, 29 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070066 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7468, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c7450?, 0x0?, 0xaa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7450, 0xc010f56f80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23820 [chan receive, 22 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24117 [chan receive, 37 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23842 [chan receive, 35 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 22907 [chan receive, 23 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070004 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5188, 0x1, 0x30?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x8a?, 0xa1?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5170, 0xc0102dcb80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 5831 [chan receive, 37 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070047 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c69b8, 0x1, 0xf8?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe5?, 0xf2?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c69a0, 0xc01402d280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070006 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c52a8, 0x1, 0x97?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x100000000000000?, 0xf8?, 0x5d?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5290, 0xc01347e280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 5767 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 5859 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 5842 [chan receive, 16 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 5832 [chan receive, 23 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 5833 [chan receive, 40 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23960 [chan receive, 18 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069977 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4258, 0x1, 0x1b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x65?, 0xc8?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4240, 0xc00913d200?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070009 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5458, 0x1, 0x95?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5440, 0xf40c?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23926 [chan receive, 25 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23828 [chan receive, 23 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 681407 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0037cf800) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070007 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5338, 0x1, 0x96?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5320, 0xf067?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070030 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6028, 0x1, 0xc?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xeb?, 0x11?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6010, 0xc005bf2200?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069981 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4498, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4480, 0xf683?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069986 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4768, 0x1, 0x8a?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x69?, 0x6b?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4750, 0xc008018280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 97898 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00275dd80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 22425 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc002875500, 0xc0009adec0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778e11bc3a1?, 0xc00256d0e0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc002875500, 0x16aa2a0?, 0x1, 0xc00ce80148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc002875500, 0x2e?, {{0xc00ce80148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc002875500, 0xca, {{0xc00ce80148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc002875500, 0xc00256d320?, {{0xc00ce80148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000905e00?, 0xd5f639?, {{0xc00ce80148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc002a9a9c0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc002875500?, 0xc002875500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc002875500, 0x37c) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 23711 [chan receive, 42 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23829 [chan receive, 12 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 83251 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc005c96980) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2069979 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4378, 0x1, 0x1a?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x29?, 0x51?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4360, 0xc00913cb80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069995 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4c78, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4c60, 0xf5c6?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 24002 [chan receive, 21 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070021 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5b18, 0x1, 0x50?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x61?, 0x64?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5b00, 0xc0095b7500?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070018 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5968, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c5950?, 0x0?, 0x95?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5950, 0xc005dcbb00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069975 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4138, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c4120?, 0x0?, 0xd1?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4120, 0xf722?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23708 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070017 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c58d8, 0x1, 0x91?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c58c0, 0xeb82?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23930 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23709 [chan receive, 31 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23927 [chan receive, 30 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070019 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c59f8, 0x1, 0x7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xea?, 0x43?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c59e0, 0xc00a786480?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070041 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6658, 0x1, 0xff?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x7a?, 0x8?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6640, 0xc007c04e00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23747 [chan receive, 33 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23782 [chan receive, 35 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 22426 [select, 15 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc000d61780) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 23905 [chan receive, 9 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070028 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5f08, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c5ef0?, 0x0?, 0x35?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5ef0, 0xc00ddf7f00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23880 [chan receive, 42 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24257 [chan receive, 39 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070010 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c54e8, 0x1, 0x95?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc014870950?, 0x0?, 0x7?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c54d0, 0xc006cc6c00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 24020 [chan receive, 43 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23980 [chan receive, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24101 [chan receive, 20 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24100 [chan receive, 42 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24073 [chan receive, 18 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24028 [chan receive, 30 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24030 [chan receive, 36 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 159462 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc009b0f500, 0xc009198060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x2027d2b49a2a78?, 0xc0087a0000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc009b0f500, 0x16aa2a0?, 0x1, 0xc002000148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc009b0f500, 0x2e?, {{0xc002000148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc009b0f500, 0xca, {{0xc002000148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc009b0f500, 0xc0096e2000?, {{0xc002000148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc002e69e00?, 0xd5f639?, {{0xc002000148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc001d336c0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc009b0f500?, 0xc009b0f500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc009b0f500, 0x14d7) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 24210 [chan receive, 6 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070032 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6148, 0x1, 0xf6?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x1d?, 0xb9?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6130, 0xc011bbe380?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070067 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c74f8, 0x1, 0xea?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x8e?, 0x17?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c74e0, 0xc009542080?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070063 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c72b8, 0x1, 0xf0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c72a0, 0xe020?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1644084 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00974d900) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070065 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c73d8, 0x1, 0xed?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x39?, 0x3d?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c73c0, 0xc00b397900?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070031 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c60b8, 0x1, 0xc?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xfe?, 0x57?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c60a0, 0xc0102dcd80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1775646 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc011a6aa80, 0xc005ba6ae0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0xc011a6aa80?, 0xc00108bc20?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc011a6aa80, 0x16c74f0?, 0x1, 0xc001d92148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc011a6aa80, 0x2e?, {{0xc001d92148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc011a6aa80, 0xca, {{0xc001d92148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc011a6aa80, 0xc009cbf1a0?, {{0xc001d92148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0037b5e00?, 0xd5f639?, {{0xc001d92148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0097b8ea0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc003d21e80?, 0xc011a6aa80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc011a6aa80, 0xd667) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 83250 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc006712000, 0xc003c40300, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x2027fb07e19682?, 0xc001294b40?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc006712000, 0x16aa2a0?, 0x1, 0xc002008148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc006712000, 0x2e?, {{0xc002008148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc006712000, 0xca, {{0xc002008148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc006712000, 0xc003d1e000?, {{0xc002008148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000df9e00?, 0xd5f639?, {{0xc002008148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc004a0a5b0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc006712000?, 0xc006712000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc006712000, 0xb4e) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 83241 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc006782a80, 0xc004ac22a0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc004d32300?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc006782a80, 0x16c74f0?, 0x1, 0xc00170a148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc006782a80, 0x2e?, {{0xc00170a148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc006782a80, 0xca, {{0xc00170a148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc006782a80, 0xc002580360?, {{0xc00170a148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0029dbe00?, 0xd5f639?, {{0xc00170a148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc006c73450?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc006782a80?, 0xc006782a80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc006782a80, 0xb4c) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 23884 [chan receive, 29 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070008 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c53c8, 0x1, 0x96?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c53b0, 0xeb4c?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23981 [chan receive, 17 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070012 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5608, 0x1, 0x94?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xfa?, 0xd0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c55f0, 0xc00a66a900?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 24082 [chan receive, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070054 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6da8, 0x1, 0xb1?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x25?, 0x36?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6d90, 0xc015037600?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070038 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c64a8, 0x1, 0x7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xbb?, 0x1b?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6490, 0xc00905fd80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 23852 [chan receive, 36 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 23853 [chan receive, 26 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24161 [chan receive, 19 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24193 [chan receive, 33 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24273 [chan receive, 21 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24305 [chan receive, 34 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24321 [chan receive, 6 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24306 [chan receive, 20 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24337 [chan receive, 24 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24353 [chan receive, 5 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 24369 [chan receive, 27 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070003 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c50f8, 0x1, 0x31?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x8?, 0x67?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c50e0, 0xc008597d00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 78024 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0004ba180) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 124069 [select, 9 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00b8a4000) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 83242 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc003d21e00) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 83184 [select, 24 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc001cc7700) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 548234 [select, 16 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00ecc4a80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 124068 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00b8a2000, 0xc00b89e060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc00b8a0000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00b8a2000, 0x16aa2a0?, 0x1, 0xc000e08548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00b8a2000, 0x2e?, {{0xc000e08548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00b8a2000, 0xca, {{0xc000e08548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00b8a2000, 0xc00b8a00c0?, {{0xc000e08548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc004011e00?, 0xd5f639?, {{0xc000e08548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00a0901a0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00b8a4000?, 0xc00b8a2000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00b8a2000, 0x131f) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070026 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5de8, 0x1, 0x83?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xa3?, 0x36?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5dd0, 0xc003504000?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 97912 [select, 16 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc008d48d00) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070015 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c57b8, 0x1, 0x92?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xb6?, 0x75?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c57a0, 0xc007dcbb00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069992 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4ac8, 0x1, 0x88?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x34?, 0x25?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4ab0, 0xc015245b80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070042 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c66e8, 0x1, 0xfd?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xd4?, 0x53?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c66d0, 0xc0035a5800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1644083 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00c9cca80, 0xc003c1fb60, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x9de80f?, 0xc000777500?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00c9cca80, 0x9d11e0?, 0x1, 0xc0003edd48, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00c9cca80, 0x2e?, {{0xc0003edd48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00c9cca80, 0xca, {{0xc0003edd48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00c9cca80, 0xc011f169c0?, {{0xc0003edd48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00162be00?, 0xd5f639?, {{0xc0003edd48}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00933ad00?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00974d900?, 0xc00c9cca80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00c9cca80, 0xc4f5) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 83183 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc005d10000, 0xc003f84060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778da3b6a73?, 0xc003d1e2a0?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc005d10000, 0x16aa2a0?, 0x1, 0xc001d2c148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc005d10000, 0x2e?, {{0xc001d2c148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc005d10000, 0xca, {{0xc001d2c148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc005d10000, 0xc003c8a8a0?, {{0xc001d2c148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc002e6be00?, 0xd5f639?, {{0xc001d2c148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc006ddc9c0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc005d10000?, 0xc005d10000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc005d10000, 0xb4f) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070016 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5848, 0x1, 0x91?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x68?, 0xbb?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5830, 0xc00a12d000?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070001 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4fd8, 0x1, 0xf2?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x38?, 0x8a?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4fc0, 0xc008fa9800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070046 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6928, 0x1, 0xfa?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x4c?, 0x7d?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6910, 0xc009e76b80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 237503 [chan receive, 27 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070040 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c65c8, 0x1, 0x5?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xbd?, 0x9e?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c65b0, 0xc00cf53680?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 159463 [select, 7 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc009e49300) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070014 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5728, 0x1, 0x92?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x7e?, 0xfa?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5710, 0xc0057a6200?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 323679 [chan receive, 33 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070013 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5698, 0x1, 0x93?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe9?, 0xf0?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5680, 0xc014e19000?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070061 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7198, 0x1, 0xf1?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xb1?, 0x51?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7180, 0xc0055b0e00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070053 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6d18, 0x1, 0x31?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x10?, 0x71?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6d00, 0xc006408d00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 53245 [chan receive, 26 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 239192 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc007060000, 0xc015584360, 0xc0063e1800) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithDeadline(0xc007060000, 0xc0016276f8?, 0x0?, {0x10?}) pkg/sentry/kernel/task_block.go:93 +0x7b gvisor.dev/gvisor/pkg/sentry/syscalls/linux.waitEpoll(0xb442f4?, 0x7060000?, 0x16c74f0?, 0x80, 0x3ad46cc0) pkg/sentry/syscalls/linux/sys_epoll.go:178 +0x4f4 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollWait(0xc002008548?, 0x0?, {{0x3}, {0xc001d8b840}, {0x80}, {0x3db}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_epoll.go:196 +0x66 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.EpollPwait(0xc007060000?, 0x2e?, {{0x3}, {0xc001d8b840}, {0x80}, {0x3db}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_epoll.go:208 +0xb3 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc007060000, 0x119, {{0x3}, {0xc001d8b840}, {0x80}, {0x3db}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc007060000, 0xc00408e000?, {{0x3}, {0xc001d8b840}, {0x80}, {0x3db}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc001627e00?, 0xd5f639?, {{0x3}, {0xc001d8b840}, {0x80}, {0x3db}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc003c93ad0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc006c8ba80?, 0xc007060000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc007060000, 0x1d6a) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 51852 [select, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc0022e7b80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070044 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6808, 0x1, 0xfb?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x72?, 0xc9?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c67f0, 0xc011bfd800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 51851 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc003ad1500, 0xc000fb46c0, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x9de80f?, 0xc003172840?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc003ad1500, 0x9d11e0?, 0x1, 0xc001700148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc003ad1500, 0x2e?, {{0xc001700148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc003ad1500, 0xca, {{0xc001700148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc003ad1500, 0xc000f87920?, {{0xc001700148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0029d7e00?, 0xd5f639?, {{0xc001700148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc003e89ee0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc003ad1500?, 0xc003ad1500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc003ad1500, 0x750) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 78023 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc005e8e000, 0xc003afe060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x0?, 0xc0001c6a80?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc005e8e000, 0x16aa2a0?, 0x1, 0xc001c08148, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc005e8e000, 0x2e?, {{0xc001c08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc005e8e000, 0xca, {{0xc001c08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc005e8e000, 0xc0001c7080?, {{0xc001c08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc003431e00?, 0xd5f639?, {{0xc001c08148}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc006dca0d0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc005e8e000?, 0xc005e8e000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc005e8e000, 0xb4d) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070050 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6b68, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c6b50?, 0x0?, 0xb1?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6b50, 0xc010723900?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070035 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c62f8, 0x1, 0xf3?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf3?, 0x7a?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c62e0, 0xc00671d900?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070005 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5218, 0x1, 0x28?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x2c?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5200, 0xc008597180?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 548233 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc004e70a80, 0xc0073a4b40, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778e11732c3?, 0xc00876ff20?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc004e70a80, 0x16aa2a0?, 0x1, 0xc00012b948, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc004e70a80, 0x2e?, {{0xc00012b948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc004e70a80, 0xca, {{0xc00012b948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc004e70a80, 0xc00876ff80?, {{0xc00012b948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00440fe00?, 0xd5f639?, {{0xc00012b948}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00a167110?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc004e70a80?, 0xc004e70a80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc004e70a80, 0x452b) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070037 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6418, 0x1, 0xf1?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x26?, 0x4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6400, 0xc000a2b980?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2148856 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00368d900) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070025 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5d58, 0x1, 0x7e?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xed?, 0xb4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5d40, 0xc0004baf00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069974 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c40a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4090, 0xf723?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070049 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6ad8, 0x1, 0xb?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x84?, 0x26?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6ac0, 0xc0102dc500?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070057 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6f58, 0x1, 0xe7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x32?, 0xe7?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6f40, 0xc00da9d080?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069983 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c45b8, 0x1, 0x8d?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf0?, 0x7a?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c45a0, 0xc008018580?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070059 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7078, 0x1, 0x7b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf9?, 0xdd?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7060, 0xc013b77280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 237463 [chan receive, 25 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069973 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4018, 0x1, 0x1d?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4000, 0xddba?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 207552 [select, 13 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc001125180) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 237507 [chan receive, 16 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 207551 [select, 11 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc00a368a80, 0xc002790300, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x202778da3aae21?, 0xc004d32000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc00a368a80, 0x16aa2a0?, 0x1, 0xc00170a548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc00a368a80, 0x2e?, {{0xc00170a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00a368a80, 0xca, {{0xc00170a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00a368a80, 0xc006c0a000?, {{0xc00170a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0034fbe00?, 0xd5f639?, {{0xc00170a548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0034836c0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc001125180?, 0xc00a368a80) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00a368a80, 0x19cf) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070011 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5578, 0x1, 0x94?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x33?, 0xa4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5560, 0xc00a66a180?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1708733 [chan receive, 6 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070068 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7588, 0x1, 0xe9?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x6c?, 0x86?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7570, 0xc009542380?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1708748 [chan receive, 12 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070002 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5068, 0x1, 0x2b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x62?, 0xe4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5050, 0xc0102ddd00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 323660 [chan receive, 24 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2148854 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc00368d880) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2069976 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c41c8, 0x1, 0x1b?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf1?, 0x9f?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c41b0, 0xc009e49a00?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069990 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c49a8, 0x1, 0x5d?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x4b?, 0x9?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4990, 0xc0129b1700?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070033 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c61d8, 0x1, 0xf5?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x24?, 0xad?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c61c0, 0xc003c0a800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1286578 [select]: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).block(0xc004e3e000, 0xc003b66060, 0x0) pkg/sentry/kernel/task_block.go:164 +0x193 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).BlockWithTimeout(0x2027fb07d759d8?, 0xc002680000?, 0xf0?, 0x0) pkg/sentry/kernel/task_block.go:41 +0x2c5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.futexWaitDuration(0xc004e3e000, 0x16aa2a0?, 0x1, 0xc00ce80548, 0x1, 0x0, 0xffffffff) pkg/sentry/syscalls/linux/sys_futex.go:97 +0xd6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Futex(0xc004e3e000, 0x2e?, {{0xc00ce80548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_futex.go:206 +0x494 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc004e3e000, 0xca, {{0xc00ce80548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc004e3e000, 0xc0026800c0?, {{0xc00ce80548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc004411e00?, 0xd5f639?, {{0xc00ce80548}, {0x80}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc007cdcea0?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc009eca080?, 0xc004e3e000) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc004e3e000, 0x96e0) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 239193 [select]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc006c8ba80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 323841 [chan receive, 22 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2148855 [semacquire, 3 minutes]: sync.runtime_Semacquire(0xc0021ec1b0?) GOROOT/src/runtime/sema.go:62 +0x27 gvisor.dev/gvisor/pkg/sync.(*CrossGoroutineRWMutex).Lock(0x0?) pkg/sync/rwmutex_unsafe.go:152 +0x97 gvisor.dev/gvisor/pkg/sync.(*RWMutex).Lock(...) pkg/sync/rwmutex_unsafe.go:290 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*filesystemRWMutex).Lock(0x0?) bazel-out/k8-fastbuild/bin/pkg/sentry/fsimpl/kernfs/filesystem_mutex.go:32 +0x45 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).DecRef(0xc0021ec1b0, {0x16c5800, 0xc006783500}) pkg/sentry/fsimpl/kernfs/kernfs.go:286 +0x9e gvisor.dev/gvisor/pkg/sentry/vfs.(*Dentry).DecRef(...) pkg/sentry/vfs/dentry.go:155 gvisor.dev/gvisor/pkg/sentry/vfs.VirtualDentry.DecRef({0xc0008d9400?, 0xc0021ec1b0?}, {0x16c5800, 0xc006783500}) pkg/sentry/vfs/vfs.go:1015 +0x59 gvisor.dev/gvisor/pkg/sentry/vfs.(*VirtualFilesystem).forgetDeadMountpoint(0xc00025cc60, {0x16c5800, 0xc006783500}, 0xc0021ec1b0) pkg/sentry/vfs/dentry.go:344 +0x228 gvisor.dev/gvisor/pkg/sentry/vfs.(*VirtualFilesystem).InvalidateDentry(0x12803e0?, {0x16c5800, 0xc006783500}, 0xc0021ec1b0) pkg/sentry/vfs/dentry.go:249 +0xa7 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).revalidateChildLocked(0x12803e0?, {0x16c5800, 0xc006783500}, 0x3?, 0xc0002c3560, {0xc004ac52a5, 0x3}, 0xc0021ec1b0) pkg/sentry/fsimpl/kernfs/filesystem.go:121 +0x13a gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).stepExistingLocked(0xc0164cc000?, {0x16c5800, 0xc006783500}, 0xc0164cc000, 0xc0002c3560) pkg/sentry/fsimpl/kernfs/filesystem.go:75 +0x36a gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).walkExistingLocked(0xc00358d2f8?, {0x16c5800, 0xc006783500}, 0xc0164cc000) pkg/sentry/fsimpl/kernfs/filesystem.go:160 +0xc5 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).OpenAt(0xc00087a000, {0x16c5800, 0xc006783500}, 0xc0164cc000, {0x8001, 0x0, 0x0}) pkg/sentry/fsimpl/kernfs/filesystem.go:483 +0x632 gvisor.dev/gvisor/pkg/sentry/vfs.(*VirtualFilesystem).OpenAt(0xc00696dfc0?, {0x16c5800, 0xc006783500}, 0xc0004b5b00?, 0xc00358d820, 0xc00358d7b8) pkg/sentry/vfs/vfs.go:460 +0x31a gvisor.dev/gvisor/pkg/sentry/syscalls/linux.openat(0xc006783500, 0x6783500?, 0xc00358d938?, 0x80001, 0x0) pkg/sentry/syscalls/linux/sys_file.go:112 +0x29a gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Openat(0xc000ac5260?, 0x40000000?, {{0xffffff9c}, {0x56043976dd29}, {0x80001}, {0x0}, {0x0}, {0x7ec90075b030}}) pkg/sentry/syscalls/linux/sys_file.go:91 +0x5f gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc006783500, 0x101, {{0xffffff9c}, {0x56043976dd29}, {0x80001}, {0x0}, {0x0}, {0x7ec90075b030}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc006783500, 0xc013f30960?, {{0xffffff9c}, {0x56043976dd29}, {0x80001}, {0x0}, {0x0}, {0x7ec90075b030}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00358de00?, 0xd5fa1a?, {{0xffffff9c}, {0x56043976dd29}, {0x80001}, {0x0}, {0x0}, {0x7ec90075b030}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc0189d1930?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00368d900?, 0xc006783500) pkg/sentry/kernel/task_run.go:269 +0x144a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc006783500, 0x2a6) pkg/sentry/kernel/task_run.go:98 +0x25c created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 2070000 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4f48, 0x1, 0x20?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x33?, 0x54?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4f30, 0xc00a011300?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070036 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6388, 0x1, 0xf2?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xfd?, 0x74?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6370, 0xc00d5a1480?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 237521 [chan receive, 37 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2069982 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4528, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4510, 0xf682?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069996 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4d08, 0x1, 0x59?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xe0?, 0x79?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4cf0, 0xf580?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070062 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7228, 0x1, 0xf0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x9d?, 0xf6?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c7210, 0xc005bf3480?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070056 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6ec8, 0x1, 0x9c?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x80?, 0xde?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6eb0, 0xc002669880?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 323802 [chan receive, 37 minutes]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 2070034 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6268, 0x1, 0xf5?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x7b?, 0x98?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6250, 0xc01305b600?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069994 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4be8, 0x1, 0x97?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xae?, 0x4b?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4bd0, 0xc006ac4700?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070060 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c7108, 0x1, 0xdc?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xfb?, 0x2a?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c70f0, 0xc00985aa80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069989 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4918, 0x1, 0x86?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf?, 0x3e?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4900, 0xc008018100?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069988 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4888, 0x1, 0xdb?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x2c?, 0x47?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4870, 0xc010723280?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069998 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4e28, 0x1, 0x5f?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x39?, 0xa4?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4e10, 0xc00a0c8800?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070027 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5e78, 0x1, 0x85?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xf6?, 0x2e?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5e60, 0xc005c96c80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2070024 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c5cc8, 0x1, 0x83?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0xaa?, 0xa8?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c5cb0, 0xc005c96900?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069987 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c47f8, 0x1, 0x40?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x2d?, 0xfb?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c47e0, 0xc010723500?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069984 [select, 4 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c4648, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c4630?, 0x0?, 0xf5?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c4630, 0xf680?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 1775647 [select, 3 minutes]: gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).runGoroutine(0xc003d21e80) pkg/sentry/kernel/time/time.go:507 +0x95 created by gvisor.dev/gvisor/pkg/sentry/kernel/time.(*Timer).init pkg/sentry/kernel/time/time.go:487 +0x198 goroutine 2070055 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c6e38, 0x1, 0xa7?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x3?, 0xc8?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c6e20, 0xc007df2f80?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 2069985 [select, 5 minutes]: gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0046c46d8, 0x1, 0x51?) pkg/sleep/sleep_unsafe.go:209 +0xe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0046c46c0?, 0x0?, 0x9c?) pkg/sleep/sleep_unsafe.go:256 +0x45 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0046c46c0, 0xc0010bf980?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d D0613 11:17:02.573148 14720 metric.go:1406] Emitting metrics: D0613 11:17:02.573185 14720 metric.go:1441] Metric /fs/opens: 97601 D0613 11:17:02.573199 14720 metric.go:1441] Metric /fs/read_wait: 0 D0613 11:17:02.573211 14720 metric.go:1441] Metric /fs/reads: 31711573 D0613 11:17:02.573222 14720 metric.go:1441] Metric /gofer/opens_9p: 0 D0613 11:17:02.573232 14720 metric.go:1441] Metric /gofer/opens_host: 2306 D0613 11:17:02.573244 14720 metric.go:1441] Metric /gofer/read_wait_9p: 0 D0613 11:17:02.573254 14720 metric.go:1441] Metric /gofer/read_wait_host: 0 D0613 11:17:02.573280 14720 metric.go:1441] Metric /gofer/reads_9p: 0 D0613 11:17:02.573289 14720 metric.go:1441] Metric /gofer/reads_host: 374 D0613 11:17:02.573298 14720 metric.go:1441] Metric /in_memory_file/opens_ro: 2698 D0613 11:17:02.573331 14720 metric.go:1441] Metric /in_memory_file/opens_w: 1863 D0613 11:17:02.573341 14720 metric.go:1441] Metric /in_memory_file/read_wait: 0 D0613 11:17:02.573351 14720 metric.go:1441] Metric /in_memory_file/reads: 31590347 D0613 11:17:02.573360 14720 metric.go:1441] Metric /netstack/arp/disabled_packets_received: 0 D0613 11:17:02.573371 14720 metric.go:1441] Metric /netstack/arp/malformed_packets_received: 137 D0613 11:17:02.573391 14720 metric.go:1441] Metric /netstack/arp/outgoing_replies_dropped: 0 D0613 11:17:02.573400 14720 metric.go:1441] Metric /netstack/arp/outgoing_replies_sent: 0 D0613 11:17:02.573409 14720 metric.go:1441] Metric /netstack/arp/outgoing_requests_dropped: 0 D0613 11:17:02.573418 14720 metric.go:1441] Metric /netstack/arp/outgoing_requests_iface_has_no_addr: 0 D0613 11:17:02.573428 14720 metric.go:1441] Metric /netstack/arp/outgoing_requests_invalid_local_addr: 0 D0613 11:17:02.573438 14720 metric.go:1441] Metric /netstack/arp/outgoing_requests_sent: 0 D0613 11:17:02.573455 14720 metric.go:1441] Metric /netstack/arp/packets_received: 426 D0613 11:17:02.573466 14720 metric.go:1441] Metric /netstack/arp/replies_received: 245 D0613 11:17:02.573482 14720 metric.go:1441] Metric /netstack/arp/requests_received: 0 D0613 11:17:02.573492 14720 metric.go:1441] Metric /netstack/arp/requests_received_unknown_addr: 0 D0613 11:17:02.573509 14720 metric.go:1441] Metric /netstack/dropped_packets: 18 D0613 11:17:02.573520 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/dst_unreachable: 935 D0613 11:17:02.573538 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/echo_reply: 0 D0613 11:17:02.573565 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/echo_request: 0 D0613 11:17:02.573575 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/info_reply: 0 D0613 11:17:02.573592 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/info_request: 0 D0613 11:17:02.573601 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/invalid: 2 D0613 11:17:02.573618 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/param_problem: 0 D0613 11:17:02.573627 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/redirect: 4 D0613 11:17:02.573644 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/src_quench: 0 D0613 11:17:02.573654 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/time_exceeded: 0 D0613 11:17:02.573671 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/timestamp: 0 D0613 11:17:02.573680 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_received/timestamp_reply: 0 D0613 11:17:02.573698 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/dropped: 0 D0613 11:17:02.573723 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/dst_unreachable: 930 D0613 11:17:02.573736 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/echo_reply: 0 D0613 11:17:02.573753 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/echo_request: 0 D0613 11:17:02.573764 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/info_reply: 0 D0613 11:17:02.573781 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/info_request: 0 D0613 11:17:02.573791 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/param_problem: 0 D0613 11:17:02.573799 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/rate_limited: 8 D0613 11:17:02.573812 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/redirect: 0 D0613 11:17:02.573821 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/src_quench: 0 D0613 11:17:02.573839 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/time_exceeded: 0 D0613 11:17:02.573849 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/timestamp: 0 D0613 11:17:02.573866 14720 metric.go:1441] Metric /netstack/icmp/v4/packets_sent/timestamp_reply: 0 D0613 11:17:02.573879 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/dst_unreachable: 1 D0613 11:17:02.573897 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/echo_reply: 0 D0613 11:17:02.573914 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/echo_request: 0 D0613 11:17:02.573931 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/invalid: 526 D0613 11:17:02.573948 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/multicast_listener_done: 0 D0613 11:17:02.573966 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/multicast_listener_query: 0 D0613 11:17:02.573976 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/multicast_listener_report: 0 D0613 11:17:02.573993 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/neighbor_advert: 378 D0613 11:17:02.574011 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/neighbor_solicit: 0 D0613 11:17:02.574028 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/packet_too_big: 194 D0613 11:17:02.574067 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/param_problem: 4 D0613 11:17:02.574085 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/redirect_msg: 0 D0613 11:17:02.574106 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/router_advert: 303 D0613 11:17:02.574130 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/router_only_packets_dropped_by_host: 0 D0613 11:17:02.574140 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/router_solicit: 0 D0613 11:17:02.574148 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/time_exceeded: 0 D0613 11:17:02.574157 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_received/unrecognized: 0 D0613 11:17:02.574166 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/dropped: 0 D0613 11:17:02.574184 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/dst_unreachable: 1 D0613 11:17:02.574201 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/echo_reply: 0 D0613 11:17:02.574219 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/echo_request: 0 D0613 11:17:02.574236 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/multicast_listener_done: 0 D0613 11:17:02.574245 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/multicast_listener_query: 0 D0613 11:17:02.574255 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/multicast_listener_report: 0 D0613 11:17:02.574273 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/neighbor_advert: 0 D0613 11:17:02.574291 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/neighbor_solicit: 121 D0613 11:17:02.574301 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/packet_too_big: 0 D0613 11:17:02.574323 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/param_problem: 36 D0613 11:17:02.574337 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/rate_limited: 0 D0613 11:17:02.574345 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/redirect_msg: 0 D0613 11:17:02.574355 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/router_advert: 0 D0613 11:17:02.574366 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/router_solicit: 0 D0613 11:17:02.574376 14720 metric.go:1441] Metric /netstack/icmp/v6/packets_sent/time_exceeded: 0 D0613 11:17:02.574387 14720 metric.go:1441] Metric /netstack/igmp/packets_received/checksum_errors: 0 D0613 11:17:02.574397 14720 metric.go:1441] Metric /netstack/igmp/packets_received/invalid: 13 D0613 11:17:02.574423 14720 metric.go:1441] Metric /netstack/igmp/packets_received/leave_group: 0 D0613 11:17:02.574432 14720 metric.go:1441] Metric /netstack/igmp/packets_received/membership_query: 360 D0613 11:17:02.574441 14720 metric.go:1441] Metric /netstack/igmp/packets_received/unrecognized: 0 D0613 11:17:02.574450 14720 metric.go:1441] Metric /netstack/igmp/packets_received/v1_membership_report: 0 D0613 11:17:02.574468 14720 metric.go:1441] Metric /netstack/igmp/packets_received/v2_membership_report: 0 D0613 11:17:02.574479 14720 metric.go:1441] Metric /netstack/igmp/packets_sent/dropped: 0 D0613 11:17:02.574496 14720 metric.go:1441] Metric /netstack/igmp/packets_sent/leave_group: 0 D0613 11:17:02.574505 14720 metric.go:1441] Metric /netstack/igmp/packets_sent/membership_query: 0 D0613 11:17:02.574526 14720 metric.go:1441] Metric /netstack/igmp/packets_sent/v1_membership_report: 0 D0613 11:17:02.574536 14720 metric.go:1441] Metric /netstack/igmp/packets_sent/v2_membership_report: 0 D0613 11:17:02.574546 14720 metric.go:1441] Metric /netstack/ip/disabled_packets_received: 0 D0613 11:17:02.574556 14720 metric.go:1441] Metric /netstack/ip/forwarding/errors: 0 D0613 11:17:02.574565 14720 metric.go:1441] Metric /netstack/ip/forwarding/exhausted_ttl: 0 D0613 11:17:02.574583 14720 metric.go:1441] Metric /netstack/ip/forwarding/extension_header_problem: 0 D0613 11:17:02.574607 14720 metric.go:1441] Metric /netstack/ip/forwarding/host_unreachable: 0 D0613 11:17:02.574619 14720 metric.go:1441] Metric /netstack/ip/forwarding/link_local_destination_address: 0 D0613 11:17:02.574629 14720 metric.go:1441] Metric /netstack/ip/forwarding/link_local_source_address: 0 D0613 11:17:02.574638 14720 metric.go:1441] Metric /netstack/ip/forwarding/packet_too_big: 0 D0613 11:17:02.574648 14720 metric.go:1441] Metric /netstack/ip/forwarding/unrouteable: 0 D0613 11:17:02.574658 14720 metric.go:1441] Metric /netstack/ip/invalid_addresses_received: 401 D0613 11:17:02.574678 14720 metric.go:1441] Metric /netstack/ip/invalid_source_addresses_received: 99 D0613 11:17:02.574698 14720 metric.go:1441] Metric /netstack/ip/iptables/input_dropped: 0 D0613 11:17:02.574716 14720 metric.go:1441] Metric /netstack/ip/iptables/output_dropped: 0 D0613 11:17:02.574725 14720 metric.go:1441] Metric /netstack/ip/iptables/prerouting_dropped: 0 D0613 11:17:02.574734 14720 metric.go:1441] Metric /netstack/ip/malformed_fragments_received: 2 D0613 11:17:02.574743 14720 metric.go:1441] Metric /netstack/ip/malformed_packets_received: 258 D0613 11:17:02.574753 14720 metric.go:1441] Metric /netstack/ip/options/record_route_received: 4 D0613 11:17:02.574773 14720 metric.go:1441] Metric /netstack/ip/options/router_alert_received: 361 D0613 11:17:02.574783 14720 metric.go:1441] Metric /netstack/ip/options/timestamp_received: 0 D0613 11:17:02.574798 14720 metric.go:1441] Metric /netstack/ip/options/unknown_received: 0 D0613 11:17:02.574819 14720 metric.go:1441] Metric /netstack/ip/outgoing_packet_errors: 332 D0613 11:17:02.574830 14720 metric.go:1441] Metric /netstack/ip/packets_delivered: 125468 D0613 11:17:02.574853 14720 metric.go:1441] Metric /netstack/ip/packets_received: 126362 D0613 11:17:02.574864 14720 metric.go:1441] Metric /netstack/ip/packets_sent: 23872 D0613 11:17:02.574874 14720 metric.go:1441] Metric /netstack/nic/disabled_rx/bytes: 0 D0613 11:17:02.574895 14720 metric.go:1441] Metric /netstack/nic/disabled_rx/packets: 0 D0613 11:17:02.574904 14720 metric.go:1441] Metric /netstack/nic/malformed_l4_received_packets: 149 D0613 11:17:02.574914 14720 metric.go:1441] Metric /netstack/nic/neighbor/dropped_confirmation_for_noninitiated_neighbor: 272 D0613 11:17:02.574922 14720 metric.go:1441] Metric /netstack/nic/neighbor/dropped_invalid_link_address_confirmations: 0 D0613 11:17:02.574931 14720 metric.go:1441] Metric /netstack/nic/neighbor/unreachable_entry_loopups: 24 D0613 11:17:02.574941 14720 metric.go:1441] Metric /netstack/nic/rx/bytes: 1299140787 D0613 11:17:02.574951 14720 metric.go:1441] Metric /netstack/nic/rx/packets: 29038 D0613 11:17:02.574972 14720 metric.go:1441] Metric /netstack/nic/tx/bytes: 1298821507 D0613 11:17:02.574982 14720 metric.go:1441] Metric /netstack/nic/tx/packets: 23654 D0613 11:17:02.574992 14720 metric.go:1441] Metric /netstack/nic/tx_packets_dropped_no_buffer_space: 0 D0613 11:17:02.575002 14720 metric.go:1441] Metric /netstack/tcp/active_connection_openings: 526 D0613 11:17:02.575012 14720 metric.go:1441] Metric /netstack/tcp/checksum_errors: 1 D0613 11:17:02.575039 14720 metric.go:1441] Metric /netstack/tcp/current_established: 0 D0613 11:17:02.575047 14720 metric.go:1441] Metric /netstack/tcp/current_open: 0 D0613 11:17:02.575056 14720 metric.go:1441] Metric /netstack/tcp/established_closed: 31 D0613 11:17:02.575071 14720 metric.go:1441] Metric /netstack/tcp/established_resets: 357 D0613 11:17:02.575080 14720 metric.go:1441] Metric /netstack/tcp/established_timedout: 0 D0613 11:17:02.575099 14720 metric.go:1441] Metric /netstack/tcp/failed_connection_attempts: 785 D0613 11:17:02.575108 14720 metric.go:1441] Metric /netstack/tcp/failed_port_reservations: 499 D0613 11:17:02.575118 14720 metric.go:1441] Metric /netstack/tcp/fast_recovery: 0 D0613 11:17:02.575126 14720 metric.go:1441] Metric /netstack/tcp/fast_retransmit: 0 D0613 11:17:02.575136 14720 metric.go:1441] Metric /netstack/tcp/invalid_segments_received: 10 D0613 11:17:02.575145 14720 metric.go:1441] Metric /netstack/tcp/listen_overflow_ack_drop: 0 D0613 11:17:02.575163 14720 metric.go:1441] Metric /netstack/tcp/listen_overflow_invalid_syn_cookie_rcvd: 0 D0613 11:17:02.575173 14720 metric.go:1441] Metric /netstack/tcp/listen_overflow_syn_cookie_rcvd: 193 D0613 11:17:02.575184 14720 metric.go:1441] Metric /netstack/tcp/listen_overflow_syn_cookie_sent: 211 D0613 11:17:02.575193 14720 metric.go:1441] Metric /netstack/tcp/listen_overflow_syn_drop: 0 D0613 11:17:02.575212 14720 metric.go:1441] Metric /netstack/tcp/passive_connection_openings: 200 D0613 11:17:02.575221 14720 metric.go:1441] Metric /netstack/tcp/resets_received: 506 D0613 11:17:02.575231 14720 metric.go:1441] Metric /netstack/tcp/resets_sent: 9585 D0613 11:17:02.575241 14720 metric.go:1441] Metric /netstack/tcp/retransmits: 1 D0613 11:17:02.575261 14720 metric.go:1441] Metric /netstack/tcp/sack_recovery: 1 D0613 11:17:02.575271 14720 metric.go:1441] Metric /netstack/tcp/segment_send_errors: 0 D0613 11:17:02.575282 14720 metric.go:1441] Metric /netstack/tcp/segments_acked_with_dsack: 0 D0613 11:17:02.575292 14720 metric.go:1441] Metric /netstack/tcp/segments_sent: 121782 D0613 11:17:02.575302 14720 metric.go:1441] Metric /netstack/tcp/slow_start_retransmits: 1 D0613 11:17:02.575321 14720 metric.go:1441] Metric /netstack/tcp/spurious_recovery: 0 D0613 11:17:02.575332 14720 metric.go:1441] Metric /netstack/tcp/spurious_rto_recovery: 0 D0613 11:17:02.575341 14720 metric.go:1441] Metric /netstack/tcp/timeouts: 9 D0613 11:17:02.575351 14720 metric.go:1441] Metric /netstack/tcp/tlp_recovery: 0 D0613 11:17:02.575361 14720 metric.go:1441] Metric /netstack/tcp/valid_segments_received: 112481 D0613 11:17:02.575371 14720 metric.go:1441] Metric /netstack/udp/checksum_errors: 30 D0613 11:17:02.575381 14720 metric.go:1441] Metric /netstack/udp/malformed_packets_received: 43 D0613 11:17:02.575398 14720 metric.go:1441] Metric /netstack/udp/packet_send_errors: 0 D0613 11:17:02.575407 14720 metric.go:1441] Metric /netstack/udp/packets_received: 1 D0613 11:17:02.575417 14720 metric.go:1441] Metric /netstack/udp/packets_sent: 940 D0613 11:17:02.575426 14720 metric.go:1441] Metric /netstack/udp/receive_buffer_errors: 0 D0613 11:17:02.575437 14720 metric.go:1441] Metric /netstack/udp/unknown_port_errors: 1265 D0613 11:17:02.575446 14720 metric.go:1441] Metric /trace/sessions_created: 0 D0613 11:17:02.575465 14720 metric.go:1439] Metric /weirdness[weirdness_type=watchdog_stuck_tasks]: 1 D0613 11:17:02.575506 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=249]: 121 D0613 11:17:02.575535 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=158]: 242 D0613 11:17:02.575557 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=148]: 60 D0613 11:17:02.575569 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=31]: 801 D0613 11:17:02.575581 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=16]: 219 D0613 11:17:02.575602 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=298]: 537 D0613 11:17:02.575615 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=157]: 163 D0613 11:17:02.575629 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=304]: 187 D0613 11:17:02.575651 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=250]: 695 D0613 11:17:02.575664 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=308]: 9 D0613 11:17:02.575685 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=154]: 820 D0613 11:17:02.575699 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=277]: 2 D0613 11:17:02.575728 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=324]: 34 D0613 11:17:02.575742 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=303]: 114 D0613 11:17:02.575764 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=248]: 248 D0613 11:17:02.575785 14720 metric.go:1439] Metric unimplemented_syscalls[sysno=135]: 4 panic: Sentry detected 1 stuck task(s): Task tid: 678 (goroutine 2148855), entered RunSys state 3m41.3s ago. Search for 'goroutine ' in the stack dump to find the offending goroutine(s) Stack for running G's are skipped while panicking. goroutine 241 [running]: panic({0x1224b60, 0xc015147450}) GOROOT/src/runtime/panic.go:987 +0x3bb fp=0xc002e6fc90 sp=0xc002e6fbd0 pc=0x436b9b gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).doAction(0xc002e6fdb8?, 0x14b01d0?, 0x50?, 0xc002e6fdb8) pkg/sentry/watchdog/watchdog.go:379 +0x3a5 fp=0xc002e6fd50 sp=0xc002e6fc90 pc=0xbf77e5 gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).report(0xc000224700, 0xc01252d200, 0x0?, {0x0?}) pkg/sentry/watchdog/watchdog.go:338 +0x291 fp=0xc002e6fe80 sp=0xc002e6fd50 pc=0xbf7351 gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).runTurn(0xc000224700) pkg/sentry/watchdog/watchdog.go:320 +0x598 fp=0xc002e6ff58 sp=0xc002e6fe80 pc=0xbf6fb8 gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).loop(0xc000224700) pkg/sentry/watchdog/watchdog.go:255 +0x3d fp=0xc002e6ffc8 sp=0xc002e6ff58 pc=0xbf695d gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).Start.func2() pkg/sentry/watchdog/watchdog.go:206 +0x26 fp=0xc002e6ffe0 sp=0xc002e6ffc8 pc=0xbf6446 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc002e6ffe8 sp=0xc002e6ffe0 pc=0x46d641 created by gvisor.dev/gvisor/pkg/sentry/watchdog.(*Watchdog).Start pkg/sentry/watchdog/watchdog.go:206 +0x1ef goroutine 1 [semacquire, 43 minutes]: runtime.gopark(0xc0007ac000?, 0xc0000429b0?, 0xa0?, 0x62?, 0x3?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000e07240 sp=0xc000e07220 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc00029ccf0, 0xe0?, 0x1, 0x0, 0x0?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc000e072a8 sp=0xc000e07240 pc=0x44b3ef sync.runtime_Semacquire(0xc000341310?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc000e072e0 sp=0xc000e072a8 pc=0x468e07 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x4b fp=0xc000e07308 sp=0xc000e072e0 pc=0x479aab gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1124 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000702000) runsc/boot/loader.go:1197 +0x38 fp=0xc000e07320 sp=0xc000e07308 pc=0xf072f8 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000228840, {0xc000222100?, 0xc0002738c0?}, 0xc00019a4e0, {0xc0002738c0, 0x2, 0x1b?}) runsc/cmd/boot.go:457 +0x15e5 fp=0xc000e07860 sp=0xc000e07320 pc=0x113e0a5 github.com/google/subcommands.(*Commander).Execute(0xc000224000, {0x16b8878, 0xc000210000}, {0xc0002738c0, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x3a2 fp=0xc000e07900 sp=0xc000e07860 pc=0x5151e2 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:260 +0x6c85 fp=0xc000e07f70 sp=0xc000e07900 pc=0x11704e5 main.main() runsc/main.go:31 +0x17 fp=0xc000e07f80 sp=0xc000e07f70 pc=0x1170a37 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc000e07fe0 sp=0xc000e07f80 pc=0x439987 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000e07fe8 sp=0xc000e07fe0 pc=0x46d641 goroutine 2 [force gc (idle), 3 minutes]: runtime.gopark(0x2027f9a03c9508?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012cfb0 sp=0xc00012cf90 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc00012cfe0 sp=0xc00012cfb0 pc=0x439bf0 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012cfe8 sp=0xc00012cfe0 pc=0x46d641 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 17 [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128780 sp=0xc000128760 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc0001287c8 sp=0xc000128780 pc=0x4243be runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc0001287e0 sp=0xc0001287c8 pc=0x419566 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001287e8 sp=0xc0001287e0 pc=0x46d641 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 18 [GC scavenge wait]: runtime.gopark(0x2027f9a6b3fc33?, 0x12610a?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128f70 sp=0xc000128f50 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x227d280) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000128fa0 sp=0xc000128f70 pc=0x422293 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000128fc8 sp=0xc000128fa0 pc=0x422885 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000128fe0 sp=0xc000128fc8 pc=0x419506 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000128fe8 sp=0xc000128fe0 pc=0x46d641 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 33 [finalizer wait, 43 minutes]: runtime.gopark(0x43a132?, 0x7fcabc514968?, 0x0?, 0x0?, 0xc00012c770?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012c628 sp=0xc00012c608 pc=0x439db6 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x107 fp=0xc00012c7e0 sp=0xc00012c628 pc=0x418527 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012c7e8 sp=0xc00012c7e0 pc=0x46d641 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 34 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000476750 sp=0xc000476730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004767e0 sp=0xc000476750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004767e8 sp=0xc0004767e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000476f50 sp=0xc000476f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000476fe0 sp=0xc000476f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000476fe8 sp=0xc000476fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000477750 sp=0xc000477730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004777e0 sp=0xc000477750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004777e8 sp=0xc0004777e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000477f50 sp=0xc000477f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000477fe0 sp=0xc000477f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000477fe8 sp=0xc000477fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129750 sp=0xc000129730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001297e0 sp=0xc000129750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001297e8 sp=0xc0001297e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129f50 sp=0xc000129f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000129fe0 sp=0xc000129f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000129fe8 sp=0xc000129fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000472750 sp=0xc000472730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004727e0 sp=0xc000472750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004727e8 sp=0xc0004727e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012a750 sp=0xc00012a730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012a7e0 sp=0xc00012a750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012a7e8 sp=0xc00012a7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012af50 sp=0xc00012af30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012afe0 sp=0xc00012af50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012afe8 sp=0xc00012afe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000472f50 sp=0xc000472f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000472fe0 sp=0xc000472f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000472fe8 sp=0xc000472fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012b750 sp=0xc00012b730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012b7e0 sp=0xc00012b750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012b7e8 sp=0xc00012b7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012bf50 sp=0xc00012bf30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012bfe0 sp=0xc00012bf50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012bfe8 sp=0xc00012bfe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000473750 sp=0xc000473730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004737e0 sp=0xc000473750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004737e8 sp=0xc0004737e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000473f50 sp=0xc000473f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000473fe0 sp=0xc000473f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000473fe8 sp=0xc000473fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000474750 sp=0xc000474730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004747e0 sp=0xc000474750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004747e8 sp=0xc0004747e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000474f50 sp=0xc000474f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000474fe0 sp=0xc000474f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000474fe8 sp=0xc000474fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 3 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012d750 sp=0xc00012d730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012d7e0 sp=0xc00012d750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012d7e8 sp=0xc00012d7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 4 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012df50 sp=0xc00012df30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012dfe0 sp=0xc00012df50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012dfe8 sp=0xc00012dfe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6750 sp=0xc0001a6730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a67e0 sp=0xc0001a6750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a67e8 sp=0xc0001a67e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 5 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012e750 sp=0xc00012e730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012e7e0 sp=0xc00012e750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012e7e8 sp=0xc00012e7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000478750 sp=0xc000478730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004787e0 sp=0xc000478750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004787e8 sp=0xc0004787e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000478f50 sp=0xc000478f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000478fe0 sp=0xc000478f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000478fe8 sp=0xc000478fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 6 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ef50 sp=0xc00012ef30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012efe0 sp=0xc00012ef50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012efe8 sp=0xc00012efe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012f750 sp=0xc00012f730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012f7e0 sp=0xc00012f750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012f7e8 sp=0xc00012f7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000479750 sp=0xc000479730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004797e0 sp=0xc000479750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004797e8 sp=0xc0004797e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ff50 sp=0xc00012ff30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012ffe0 sp=0xc00012ff50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012ffe8 sp=0xc00012ffe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7750 sp=0xc0001a7730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a77e0 sp=0xc0001a7750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a77e8 sp=0xc0001a77e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2750 sp=0xc0001a2730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a27e0 sp=0xc0001a2750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a27e8 sp=0xc0001a27e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000479f50 sp=0xc000479f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000479fe0 sp=0xc000479f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000479fe8 sp=0xc000479fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504750 sp=0xc000504730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005047e0 sp=0xc000504750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005047e8 sp=0xc0005047e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8750 sp=0xc0001a8730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a87e0 sp=0xc0001a8750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a87e8 sp=0xc0001a87e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504f50 sp=0xc000504f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000504fe0 sp=0xc000504f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8f50 sp=0xc0001a8f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a8fe0 sp=0xc0001a8f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a8fe8 sp=0xc0001a8fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505750 sp=0xc000505730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005057e0 sp=0xc000505750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005057e8 sp=0xc0005057e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505f50 sp=0xc000505f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000505fe0 sp=0xc000505f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506750 sp=0xc000506730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005067e0 sp=0xc000506750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005067e8 sp=0xc0005067e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506f50 sp=0xc000506f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000506fe0 sp=0xc000506f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507750 sp=0xc000507730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005077e0 sp=0xc000507750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005077e8 sp=0xc0005077e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3750 sp=0xc0001a3730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a37e0 sp=0xc0001a3750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a37e8 sp=0xc0001a37e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9750 sp=0xc0001a9730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a97e0 sp=0xc0001a9750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a97e8 sp=0xc0001a97e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9f50 sp=0xc0001a9f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a9fe0 sp=0xc0001a9f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a9fe8 sp=0xc0001a9fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000500750 sp=0xc000500730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005007e0 sp=0xc000500750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005007e8 sp=0xc0005007e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4750 sp=0xc0001a4730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a47e0 sp=0xc0001a4750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a47e8 sp=0xc0001a47e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000500f50 sp=0xc000500f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000500fe0 sp=0xc000500f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000500fe8 sp=0xc000500fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5750 sp=0xc0001a5730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a57e0 sp=0xc0001a5750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a57e8 sp=0xc0001a57e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000501750 sp=0xc000501730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005017e0 sp=0xc000501750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005017e8 sp=0xc0005017e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000501f50 sp=0xc000501f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000501fe0 sp=0xc000501f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000501fe8 sp=0xc000501fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502750 sp=0xc000502730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005027e0 sp=0xc000502750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005027e8 sp=0xc0005027e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000162750 sp=0xc000162730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001627e0 sp=0xc000162750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001627e8 sp=0xc0001627e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502f50 sp=0xc000502f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000502fe0 sp=0xc000502f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 97 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507f50 sp=0xc000507f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000507fe0 sp=0xc000507f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000162f50 sp=0xc000162f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000162fe0 sp=0xc000162f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000162fe8 sp=0xc000162fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000163750 sp=0xc000163730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001637e0 sp=0xc000163750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001637e8 sp=0xc0001637e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015e750 sp=0xc00015e730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015e7e0 sp=0xc00015e750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015e7e8 sp=0xc00015e7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503750 sp=0xc000503730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005037e0 sp=0xc000503750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005037e8 sp=0xc0005037e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle), 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000163f50 sp=0xc000163f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000163fe0 sp=0xc000163f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000163fe8 sp=0xc000163fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d5f61d?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000164750 sp=0xc000164730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001647e0 sp=0xc000164750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001647e8 sp=0xc0001647e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x22b10a0?, 0x1?, 0xb2?, 0xb4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503f50 sp=0xc000503f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000503fe0 sp=0xc000503f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle), 7 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x8d?, 0xac?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b2750 sp=0xc0001b2730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b27e0 sp=0xc0001b2750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b27e8 sp=0xc0001b27e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d5ef1f?, 0x3?, 0x86?, 0xf3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000475750 sp=0xc000475730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004757e0 sp=0xc000475750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004757e8 sp=0xc0004757e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d5f1b3?, 0x1?, 0xae?, 0x2e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015ef50 sp=0xc00015ef30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015efe0 sp=0xc00015ef50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015efe8 sp=0xc00015efe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle), 5 minutes]: runtime.gopark(0x2027ca74ff893d?, 0x1?, 0xd6?, 0xb6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000475f50 sp=0xc000475f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000475fe0 sp=0xc000475f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000475fe8 sp=0xc000475fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d54168?, 0x1?, 0x91?, 0x54?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ae750 sp=0xc0001ae730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001ae7e0 sp=0xc0001ae750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ae7e8 sp=0xc0001ae7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle), 5 minutes]: runtime.gopark(0x2027ca75031e44?, 0x1?, 0x85?, 0x29?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aef50 sp=0xc0001aef30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aefe0 sp=0xc0001aef50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aefe8 sp=0xc0001aefe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle), 7 minutes]: runtime.gopark(0x2027a66ed11692?, 0x1?, 0x89?, 0x62?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001af750 sp=0xc0001af730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001af7e0 sp=0xc0001af750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001af7e8 sp=0xc0001af7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle), 5 minutes]: runtime.gopark(0x2027ca74ff81c6?, 0x1?, 0xf0?, 0x37?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000164f50 sp=0xc000164f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000164fe0 sp=0xc000164f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000164fe8 sp=0xc000164fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle), 3 minutes]: runtime.gopark(0x2027ddaeb1dfe1?, 0x1?, 0xfd?, 0x5b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b2f50 sp=0xc0001b2f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b2fe0 sp=0xc0001b2f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b2fe8 sp=0xc0001b2fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle)]: runtime.gopark(0x22b10a0?, 0x1?, 0x51?, 0x77?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000165750 sp=0xc000165730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001657e0 sp=0xc000165750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001657e8 sp=0xc0001657e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d4dd73?, 0x1?, 0x61?, 0x17?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aff50 sp=0xc0001aff30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001affe0 sp=0xc0001aff50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001affe8 sp=0xc0001affe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x2027f9a17382c2?, 0x1?, 0xb5?, 0x1c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b3750 sp=0xc0001b3730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b37e0 sp=0xc0001b3750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b37e8 sp=0xc0001b37e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle), 5 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x41?, 0x99?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000165f50 sp=0xc000165f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000165fe0 sp=0xc000165f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000165fe8 sp=0xc000165fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 61 [GC worker (idle), 5 minutes]: runtime.gopark(0x2027ca75032006?, 0x1?, 0xcf?, 0x32?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b0750 sp=0xc0001b0730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b07e0 sp=0xc0001b0750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b07e8 sp=0xc0001b07e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle), 3 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x4f?, 0x21?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015f750 sp=0xc00015f730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015f7e0 sp=0xc00015f750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015f7e8 sp=0xc00015f7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 62 [GC worker (idle), 4 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x6f?, 0x2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b0f50 sp=0xc0001b0f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b0fe0 sp=0xc0001b0f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b0fe8 sp=0xc0001b0fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle)]: runtime.gopark(0x22b10a0?, 0x1?, 0x23?, 0x9d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016a750 sp=0xc00016a730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016a7e0 sp=0xc00016a750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016a7e8 sp=0xc00016a7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle), 3 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x59?, 0x78?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b3f50 sp=0xc0001b3f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b3fe0 sp=0xc0001b3f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b3fe8 sp=0xc0001b3fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle), 5 minutes]: runtime.gopark(0x2027ca750246ae?, 0x1?, 0xbb?, 0x1c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016af50 sp=0xc00016af30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016afe0 sp=0xc00016af50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016afe8 sp=0xc00016afe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle)]: runtime.gopark(0x2027f9a15a2c15?, 0x1?, 0x99?, 0x53?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016b750 sp=0xc00016b730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016b7e0 sp=0xc00016b750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016b7e8 sp=0xc00016b7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d5ee75?, 0x1?, 0xf7?, 0x8f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015ff50 sp=0xc00015ff30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015ffe0 sp=0xc00015ff50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015ffe8 sp=0xc00015ffe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 113 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d4da48?, 0x1?, 0xce?, 0xb7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000166750 sp=0xc000166730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001667e0 sp=0xc000166750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001667e8 sp=0xc0001667e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle), 3 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0xe3?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000160750 sp=0xc000160730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001607e0 sp=0xc000160750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001607e8 sp=0xc0001607e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [GC worker (idle)]: runtime.gopark(0x2027f9a1726ae1?, 0x1?, 0xfb?, 0xfa?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016bf50 sp=0xc00016bf30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016bfe0 sp=0xc00016bf50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016bfe8 sp=0xc00016bfe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 93 [GC worker (idle), 19 minutes]: runtime.gopark(0x22b10a0?, 0x3?, 0xe4?, 0xc4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016c750 sp=0xc00016c730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016c7e0 sp=0xc00016c750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016c7e8 sp=0xc00016c7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 94 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026fdf6d5f40b?, 0x1?, 0xb1?, 0xb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016cf50 sp=0xc00016cf30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016cfe0 sp=0xc00016cf50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016cfe8 sp=0xc00016cfe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 95 [GC worker (idle), 3 minutes]: runtime.gopark(0x22b10a0?, 0x1?, 0x6d?, 0x75?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016d750 sp=0xc00016d730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016d7e0 sp=0xc00016d750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016d7e8 sp=0xc00016d7e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 96 [GC worker (idle), 19 minutes]: runtime.gopark(0x2026ffe46c4023?, 0x1?, 0x73?, 0xa8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00016df50 sp=0xc00016df30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00016dfe0 sp=0xc00016df50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00016dfe8 sp=0xc00016dfe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 129 [GC worker (idle)]: runtime.gopark(0x2027f9a17271f2?, 0x1?, 0x3e?, 0x96?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000584750 sp=0xc000584730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005847e0 sp=0xc000584750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005847e8 sp=0xc0005847e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle), 3 minutes]: runtime.gopark(0x14dbd80?, 0xc000508040?, 0x1a?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000166f50 sp=0xc000166f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000166fe0 sp=0xc000166f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000166fe8 sp=0xc000166fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle), 3 minutes]: runtime.gopark(0x2027ddaeb1e6fd?, 0x1?, 0x27?, 0x4f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000167750 sp=0xc000167730 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001677e0 sp=0xc000167750 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001677e8 sp=0xc0001677e0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 116 [GC worker (idle)]: runtime.gopark(0x2027f9a15a2c01?, 0x1?, 0xa2?, 0x66?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000167f50 sp=0xc000167f30 pc=0x439db6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000167fe0 sp=0xc000167f50 pc=0x41b2d1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000167fe8 sp=0xc000167fe0 pc=0x46d641 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 130 [sync.Cond.Wait, 43 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b5590 sp=0xc0001b5570 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc0001bbb30, 0x0) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc0001b55d8 sp=0xc0001b5590 pc=0x4691cc sync.(*Cond).Wait(0xc0001bb500?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc0001b5610 sp=0xc0001b55d8 pc=0x47614c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0001bb500) pkg/sentry/pgalloc/pgalloc.go:1276 +0x148 fp=0xc0001b5678 sp=0xc0001b5610 pc=0x7c3cc8 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0001bb500) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 fp=0xc0001b57c8 sp=0xc0001b5678 pc=0x7c3225 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x26 fp=0xc0001b57e0 sp=0xc0001b57c8 pc=0x7bddc6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b57e8 sp=0xc0001b57e0 pc=0x46d641 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 131 [chan receive, 12 minutes]: runtime.gopark(0xc000c23620?, 0xc004f24720?, 0x13?, 0x0?, 0xc000660f50?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000660ee0 sp=0xc000660ec0 pc=0x439db6 runtime.chanrecv(0xc000201e60, 0xc000660fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x49d fp=0xc000660f70 sp=0xc000660ee0 pc=0x40701d runtime.chanrecv2(0xc00058c380?, 0x12be3e0?) GOROOT/src/runtime/chan.go:447 +0x18 fp=0xc000660f98 sp=0xc000660f70 pc=0x406b58 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 fp=0xc000660fe0 sp=0xc000660f98 pc=0xd57037 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000660fe8 sp=0xc000660fe0 pc=0x46d641 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2a5 goroutine 132 [sync.Cond.Wait]: runtime.gopark(0x0?, 0xc0001bd820?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00065cd90 sp=0xc00065cd70 pc=0x439db6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc0001bde30, 0xa7ff) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc00065cdd8 sp=0xc00065cd90 pc=0x4691cc sync.(*Cond).Wait(0xc0001bd800?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc00065ce10 sp=0xc00065cdd8 pc=0x47614c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0001bd800) pkg/sentry/pgalloc/pgalloc.go:1276 +0x148 fp=0xc00065ce78 sp=0xc00065ce10 pc=0x7c3cc8 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0001bd800) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 fp=0xc00065cfc8 sp=0xc00065ce78 pc=0x7c3225 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x26 fp=0xc00065cfe0 sp=0xc00065cfc8 pc=0x7bddc6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00065cfe8 sp=0xc00065cfe0 pc=0x46d641 D0613 11:17:02.737102 1 connection.go:127] sock read failed, closing connection: EOF I0613 11:17:02.737262 1 gofer.go:319] All lisafs servers exited. W0613 11:17:02.737265 14696 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0613 11:17:02.737290 1 main.go:265] Exiting with status: 0 D0613 11:17:02.738472 14696 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-0 D0613 11:17:02.738560 14696 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-0 D0613 11:17:02.738567 14696 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-0 D0613 11:17:02.738575 14696 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-0" D0613 11:17:02.738634 14696 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-0, PID: 14714 D0613 11:17:02.752936 14696 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-0" I0613 11:17:02.753776 14696 main.go:265] Exiting with status: 512 VM DIAGNOSIS: I0613 11:17:02.671202 75969 main.go:230] *************************** I0613 11:17:02.671276 75969 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0613 11:17:02.671308 75969 main.go:232] Version 0.0.0 I0613 11:17:02.671329 75969 main.go:233] GOOS: linux I0613 11:17:02.671363 75969 main.go:234] GOARCH: amd64 I0613 11:17:02.671385 75969 main.go:235] PID: 75969 I0613 11:17:02.671424 75969 main.go:236] UID: 0, GID: 0 I0613 11:17:02.671452 75969 main.go:237] Configuration: I0613 11:17:02.671481 75969 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0613 11:17:02.671502 75969 main.go:239] Platform: systrap I0613 11:17:02.671530 75969 main.go:240] FileAccess: shared I0613 11:17:02.671561 75969 main.go:241] Directfs: true I0613 11:17:02.671591 75969 main.go:242] Overlay: none I0613 11:17:02.671623 75969 main.go:243] Network: sandbox, logging: false I0613 11:17:02.671655 75969 main.go:244] Strace: false, max size: 1024, syscalls: I0613 11:17:02.671687 75969 main.go:245] IOURING: false I0613 11:17:02.671730 75969 main.go:246] Debug: true I0613 11:17:02.671760 75969 main.go:247] Systemd: false I0613 11:17:02.671787 75969 main.go:248] *************************** D0613 11:17:02.671843 75969 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0613 11:17:02.672934 75969 util.go:51] Found sandbox "ci-gvisor-systrap-1-cover-0", PID: 14720 Found sandbox "ci-gvisor-systrap-1-cover-0", PID: 14720 I0613 11:17:02.673012 75969 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0613 11:17:02.673020 75969 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0613 11:17:02.673027 75969 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" D0613 11:17:02.673123 75969 urpc.go:568] urpc: successfully marshalled 36 bytes. W0613 11:17:02.719231 75969 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0613 11:17:02.719334 75969 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-0"]: exit status 128 I0613 11:17:02.671202 75969 main.go:230] *************************** I0613 11:17:02.671276 75969 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0613 11:17:02.671308 75969 main.go:232] Version 0.0.0 I0613 11:17:02.671329 75969 main.go:233] GOOS: linux I0613 11:17:02.671363 75969 main.go:234] GOARCH: amd64 I0613 11:17:02.671385 75969 main.go:235] PID: 75969 I0613 11:17:02.671424 75969 main.go:236] UID: 0, GID: 0 I0613 11:17:02.671452 75969 main.go:237] Configuration: I0613 11:17:02.671481 75969 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0613 11:17:02.671502 75969 main.go:239] Platform: systrap I0613 11:17:02.671530 75969 main.go:240] FileAccess: shared I0613 11:17:02.671561 75969 main.go:241] Directfs: true I0613 11:17:02.671591 75969 main.go:242] Overlay: none I0613 11:17:02.671623 75969 main.go:243] Network: sandbox, logging: false I0613 11:17:02.671655 75969 main.go:244] Strace: false, max size: 1024, syscalls: I0613 11:17:02.671687 75969 main.go:245] IOURING: false I0613 11:17:02.671730 75969 main.go:246] Debug: true I0613 11:17:02.671760 75969 main.go:247] Systemd: false I0613 11:17:02.671787 75969 main.go:248] *************************** D0613 11:17:02.671843 75969 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0613 11:17:02.672934 75969 util.go:51] Found sandbox "ci-gvisor-systrap-1-cover-0", PID: 14720 Found sandbox "ci-gvisor-systrap-1-cover-0", PID: 14720 I0613 11:17:02.673012 75969 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0613 11:17:02.673020 75969 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0613 11:17:02.673027 75969 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" D0613 11:17:02.673123 75969 urpc.go:568] urpc: successfully marshalled 36 bytes. W0613 11:17:02.719231 75969 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0613 11:17:02.719334 75969 main.go:274] Failure to execute command, err: 1 [8921697.427226] exe[346662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609bf9203e8 cs:33 sp:7f3e45451f90 ax:7f3e45452020 si:ffffffffff600000 di:5609bf9ea82f [8921697.497289] exe[342876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609bf9203e8 cs:33 sp:7f3e45451f90 ax:7f3e45452020 si:ffffffffff600000 di:5609bf9ea82f [8921697.567858] exe[334730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609bf9203e8 cs:33 sp:7f3e45451f90 ax:7f3e45452020 si:ffffffffff600000 di:5609bf9ea82f [8921968.447628] exe[302117] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921968.861166] exe[278180] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921968.898734] exe[291001] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.195353] exe[301861] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.260355] exe[275553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.294223] exe[304020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.357146] exe[278180] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.423217] exe[293929] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.472100] exe[319655] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8921969.528282] exe[346728] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8923002.839553] warn_bad_vsyscall: 42 callbacks suppressed [8923002.839555] exe[283144] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8923003.209289] exe[299681] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8923003.597372] exe[303801] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8923411.018742] exe[390984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560111a80576 cs:33 sp:7fcb685b38e8 ax:ffffffffff600000 si:7fcb685b3e08 di:ffffffffff600000 [8923411.094044] exe[390958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560111a80576 cs:33 sp:7fcb685b38e8 ax:ffffffffff600000 si:7fcb685b3e08 di:ffffffffff600000 [8923411.169296] exe[390992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560111a80576 cs:33 sp:7fcb685b38e8 ax:ffffffffff600000 si:7fcb685b3e08 di:ffffffffff600000 [8923810.090621] exe[367572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd91bec576 cs:33 sp:7f8cb4f7e8e8 ax:ffffffffff600000 si:7f8cb4f7ee08 di:ffffffffff600000 [8923810.863659] exe[296223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd91bec576 cs:33 sp:7f8cb4f5d8e8 ax:ffffffffff600000 si:7f8cb4f5de08 di:ffffffffff600000 [8923811.022615] exe[372254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd91bec576 cs:33 sp:7f8cb4f7e8e8 ax:ffffffffff600000 si:7f8cb4f7ee08 di:ffffffffff600000 [8924335.518201] exe[282987] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8924336.043307] exe[282930] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8924336.353445] exe[294201] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8925415.029927] exe[290192] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8925417.112639] exe[273583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8925419.802743] exe[280918] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8925581.471033] exe[303927] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8925581.858014] exe[282615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8925582.249642] exe[289314] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8926088.698323] exe[293583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8926089.036151] exe[281022] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8926089.332724] exe[282925] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8926089.430541] exe[284623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8926729.511672] exe[473314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2f04b576 cs:33 sp:7f57045508e8 ax:ffffffffff600000 si:7f5704550e08 di:ffffffffff600000 [8926729.578736] exe[465274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2f04b576 cs:33 sp:7f57044ed8e8 ax:ffffffffff600000 si:7f57044ede08 di:ffffffffff600000 [8926729.655912] exe[473383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2f04b576 cs:33 sp:7f570450e8e8 ax:ffffffffff600000 si:7f570450ee08 di:ffffffffff600000 [8926729.655917] exe[473842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2f04b576 cs:33 sp:7f57045508e8 ax:ffffffffff600000 si:7f5704550e08 di:ffffffffff600000 [8926946.237420] exe[452795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1dc54a576 cs:33 sp:7fcbb3caf8e8 ax:ffffffffff600000 si:7fcbb3cafe08 di:ffffffffff600000 [8926946.352865] exe[453795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1dc54a576 cs:33 sp:7fcbb3caf8e8 ax:ffffffffff600000 si:7fcbb3cafe08 di:ffffffffff600000 [8926946.478639] exe[461517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1dc54a576 cs:33 sp:7fcbb3caf8e8 ax:ffffffffff600000 si:7fcbb3cafe08 di:ffffffffff600000 [8927909.587596] exe[275165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8927910.074767] exe[290679] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8927910.491952] exe[275165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8928184.161620] exe[444062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b060b0e3e8 cs:33 sp:7ee4f90c9f90 ax:7ee4f90ca020 si:ffffffffff600000 di:55b060bd882f [8928184.361296] exe[449175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b060b0e3e8 cs:33 sp:7ee4f90c9f90 ax:7ee4f90ca020 si:ffffffffff600000 di:55b060bd882f [8928184.582111] exe[432577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b060b0e3e8 cs:33 sp:7ee4f90a8f90 ax:7ee4f90a9020 si:ffffffffff600000 di:55b060bd882f [8928350.346987] exe[290703] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8928350.819766] exe[271915] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8928351.291625] exe[293726] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8928576.566367] exe[454352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584a6341576 cs:33 sp:7f0a927b38e8 ax:ffffffffff600000 si:7f0a927b3e08 di:ffffffffff600000 [8928577.265018] exe[450213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584a6341576 cs:33 sp:7f0a927b38e8 ax:ffffffffff600000 si:7f0a927b3e08 di:ffffffffff600000 [8928577.305400] exe[456005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584a6341576 cs:33 sp:7f0a927928e8 ax:ffffffffff600000 si:7f0a92792e08 di:ffffffffff600000 [8928577.424467] exe[451197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584a6341576 cs:33 sp:7f0a927b38e8 ax:ffffffffff600000 si:7f0a927b3e08 di:ffffffffff600000 [8928577.460733] exe[450213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584a6341576 cs:33 sp:7f0a927928e8 ax:ffffffffff600000 si:7f0a92792e08 di:ffffffffff600000 [8928720.514766] exe[524848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b691c9e576 cs:33 sp:7f3653faa8e8 ax:ffffffffff600000 si:7f3653faae08 di:ffffffffff600000 [8928720.562967] exe[528938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b691c9e576 cs:33 sp:7f3653faa8e8 ax:ffffffffff600000 si:7f3653faae08 di:ffffffffff600000 [8928721.373308] exe[523306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b691c9e576 cs:33 sp:7f3653faa8e8 ax:ffffffffff600000 si:7f3653faae08 di:ffffffffff600000 [8928721.395570] exe[523287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b691c9e576 cs:33 sp:7f3653faa8e8 ax:ffffffffff600000 si:7f3653faae08 di:ffffffffff600000 [8928961.729608] exe[507708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f2ac5576 cs:33 sp:7f79c5bf08e8 ax:ffffffffff600000 si:7f79c5bf0e08 di:ffffffffff600000 [8928961.794165] exe[507224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f2ac5576 cs:33 sp:7f79c5bcf8e8 ax:ffffffffff600000 si:7f79c5bcfe08 di:ffffffffff600000 [8928961.884266] exe[521255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f2ac5576 cs:33 sp:7f79c5bf08e8 ax:ffffffffff600000 si:7f79c5bf0e08 di:ffffffffff600000 [8928961.910864] exe[507239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f2ac5576 cs:33 sp:7f79c5bf08e8 ax:ffffffffff600000 si:7f79c5bf0e08 di:ffffffffff600000 [8928972.229212] exe[507317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.269547] exe[525453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.320025] exe[507229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.372539] exe[507224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.470878] exe[507229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.601702] exe[507242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.669515] exe[507706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8928972.761094] exe[525449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eacac3e576 cs:33 sp:7ff0554628e8 ax:ffffffffff600000 si:7ff055462e08 di:ffffffffff600000 [8930604.505134] exe[576534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a4f5f576 cs:33 sp:7fe5be2678e8 ax:ffffffffff600000 si:7fe5be267e08 di:ffffffffff600000 [8930604.695067] exe[577763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a4f5f576 cs:33 sp:7fe5be2678e8 ax:ffffffffff600000 si:7fe5be267e08 di:ffffffffff600000 [8930604.859277] exe[600859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a4f5f576 cs:33 sp:7fe5be2678e8 ax:ffffffffff600000 si:7fe5be267e08 di:ffffffffff600000 [8931323.460843] exe[562853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fd2eef576 cs:33 sp:7fb7127208e8 ax:ffffffffff600000 si:7fb712720e08 di:ffffffffff600000 [8931323.537745] exe[562296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fd2eef576 cs:33 sp:7fb7127208e8 ax:ffffffffff600000 si:7fb712720e08 di:ffffffffff600000 [8931323.591531] exe[610011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fd2eef576 cs:33 sp:7fb7127208e8 ax:ffffffffff600000 si:7fb712720e08 di:ffffffffff600000 [8933083.810798] exe[691634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c42ce0171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:28000 [8933095.003414] exe[676313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c42ce0171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:28000 [8933105.578060] exe[670972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c42ce0171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:28000 [8935960.811809] exe[711027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653e570c576 cs:33 sp:7fe1ecffe8e8 ax:ffffffffff600000 si:7fe1ecffee08 di:ffffffffff600000 [8935961.556207] exe[742402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653e570c576 cs:33 sp:7fe1ecffe8e8 ax:ffffffffff600000 si:7fe1ecffee08 di:ffffffffff600000 [8935961.688281] exe[788083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653e570c576 cs:33 sp:7fe1ecffe8e8 ax:ffffffffff600000 si:7fe1ecffee08 di:ffffffffff600000 [8937320.867602] exe[817853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937320.968644] exe[817775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6df4d8e8 ax:ffffffffff600000 si:7f1f6df4de08 di:ffffffffff600000 [8937321.070028] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.092584] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.117915] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.141390] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.163622] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.187125] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.210763] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8937321.232914] exe[817833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e096d1a576 cs:33 sp:7f1f6dfd18e8 ax:ffffffffff600000 si:7f1f6dfd1e08 di:ffffffffff600000 [8938537.601689] warn_bad_vsyscall: 57 callbacks suppressed [8938537.601692] exe[838554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd166ab576 cs:33 sp:7fccf1bd08e8 ax:ffffffffff600000 si:7fccf1bd0e08 di:ffffffffff600000 [8938537.713194] exe[838819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd166ab576 cs:33 sp:7fccf1bd08e8 ax:ffffffffff600000 si:7fccf1bd0e08 di:ffffffffff600000 [8938538.471987] exe[838222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd166ab576 cs:33 sp:7fccf1b8e8e8 ax:ffffffffff600000 si:7fccf1b8ee08 di:ffffffffff600000 [8939076.840938] exe[839102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587a597d576 cs:33 sp:7eeae8dfe8e8 ax:ffffffffff600000 si:7eeae8dfee08 di:ffffffffff600000 [8939076.887204] exe[839192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587a597d576 cs:33 sp:7eeae8ddd8e8 ax:ffffffffff600000 si:7eeae8ddde08 di:ffffffffff600000 [8939076.947141] exe[859330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587a597d576 cs:33 sp:7eeae8ddd8e8 ax:ffffffffff600000 si:7eeae8ddde08 di:ffffffffff600000 [8939810.099296] exe[905617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8939810.351419] exe[890988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8939810.566382] exe[891015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8939835.402422] exe[890917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939835.599337] exe[905411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939836.338309] exe[899761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939836.504529] exe[899761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939836.682731] exe[906694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939837.320639] exe[890885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939837.489985] exe[905411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31428576 cs:33 sp:7eeaf50528e8 ax:ffffffffff600000 si:7eeaf5052e08 di:ffffffffff600000 [8939917.732540] exe[905832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef58a3a3e8 cs:33 sp:7fa0664c2f90 ax:7fa0664c3020 si:ffffffffff600000 di:55ef58b0482f [8939917.870786] exe[905539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef58a3a3e8 cs:33 sp:7fa0664a1f90 ax:7fa0664a2020 si:ffffffffff600000 di:55ef58b0482f [8939917.992243] exe[906045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef58a3a3e8 cs:33 sp:7fa0664a1f90 ax:7fa0664a2020 si:ffffffffff600000 di:55ef58b0482f [8940014.308775] exe[909981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03ae8f576 cs:33 sp:7fa6d96968e8 ax:ffffffffff600000 si:7fa6d9696e08 di:ffffffffff600000 [8940014.500795] exe[912164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03ae8f576 cs:33 sp:7fa6d96968e8 ax:ffffffffff600000 si:7fa6d9696e08 di:ffffffffff600000 [8940014.755630] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03ae8f576 cs:33 sp:7fa6d96758e8 ax:ffffffffff600000 si:7fa6d9675e08 di:ffffffffff600000 [8941716.695511] exe[941262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587e1200576 cs:33 sp:7f3493a4df88 ax:ffffffffff600000 si:20000200 di:ffffffffff600000 [8941716.795229] exe[939924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587e1200576 cs:33 sp:7f3493a4df88 ax:ffffffffff600000 si:20000200 di:ffffffffff600000 [8941716.829950] exe[940107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587e1200576 cs:33 sp:7f34935fef88 ax:ffffffffff600000 si:20000200 di:ffffffffff600000 [8941716.939356] exe[939480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587e1200576 cs:33 sp:7f3493a4df88 ax:ffffffffff600000 si:20000200 di:ffffffffff600000 [8942131.089688] exe[967775] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8942131.390059] exe[972129] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8942131.484939] exe[974278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8942131.761961] exe[962176] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8942413.912007] exe[973210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584b889f576 cs:33 sp:7f70543ed8e8 ax:ffffffffff600000 si:7f70543ede08 di:ffffffffff600000 [8942414.002006] exe[966927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584b889f576 cs:33 sp:7f70543cc8e8 ax:ffffffffff600000 si:7f70543cce08 di:ffffffffff600000 [8942414.074627] exe[967614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584b889f576 cs:33 sp:7f70543cc8e8 ax:ffffffffff600000 si:7f70543cce08 di:ffffffffff600000 [8942414.074763] exe[967687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584b889f576 cs:33 sp:7f70543ed8e8 ax:ffffffffff600000 si:7f70543ede08 di:ffffffffff600000 [8942422.818151] exe[988709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8978e8 ax:ffffffffff600000 si:7f615e897e08 di:ffffffffff600000 [8942422.957952] exe[988496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942422.992125] exe[988496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.023114] exe[989729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.053724] exe[988604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.087371] exe[988503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.149185] exe[988502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.184924] exe[988502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.212937] exe[988502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942423.244773] exe[988502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55584014e576 cs:33 sp:7f615e8768e8 ax:ffffffffff600000 si:7f615e876e08 di:ffffffffff600000 [8942764.765441] warn_bad_vsyscall: 26 callbacks suppressed [8942764.765444] exe[890915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8942765.384874] exe[905411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8942765.415062] exe[905411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8942765.530429] exe[897662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615141d7576 cs:33 sp:7ead47b9e8e8 ax:ffffffffff600000 si:7ead47b9ee08 di:ffffffffff600000 [8943413.335299] exe[928232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56069d027576 cs:33 sp:7f355be418e8 ax:ffffffffff600000 si:7f355be41e08 di:ffffffffff600000 [8943413.396373] exe[930668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56069d027576 cs:33 sp:7f355be418e8 ax:ffffffffff600000 si:7f355be41e08 di:ffffffffff600000 [8943413.468275] exe[957879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56069d027576 cs:33 sp:7f355be418e8 ax:ffffffffff600000 si:7f355be41e08 di:ffffffffff600000 [8944033.081426] exe[16879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558624d77576 cs:33 sp:7fc42d5548e8 ax:ffffffffff600000 si:7fc42d554e08 di:ffffffffff600000 [8944033.152807] exe[16845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558624d77576 cs:33 sp:7fc42d5548e8 ax:ffffffffff600000 si:7fc42d554e08 di:ffffffffff600000 [8944033.212160] exe[18893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558624d77576 cs:33 sp:7fc42d5338e8 ax:ffffffffff600000 si:7fc42d533e08 di:ffffffffff600000 [8944496.238256] exe[10112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f38371a8f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.388263] exe[2402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.424324] exe[7055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.462938] exe[21335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.515771] exe[10145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.555381] exe[2389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.592992] exe[2375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.631201] exe[2377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.670443] exe[2375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8944496.713446] exe[21769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e36a9576 cs:33 sp:7f3837187f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8945442.713073] warn_bad_vsyscall: 57 callbacks suppressed [8945442.713077] exe[84361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.526281] exe[91625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.548858] exe[91073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.569332] exe[91625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.589668] exe[85702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.610998] exe[91074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.632161] exe[91102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.657234] exe[85699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.679501] exe[91074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8945443.700081] exe[91102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f424e03e8 cs:33 sp:7ef7a7093f90 ax:7ef7a7094020 si:ffffffffff600000 di:557f425aa82f [8946633.737981] warn_bad_vsyscall: 57 callbacks suppressed [8946633.737984] exe[115655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d26968576 cs:33 sp:7edf62c58f88 ax:ffffffffff600000 si:20000580 di:ffffffffff600000 [8946633.843365] exe[114928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d26968576 cs:33 sp:7edf62c58f88 ax:ffffffffff600000 si:20000580 di:ffffffffff600000 [8946633.943311] exe[114936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d26968576 cs:33 sp:7edf62c37f88 ax:ffffffffff600000 si:20000580 di:ffffffffff600000 [8946864.658694] exe[94997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ad9adb576 cs:33 sp:7f432e5bff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8946864.780311] exe[90931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ad9adb576 cs:33 sp:7f432e5bff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8946864.818081] exe[90931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ad9adb576 cs:33 sp:7f432e59ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8946864.908601] exe[83287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ad9adb576 cs:33 sp:7f432e59ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8947145.077916] exe[121684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d269193e8 cs:33 sp:7edf62c58f90 ax:7edf62c59020 si:ffffffffff600000 di:561d269e382f [8947145.951421] exe[84361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d269193e8 cs:33 sp:7edf62c58f90 ax:7edf62c59020 si:ffffffffff600000 di:561d269e382f [8947146.813840] exe[121048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d269193e8 cs:33 sp:7edf62c58f90 ax:7edf62c59020 si:ffffffffff600000 di:561d269e382f [8947400.878725] exe[81670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558468709576 cs:33 sp:7f624e5c8f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [8947400.982383] exe[74056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558468709576 cs:33 sp:7f624e5c8f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [8947401.023281] exe[81286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558468709576 cs:33 sp:7f624e5c8f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [8947401.676542] exe[71368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558468709576 cs:33 sp:7f624e5c8f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [8947401.719266] exe[129547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558468709576 cs:33 sp:7f624e565f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [8948078.638472] exe[131165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df93182576 cs:33 sp:7fe78fa2af88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8948078.755890] exe[119016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df93182576 cs:33 sp:7fe78fa2af88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8948078.798177] exe[105101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df93182576 cs:33 sp:7fe78f5bcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8948078.925614] exe[142729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df93182576 cs:33 sp:7fe78fa2af88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [8948262.133446] exe[156247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ccb6a53e8 cs:33 sp:7eae8bd19f90 ax:7eae8bd1a020 si:ffffffffff600000 di:562ccb76f82f [8948262.230770] exe[156248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ccb6a53e8 cs:33 sp:7eae8bd19f90 ax:7eae8bd1a020 si:ffffffffff600000 di:562ccb76f82f [8948262.301401] exe[156248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ccb6a53e8 cs:33 sp:7eae8bd19f90 ax:7eae8bd1a020 si:ffffffffff600000 di:562ccb76f82f [8948264.322888] exe[156124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621ccda63e8 cs:33 sp:7ee1fd5dcf90 ax:7ee1fd5dd020 si:ffffffffff600000 di:5621cce7082f [8948265.247254] exe[156121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621ccda63e8 cs:33 sp:7ee1fd5dcf90 ax:7ee1fd5dd020 si:ffffffffff600000 di:5621cce7082f [8948265.330940] exe[158542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621ccda63e8 cs:33 sp:7ee1fd5bbf90 ax:7ee1fd5bc020 si:ffffffffff600000 di:5621cce7082f [8948265.331012] exe[156121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621ccda63e8 cs:33 sp:7ee1fd5dcf90 ax:7ee1fd5dd020 si:ffffffffff600000 di:5621cce7082f [8948819.975158] exe[171799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de77cf1576 cs:33 sp:7ede8ffa68e8 ax:ffffffffff600000 si:7ede8ffa6e08 di:ffffffffff600000 [8948820.569938] exe[172435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de77cf1576 cs:33 sp:7ede8ffa68e8 ax:ffffffffff600000 si:7ede8ffa6e08 di:ffffffffff600000 [8948820.803138] exe[171792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de77cf1576 cs:33 sp:7ede8ff858e8 ax:ffffffffff600000 si:7ede8ff85e08 di:ffffffffff600000 [8949522.822975] exe[202373] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8949523.374522] exe[186518] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8949523.728834] exe[153684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8949627.601236] exe[191318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f09d02c3e8 cs:33 sp:7f782e4e7f90 ax:7f782e4e8020 si:ffffffffff600000 di:55f09d0f682f [8949627.684497] exe[191318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f09d02c3e8 cs:33 sp:7f782e4c6f90 ax:7f782e4c7020 si:ffffffffff600000 di:55f09d0f682f [8949627.741720] exe[202271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f09d02c3e8 cs:33 sp:7f782e4c6f90 ax:7f782e4c7020 si:ffffffffff600000 di:55f09d0f682f [8949846.539903] exe[194709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56407ce32576 cs:33 sp:7f828cbcf8e8 ax:ffffffffff600000 si:7f828cbcfe08 di:ffffffffff600000 [8949847.287071] exe[195431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56407ce32576 cs:33 sp:7f828cb6c8e8 ax:ffffffffff600000 si:7f828cb6ce08 di:ffffffffff600000 [8949847.372604] exe[185961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56407ce32576 cs:33 sp:7f828cbcf8e8 ax:ffffffffff600000 si:7f828cbcfe08 di:ffffffffff600000 [8950063.968520] exe[191809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950064.047295] exe[174691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950064.870795] exe[199244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950268.411582] exe[183557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950268.517573] exe[183557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950268.613811] exe[183557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba725453e8 cs:33 sp:7ea62d2f5f90 ax:7ea62d2f6020 si:ffffffffff600000 di:55ba7260f82f [8950594.683655] exe[218973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627935e1576 cs:33 sp:7ef4f556b8e8 ax:ffffffffff600000 si:7ef4f556be08 di:ffffffffff600000 [8950594.801889] exe[171720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627935e1576 cs:33 sp:7ef4f556b8e8 ax:ffffffffff600000 si:7ef4f556be08 di:ffffffffff600000 [8950595.414990] exe[216313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627935e1576 cs:33 sp:7ef4f556b8e8 ax:ffffffffff600000 si:7ef4f556be08 di:ffffffffff600000 [8950802.099569] exe[153165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8950802.806288] exe[235597] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8950803.282290] exe[235607] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8950926.702055] exe[151512] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8950927.336881] exe[151289] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8950927.723401] exe[165222] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8951658.130511] exe[248345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966b16f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8951658.919485] exe[169617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966b16f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8951659.068544] exe[247909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966af5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [8951702.696107] exe[229389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e703753e8 cs:33 sp:7eff0e446f90 ax:7eff0e447020 si:ffffffffff600000 di:562e7043f82f [8951702.815494] exe[192284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e703753e8 cs:33 sp:7eff0e446f90 ax:7eff0e447020 si:ffffffffff600000 di:562e7043f82f [8951702.985455] exe[195446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e703753e8 cs:33 sp:7eff0e446f90 ax:7eff0e447020 si:ffffffffff600000 di:562e7043f82f [8951803.942232] exe[213827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966b168e8 ax:ffffffffff600000 si:7f3966b16e08 di:ffffffffff600000 [8951804.107372] exe[241006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966b168e8 ax:ffffffffff600000 si:7f3966b16e08 di:ffffffffff600000 [8951804.304498] exe[247895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d160b0576 cs:33 sp:7f3966ad48e8 ax:ffffffffff600000 si:7f3966ad4e08 di:ffffffffff600000 [8951919.302984] exe[210212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56281c909576 cs:33 sp:7f332b8e38e8 ax:ffffffffff600000 si:7f332b8e3e08 di:ffffffffff600000 [8952911.094747] exe[290872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a36802171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400 [8952911.182826] exe[290470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a36802171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400 [8952911.248855] exe[290475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a36802171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400 [8953093.441002] exe[288883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c06f92576 cs:33 sp:7f136f0648e8 ax:ffffffffff600000 si:7f136f064e08 di:ffffffffff600000 [8953093.873617] exe[296840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c06f92576 cs:33 sp:7f136f0438e8 ax:ffffffffff600000 si:7f136f043e08 di:ffffffffff600000 [8953094.185250] exe[291193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c06f92576 cs:33 sp:7f136f0648e8 ax:ffffffffff600000 si:7f136f064e08 di:ffffffffff600000 [8953202.549380] exe[259432] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.448466] exe[261080] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.547533] exe[289935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.614771] exe[261080] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.788464] exe[258248] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.844584] exe[259930] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.929144] exe[296220] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953203.985483] exe[261150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953204.083502] exe[260374] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953204.132374] exe[257675] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8953645.293032] warn_bad_vsyscall: 27 callbacks suppressed [8953645.293035] exe[260835] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953645.827573] exe[260835] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953645.981519] exe[258032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.042641] exe[258032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.114542] exe[260835] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.180619] exe[261012] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.249106] exe[258032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.334030] exe[258964] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.385822] exe[260835] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8953646.438330] exe[258964] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8954009.016927] warn_bad_vsyscall: 36 callbacks suppressed [8954009.016931] exe[299781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55970f03a3e8 cs:33 sp:7ff38e0acf90 ax:7ff38e0ad020 si:ffffffffff600000 di:55970f10482f [8954011.898763] exe[277008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55970f03a3e8 cs:33 sp:7ff38e0acf90 ax:7ff38e0ad020 si:ffffffffff600000 di:55970f10482f [8954012.046691] exe[286042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55970f03a3e8 cs:33 sp:7ff38e0acf90 ax:7ff38e0ad020 si:ffffffffff600000 di:55970f10482f [8954125.830767] exe[307752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.000989] exe[275861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.035149] exe[322616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.071054] exe[322616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.107484] exe[306531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.143670] exe[306531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.179837] exe[275861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.215615] exe[281017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.249827] exe[276379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954126.282773] exe[276379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d741ec3e8 cs:33 sp:7f8f38b17f90 ax:7f8f38b18020 si:ffffffffff600000 di:559d742b682f [8954257.237432] warn_bad_vsyscall: 35 callbacks suppressed [8954257.237435] exe[328608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eef8acc576 cs:33 sp:7eaaf67d48e8 ax:ffffffffff600000 si:7eaaf67d4e08 di:ffffffffff600000 [8954257.325726] exe[329342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eef8acc576 cs:33 sp:7eaaf67d48e8 ax:ffffffffff600000 si:7eaaf67d4e08 di:ffffffffff600000 [8954257.380638] exe[328322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eef8acc576 cs:33 sp:7eaaf67d48e8 ax:ffffffffff600000 si:7eaaf67d4e08 di:ffffffffff600000 [8954511.954303] exe[287480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaf5641576 cs:33 sp:7f1159dfe8e8 ax:ffffffffff600000 si:7f1159dfee08 di:ffffffffff600000 [8954512.089028] exe[321909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaf5641576 cs:33 sp:7f1159dfe8e8 ax:ffffffffff600000 si:7f1159dfee08 di:ffffffffff600000 [8954512.212965] exe[277008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaf5641576 cs:33 sp:7f1159ddd8e8 ax:ffffffffff600000 si:7f1159ddde08 di:ffffffffff600000 [8954641.027588] exe[310726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f22784576 cs:33 sp:7ee58a0718e8 ax:ffffffffff600000 si:7ee58a071e08 di:ffffffffff600000 [8954641.089595] exe[310468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f22784576 cs:33 sp:7ee58a0718e8 ax:ffffffffff600000 si:7ee58a071e08 di:ffffffffff600000 [8954641.151101] exe[281462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f22784576 cs:33 sp:7ee58a0718e8 ax:ffffffffff600000 si:7ee58a071e08 di:ffffffffff600000 [8954915.289203] exe[302239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.437887] exe[330969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.469893] exe[287992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.497882] exe[287992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.528177] exe[287992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.559300] exe[288080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.591788] exe[330969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.620341] exe[330969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.647733] exe[330969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8954915.676676] exe[330969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d0a7383e8 cs:33 sp:7f6bda7fef90 ax:7f6bda7ff020 si:ffffffffff600000 di:561d0a80282f [8955367.109533] warn_bad_vsyscall: 121 callbacks suppressed [8955367.109536] exe[314605] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8955367.749183] exe[314659] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8955368.148010] exe[257425] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8955427.835104] exe[324218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c4bea9576 cs:33 sp:7f4eeffea8e8 ax:ffffffffff600000 si:7f4eeffeae08 di:ffffffffff600000 [8955427.896094] exe[327308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c4bea9576 cs:33 sp:7f4eeffea8e8 ax:ffffffffff600000 si:7f4eeffeae08 di:ffffffffff600000 [8955427.973808] exe[324186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c4bea9576 cs:33 sp:7f4eeffea8e8 ax:ffffffffff600000 si:7f4eeffeae08 di:ffffffffff600000 [8956708.312778] exe[369804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956708.456741] exe[370891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.178179] exe[364413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.220851] exe[370891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.268815] exe[369874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.304417] exe[369937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.343238] exe[364413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.382808] exe[369937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.418746] exe[370891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956709.453430] exe[370891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f7d13f576 cs:33 sp:7eddaf29b8e8 ax:ffffffffff600000 si:7eddaf29be08 di:ffffffffff600000 [8956723.118333] warn_bad_vsyscall: 48 callbacks suppressed [8956723.118336] exe[374560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe76b3e576 cs:33 sp:7f6d74f2a8e8 ax:ffffffffff600000 si:7f6d74f2ae08 di:ffffffffff600000 [8956723.238513] exe[361854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe76b3e576 cs:33 sp:7f6d74f2a8e8 ax:ffffffffff600000 si:7f6d74f2ae08 di:ffffffffff600000 [8956723.330529] exe[374599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe76b3e576 cs:33 sp:7f6d74f2a8e8 ax:ffffffffff600000 si:7f6d74f2ae08 di:ffffffffff600000 [8956723.360207] exe[374599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe76b3e576 cs:33 sp:7f6d74f2a8e8 ax:ffffffffff600000 si:7f6d74f2ae08 di:ffffffffff600000 [8956790.896762] exe[353754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544a0f83e8 cs:33 sp:7fd8b0b33f90 ax:7fd8b0b34020 si:ffffffffff600000 di:56544a1c282f [8956791.722337] exe[355375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544a0f83e8 cs:33 sp:7fd8b0ad0f90 ax:7fd8b0ad1020 si:ffffffffff600000 di:56544a1c282f [8956791.806508] exe[367047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56544a0f83e8 cs:33 sp:7fd8b0b12f90 ax:7fd8b0b13020 si:ffffffffff600000 di:56544a1c282f [8956917.840306] exe[381067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ad631b576 cs:33 sp:7ee5cde888e8 ax:ffffffffff600000 si:7ee5cde88e08 di:ffffffffff600000 [8956918.078588] exe[362878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ad631b576 cs:33 sp:7ee5cde258e8 ax:ffffffffff600000 si:7ee5cde25e08 di:ffffffffff600000 [8956918.250182] exe[362878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ad631b576 cs:33 sp:7ee5cde468e8 ax:ffffffffff600000 si:7ee5cde46e08 di:ffffffffff600000 [8957115.336957] exe[368093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d2c4493e8 cs:33 sp:7f79bf754f90 ax:7f79bf755020 si:ffffffffff600000 di:556d2c51382f [8957115.475195] exe[366570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d2c4493e8 cs:33 sp:7f79bf754f90 ax:7f79bf755020 si:ffffffffff600000 di:556d2c51382f [8957115.591902] exe[377423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d2c4493e8 cs:33 sp:7f79bf754f90 ax:7f79bf755020 si:ffffffffff600000 di:556d2c51382f [8957801.535822] exe[356838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb89182576 cs:33 sp:7fd02a8268e8 ax:ffffffffff600000 si:7fd02a826e08 di:ffffffffff600000 [8957802.216364] exe[350109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb89182576 cs:33 sp:7fd02a8268e8 ax:ffffffffff600000 si:7fd02a826e08 di:ffffffffff600000 [8957802.374979] exe[357154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb89182576 cs:33 sp:7fd02a3fe8e8 ax:ffffffffff600000 si:7fd02a3fee08 di:ffffffffff600000 [8957858.972287] exe[372061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab5cc083e8 cs:33 sp:7fdc6cebef90 ax:7fdc6cebf020 si:ffffffffff600000 di:55ab5ccd282f [8957859.670819] exe[408567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab5cc083e8 cs:33 sp:7fdc6cebef90 ax:7fdc6cebf020 si:ffffffffff600000 di:55ab5ccd282f [8957859.802758] exe[393919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab5cc083e8 cs:33 sp:7fdc6cebef90 ax:7fdc6cebf020 si:ffffffffff600000 di:55ab5ccd282f [8958481.058547] exe[338751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d48058c576 cs:33 sp:7ec397baf8e8 ax:ffffffffff600000 si:7ec397bafe08 di:ffffffffff600000 [8958481.123645] exe[410815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d48058c576 cs:33 sp:7ec397baf8e8 ax:ffffffffff600000 si:7ec397bafe08 di:ffffffffff600000 [8958481.123694] exe[406434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d48058c576 cs:33 sp:7ec397b8e8e8 ax:ffffffffff600000 si:7ec397b8ee08 di:ffffffffff600000 [8958481.215199] exe[406396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d48058c576 cs:33 sp:7ec397baf8e8 ax:ffffffffff600000 si:7ec397bafe08 di:ffffffffff600000 [8958661.127014] exe[385938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe597ea576 cs:33 sp:7f16caaae8e8 ax:ffffffffff600000 si:7f16caaaee08 di:ffffffffff600000 [8958661.197810] exe[384741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe597ea576 cs:33 sp:7f16caaae8e8 ax:ffffffffff600000 si:7f16caaaee08 di:ffffffffff600000 [8958661.975988] exe[384999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe597ea576 cs:33 sp:7f16caaae8e8 ax:ffffffffff600000 si:7f16caaaee08 di:ffffffffff600000 [8959666.182533] exe[433712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f7114f3e8 cs:33 sp:7f7283cdcf90 ax:7f7283cdd020 si:ffffffffff600000 di:560f7121982f [8959666.994185] exe[433816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f7114f3e8 cs:33 sp:7f7283cfdf90 ax:7f7283cfe020 si:ffffffffff600000 di:560f7121982f [8959667.897872] exe[434103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f7114f3e8 cs:33 sp:7f7283c9af90 ax:7f7283c9b020 si:ffffffffff600000 di:560f7121982f [8959859.523962] exe[440473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb3568576 cs:33 sp:7f75df6358e8 ax:ffffffffff600000 si:7f75df635e08 di:ffffffffff600000 [8959859.631267] exe[446748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb3568576 cs:33 sp:7f75df6358e8 ax:ffffffffff600000 si:7f75df635e08 di:ffffffffff600000 [8959859.674878] exe[440566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb3568576 cs:33 sp:7f75df1dd8e8 ax:ffffffffff600000 si:7f75df1dde08 di:ffffffffff600000 [8959859.709982] exe[446738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8959859.792628] exe[450211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb3568576 cs:33 sp:7f75df6358e8 ax:ffffffffff600000 si:7f75df635e08 di:ffffffffff600000 [8959859.806909] exe[440655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8959859.901711] exe[440948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8959859.985893] exe[447085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8959860.064829] exe[440664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8959860.164567] exe[442523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d069302576 cs:33 sp:7f8d6f3058e8 ax:ffffffffff600000 si:7f8d6f305e08 di:ffffffffff600000 [8960243.095136] warn_bad_vsyscall: 4 callbacks suppressed [8960243.095139] exe[435468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55758b8383e8 cs:33 sp:7edce9f15f90 ax:7edce9f16020 si:ffffffffff600000 di:55758b90282f [8960243.801684] exe[434196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55758b8383e8 cs:33 sp:7edce9f15f90 ax:7edce9f16020 si:ffffffffff600000 di:55758b90282f [8960243.929667] exe[432494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55758b8383e8 cs:33 sp:7edce9f15f90 ax:7edce9f16020 si:ffffffffff600000 di:55758b90282f [8961548.516989] exe[492456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961548.567164] exe[493073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961548.616785] exe[493692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389cc8e8 ax:ffffffffff600000 si:7fe9389cce08 di:ffffffffff600000 [8961567.745230] exe[496900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961567.818093] exe[496900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961567.889679] exe[492286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961567.955785] exe[494138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.019392] exe[496902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.078135] exe[494138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.132702] exe[496902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.202827] exe[498766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.262617] exe[494119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8961568.320959] exe[496900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8962097.165538] warn_bad_vsyscall: 3 callbacks suppressed [8962097.165541] exe[496905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8962097.228254] exe[492461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8962097.229044] exe[499993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389cc8e8 ax:ffffffffff600000 si:7fe9389cce08 di:ffffffffff600000 [8962097.292660] exe[500883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d021ce576 cs:33 sp:7fe9389ed8e8 ax:ffffffffff600000 si:7fe9389ede08 di:ffffffffff600000 [8962176.232610] exe[500552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56551bfdf576 cs:33 sp:7ff286e5d8e8 ax:ffffffffff600000 si:7ff286e5de08 di:ffffffffff600000 [8962176.325484] exe[500830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56551bfdf576 cs:33 sp:7ff286e3c8e8 ax:ffffffffff600000 si:7ff286e3ce08 di:ffffffffff600000 [8962176.387134] exe[500830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56551bfdf576 cs:33 sp:7ff286e3c8e8 ax:ffffffffff600000 si:7ff286e3ce08 di:ffffffffff600000 [8962176.770432] exe[488957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962176.895696] exe[488777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962177.086151] exe[502000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962177.178437] exe[488869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962177.303839] exe[489377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962177.403958] exe[488777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8962177.484742] exe[488766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b7f08a576 cs:33 sp:7fe31ab298e8 ax:ffffffffff600000 si:7fe31ab29e08 di:ffffffffff600000 [8964943.834714] warn_bad_vsyscall: 4 callbacks suppressed [8964943.834717] exe[600830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74ecd0576 cs:33 sp:7fb000e498e8 ax:ffffffffff600000 si:7fb000e49e08 di:ffffffffff600000 [8964943.899110] exe[600868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74ecd0576 cs:33 sp:7fb000e498e8 ax:ffffffffff600000 si:7fb000e49e08 di:ffffffffff600000 [8964943.972076] exe[599230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74ecd0576 cs:33 sp:7fb000e498e8 ax:ffffffffff600000 si:7fb000e49e08 di:ffffffffff600000 [8964944.276206] exe[599080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.352272] exe[600048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.438464] exe[590766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.550885] exe[598920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.656692] exe[598850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.745360] exe[600194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8964944.821121] exe[599701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4bc422576 cs:33 sp:7f9e2fee88e8 ax:ffffffffff600000 si:7f9e2fee8e08 di:ffffffffff600000 [8965314.008800] warn_bad_vsyscall: 1 callbacks suppressed [8965314.008803] exe[615357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8965314.069512] exe[601178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8965314.088586] exe[613911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa3b20c576 cs:33 sp:7f3c0184e8e8 ax:ffffffffff600000 si:7f3c0184ee08 di:ffffffffff600000 [8965314.139881] exe[620915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8965314.156751] exe[600799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa3b20c576 cs:33 sp:7f3c0184e8e8 ax:ffffffffff600000 si:7f3c0184ee08 di:ffffffffff600000 [8965314.161121] exe[620915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62688e8 ax:ffffffffff600000 si:7eefb6268e08 di:ffffffffff600000 [8965314.186532] exe[613911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa3b20c576 cs:33 sp:7f3c0182d8e8 ax:ffffffffff600000 si:7f3c0182de08 di:ffffffffff600000 [8965314.264366] exe[600376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa3b20c576 cs:33 sp:7f3c0184e8e8 ax:ffffffffff600000 si:7f3c0184ee08 di:ffffffffff600000 [8965318.294665] exe[627998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8965318.337761] exe[619207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8965638.335233] warn_bad_vsyscall: 3 callbacks suppressed [8965638.335236] exe[641338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bfe8e8 ax:ffffffffff600000 si:7f3d09bfee08 di:ffffffffff600000 [8965638.450889] exe[641511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.477226] exe[641511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.505595] exe[641511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.539019] exe[643038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.570091] exe[641381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.598375] exe[641381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.641872] exe[641692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.669793] exe[641692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965638.697101] exe[641692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e2bf8576 cs:33 sp:7f3d09bdd8e8 ax:ffffffffff600000 si:7f3d09bdde08 di:ffffffffff600000 [8965678.912469] warn_bad_vsyscall: 57 callbacks suppressed [8965678.912472] exe[644419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592235b4576 cs:33 sp:7f41f4372f88 ax:ffffffffff600000 si:20004300 di:ffffffffff600000 [8965679.043302] exe[644417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592235b4576 cs:33 sp:7f41f4330f88 ax:ffffffffff600000 si:20004300 di:ffffffffff600000 [8965679.146866] exe[631186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592235b4576 cs:33 sp:7f41f4372f88 ax:ffffffffff600000 si:20004300 di:ffffffffff600000 [8965679.150860] exe[643600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592235b4576 cs:33 sp:7f41f4351f88 ax:ffffffffff600000 si:20004300 di:ffffffffff600000 [8966187.741821] exe[651236] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8966188.030085] exe[651319] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8966188.268118] exe[651287] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8966828.465596] exe[648330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8966828.538269] exe[628960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8966828.588624] exe[668436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62898e8 ax:ffffffffff600000 si:7eefb6289e08 di:ffffffffff600000 [8966904.847123] exe[673490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1f80af576 cs:33 sp:7fc2179618e8 ax:ffffffffff600000 si:7fc217961e08 di:ffffffffff600000 [8966904.930266] exe[676935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1f80af576 cs:33 sp:7fc2179618e8 ax:ffffffffff600000 si:7fc217961e08 di:ffffffffff600000 [8966905.029469] exe[673623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1f80af576 cs:33 sp:7fc2179408e8 ax:ffffffffff600000 si:7fc217940e08 di:ffffffffff600000 [8967120.004159] exe[655089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd9c4c8576 cs:33 sp:7f40128a68e8 ax:ffffffffff600000 si:7f40128a6e08 di:ffffffffff600000 [8967120.124653] exe[655081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd9c4c8576 cs:33 sp:7f40128a68e8 ax:ffffffffff600000 si:7f40128a6e08 di:ffffffffff600000 [8967120.208782] exe[649192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd9c4c8576 cs:33 sp:7f40128a68e8 ax:ffffffffff600000 si:7f40128a6e08 di:ffffffffff600000 [8967607.249033] exe[615455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62478e8 ax:ffffffffff600000 si:7eefb6247e08 di:ffffffffff600000 [8967607.998134] exe[615403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62688e8 ax:ffffffffff600000 si:7eefb6268e08 di:ffffffffff600000 [8967608.945844] exe[615455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d16bbd2576 cs:33 sp:7eefb62268e8 ax:ffffffffff600000 si:7eefb6226e08 di:ffffffffff600000 [8968381.235415] exe[709426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56386875f576 cs:33 sp:7f11f410d8e8 ax:ffffffffff600000 si:7f11f410de08 di:ffffffffff600000 [8968381.374110] exe[709781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56386875f576 cs:33 sp:7f11f40ec8e8 ax:ffffffffff600000 si:7f11f40ece08 di:ffffffffff600000 [8968381.510270] exe[709632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56386875f576 cs:33 sp:7f11f410d8e8 ax:ffffffffff600000 si:7f11f410de08 di:ffffffffff600000 [8968381.511009] exe[709812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56386875f576 cs:33 sp:7f11f40ec8e8 ax:ffffffffff600000 si:7f11f40ece08 di:ffffffffff600000 [8968760.014608] exe[739166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b4d01576 cs:33 sp:7fe255cc38e8 ax:ffffffffff600000 si:7fe255cc3e08 di:ffffffffff600000 [8968760.212402] exe[733009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b4d01576 cs:33 sp:7fe255c818e8 ax:ffffffffff600000 si:7fe255c81e08 di:ffffffffff600000 [8968760.404988] exe[736804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b4d01576 cs:33 sp:7fe255ca28e8 ax:ffffffffff600000 si:7fe255ca2e08 di:ffffffffff600000 [8970133.736346] exe[756400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fef56de576 cs:33 sp:7f2c2ff348e8 ax:ffffffffff600000 si:7f2c2ff34e08 di:ffffffffff600000 [8970133.969880] exe[786442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fef56de576 cs:33 sp:7f2c2fef28e8 ax:ffffffffff600000 si:7f2c2fef2e08 di:ffffffffff600000 [8970134.461071] exe[774783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fef56de576 cs:33 sp:7f2c2fef28e8 ax:ffffffffff600000 si:7f2c2fef2e08 di:ffffffffff600000 [8970886.700556] exe[785361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970886.810224] exe[785314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970886.845636] exe[785254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110fdd8e8 ax:ffffffffff600000 si:7f9110fdde08 di:ffffffffff600000 [8970886.930440] exe[785285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110fdd8e8 ax:ffffffffff600000 si:7f9110fdde08 di:ffffffffff600000 [8970887.966699] exe[785207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970888.069304] exe[785331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970888.173634] exe[785296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970888.280036] exe[785286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970888.373754] exe[799813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8970888.508039] exe[785243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ad67dd576 cs:33 sp:7f9110ffe8e8 ax:ffffffffff600000 si:7f9110ffee08 di:ffffffffff600000 [8971788.073355] warn_bad_vsyscall: 8 callbacks suppressed [8971788.073358] exe[774687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971788.220902] exe[774687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971788.989352] exe[738619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971788.990151] exe[720471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d61f90 ax:7fa3e4d62020 si:ffffffffff600000 di:55822dc4e82f [8971817.402552] exe[752396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.576923] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.604217] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.631394] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.661158] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.688773] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.718973] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.746447] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.772964] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971817.801132] exe[786467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55822db843e8 cs:33 sp:7fa3e4d82f90 ax:7fa3e4d83020 si:ffffffffff600000 di:55822dc4e82f [8971948.834977] warn_bad_vsyscall: 57 callbacks suppressed [8971948.834980] exe[822524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fdaea171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971949.547322] exe[822525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fdaea171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971949.560317] exe[822641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fdaea171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971949.705294] exe[822548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971949.927828] exe[822692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971949.930299] exe[822595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fdaea171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971951.970541] exe[822786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971952.098902] exe[822803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971952.164540] exe[822487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971952.787084] exe[822524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971953.846210] warn_bad_vsyscall: 16 callbacks suppressed [8971953.846214] exe[822557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8971953.882184] exe[822936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea066c171 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000000 [8972268.791324] exe[789353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca472c9576 cs:33 sp:7fdde17118e8 ax:ffffffffff600000 si:7fdde1711e08 di:ffffffffff600000 [8972268.842831] exe[816327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca472c9576 cs:33 sp:7fdde17118e8 ax:ffffffffff600000 si:7fdde1711e08 di:ffffffffff600000 [8972268.842893] exe[791900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca472c9576 cs:33 sp:7fdde16f08e8 ax:ffffffffff600000 si:7fdde16f0e08 di:ffffffffff600000 [8972268.941562] exe[816321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca472c9576 cs:33 sp:7fdde16f08e8 ax:ffffffffff600000 si:7fdde16f0e08 di:ffffffffff600000 [8972277.681185] exe[789301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972277.734162] exe[789367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972277.783532] exe[789362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972277.852264] exe[790251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972277.908737] exe[789362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972277.988981] exe[790248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972278.067356] exe[790897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972278.113622] exe[789482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972278.170051] exe[789497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972278.224118] exe[790262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.687362] warn_bad_vsyscall: 327 callbacks suppressed [8972282.687366] exe[789905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.717386] exe[793112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.762814] exe[789334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.815162] exe[790015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.861467] exe[789339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.907206] exe[816327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.962440] exe[789457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972282.986910] exe[789339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972283.066255] exe[789497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972283.093935] exe[789505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972287.707409] warn_bad_vsyscall: 191 callbacks suppressed [8972287.707413] exe[791898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972287.762118] exe[790259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972287.802182] exe[791910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972287.954111] exe[789406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972288.026650] exe[790254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972288.026712] exe[790248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972288.099562] exe[791914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972288.152355] exe[789429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972288.207840] exe[789453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972288.257406] exe[789429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972292.842581] warn_bad_vsyscall: 260 callbacks suppressed [8972292.842585] exe[790015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972292.890313] exe[789437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972292.940465] exe[793112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972292.993888] exe[789365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972293.055611] exe[789359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972293.101938] exe[790288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f288e8 ax:ffffffffff600000 si:7f9bb7f28e08 di:ffffffffff600000 [8972293.156448] exe[790252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972293.210555] exe[789368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972293.235190] exe[792638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972293.282675] exe[790269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6cbde576 cs:33 sp:7f9bb7f498e8 ax:ffffffffff600000 si:7f9bb7f49e08 di:ffffffffff600000 [8972314.814429] warn_bad_vsyscall: 5 callbacks suppressed [8972314.814432] exe[822443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fda8a3e8 cs:33 sp:7f8bd53fef90 ax:7f8bd53ff020 si:ffffffffff600000 di:5631fdb5482f [8972314.886241] exe[825589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fda8a3e8 cs:33 sp:7f8bd53fef90 ax:7f8bd53ff020 si:ffffffffff600000 di:5631fdb5482f [8972314.957066] exe[822540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631fda8a3e8 cs:33 sp:7f8bd53fef90 ax:7f8bd53ff020 si:ffffffffff600000 di:5631fdb5482f [8972315.458539] exe[833193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.515664] exe[822457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.570867] exe[827410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.650466] exe[822588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.713644] exe[822517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.785318] exe[831294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972315.850467] exe[825066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8f73c63e8 cs:33 sp:7f0e1fb73f90 ax:7f0e1fb74020 si:ffffffffff600000 di:55d8f749082f [8972323.455465] warn_bad_vsyscall: 16 callbacks suppressed [8972323.455468] exe[813764] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972324.168168] exe[798221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972324.346819] exe[798346] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972325.061926] exe[798162] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972379.065694] exe[715587] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972379.806783] exe[676953] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972379.968744] exe[677164] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8972380.397174] exe[677164] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8973138.805702] exe[835024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973138.849233] exe[834387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973138.870730] exe[835024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973138.912363] exe[834385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.274144] exe[835024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.320572] exe[834386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.370870] exe[834385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.410867] exe[834386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.453394] exe[835024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973139.493221] exe[834387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c44de683e8 cs:33 sp:7ece0fc67f90 ax:7ece0fc68020 si:ffffffffff600000 di:55c44df3282f [8973470.887214] warn_bad_vsyscall: 13 callbacks suppressed [8973470.887218] exe[903791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff5bdaf3e8 cs:33 sp:7eef39140f90 ax:7eef39141020 si:ffffffffff600000 di:55ff5be7982f [8973599.065892] exe[904828] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [8973629.117928] exe[900282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e7b5fd3e8 cs:33 sp:7ecd25b63f90 ax:7ecd25b64020 si:ffffffffff600000 di:564e7b6c782f [8973709.596691] exe[911755] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8973807.208708] exe[915950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0886425a6 cs:33 sp:7f162a0e28e8 ax:ffffffffff600000 si:7f162a0e2e08 di:ffffffffff600000 [8973807.304875] exe[908531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0886425a6 cs:33 sp:7f162a0e28e8 ax:ffffffffff600000 si:7f162a0e2e08 di:ffffffffff600000 [8973807.395990] exe[912789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0886425a6 cs:33 sp:7f162a0e28e8 ax:ffffffffff600000 si:7f162a0e2e08 di:ffffffffff600000 [8973807.490631] exe[916030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0886425a6 cs:33 sp:7f162a0e28e8 ax:ffffffffff600000 si:7f162a0e2e08 di:ffffffffff600000 [8973840.816928] exe[906321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561718edc5a6 cs:33 sp:7fa0c80438e8 ax:ffffffffff600000 si:7fa0c8043e08 di:ffffffffff600000 [8973840.930674] exe[913903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561718edc5a6 cs:33 sp:7fa0c80438e8 ax:ffffffffff600000 si:7fa0c8043e08 di:ffffffffff600000 [8973841.019477] exe[906380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561718edc5a6 cs:33 sp:7fa0c80438e8 ax:ffffffffff600000 si:7fa0c8043e08 di:ffffffffff600000 [8973841.111641] exe[913880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561718edc5a6 cs:33 sp:7fa0c80438e8 ax:ffffffffff600000 si:7fa0c8043e08 di:ffffffffff600000 [8973874.090790] exe[910843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564983a1f5a6 cs:33 sp:7f28f0bc08e8 ax:ffffffffff600000 si:7f28f0bc0e08 di:ffffffffff600000 [8973874.154807] exe[917949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564983a1f5a6 cs:33 sp:7f28f0bc08e8 ax:ffffffffff600000 si:7f28f0bc0e08 di:ffffffffff600000 [8973874.217307] exe[918065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564983a1f5a6 cs:33 sp:7f28f0bc08e8 ax:ffffffffff600000 si:7f28f0bc0e08 di:ffffffffff600000 [8973874.281905] exe[916091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564983a1f5a6 cs:33 sp:7f28f0bc08e8 ax:ffffffffff600000 si:7f28f0bc0e08 di:ffffffffff600000 [8973884.143545] exe[906247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556969a605a6 cs:33 sp:7f0f47e418e8 ax:ffffffffff600000 si:7f0f47e41e08 di:ffffffffff600000 [8973884.216834] exe[913561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556969a605a6 cs:33 sp:7f0f47e418e8 ax:ffffffffff600000 si:7f0f47e41e08 di:ffffffffff600000 [8973884.271068] exe[915743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556969a605a6 cs:33 sp:7f0f47e418e8 ax:ffffffffff600000 si:7f0f47e41e08 di:ffffffffff600000 [8973884.319591] exe[905115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556969a605a6 cs:33 sp:7f0f47e418e8 ax:ffffffffff600000 si:7f0f47e41e08 di:ffffffffff600000 [8974250.300687] exe[923947] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8974311.999938] exe[906150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8974470.738657] exe[906603] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8974572.543037] exe[929326] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [8974596.657033] exe[915740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [8974633.456127] exe[925438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642d7aa55a6 cs:33 sp:7edcd0c858e8 ax:ffffffffff600000 si:7edcd0c85e08 di:ffffffffff600000 [8974633.517377] exe[924814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642d7aa55a6 cs:33 sp:7edcd0c858e8 ax:ffffffffff600000 si:7edcd0c85e08 di:ffffffffff600000 [8974633.626872] exe[894957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642d7aa55a6 cs:33 sp:7edcd0c858e8 ax:ffffffffff600000 si:7edcd0c85e08 di:ffffffffff600000 [8974633.702423] exe[923536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642d7aa55a6 cs:33 sp:7edcd0c858e8 ax:ffffffffff600000 si:7edcd0c85e08 di:ffffffffff600000 [8974937.700313] exe[945295] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [8975011.388273] exe[927141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564983a1f5a6 cs:33 sp:7f28f0bc08e8 ax:ffffffffff600000 si:7f28f0bc0e08 di:ffffffffff600000 [8975158.266015] exe[930944] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [8975339.012393] exe[913193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8975341.793414] exe[945420] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8975652.897334] exe[946381] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [8975772.533354] exe[898754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557398f3a5a6 cs:33 sp:7f07b55fe8e8 ax:ffffffffff600000 si:7f07b55fee08 di:ffffffffff600000 [8975956.433239] exe[905488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ef32e55a6 cs:33 sp:7fa8931408e8 ax:ffffffffff600000 si:7fa893140e08 di:ffffffffff600000 [8976093.313105] exe[955391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfeaf9b5a6 cs:33 sp:7f5fbdcb78e8 ax:ffffffffff600000 si:7f5fbdcb7e08 di:ffffffffff600000 [8976732.694684] exe[970842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1f21e5a6 cs:33 sp:7fc2e5bcf8e8 ax:ffffffffff600000 si:7fc2e5bcfe08 di:ffffffffff600000 [8976732.813560] exe[969371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1f21e5a6 cs:33 sp:7fc2e5bcf8e8 ax:ffffffffff600000 si:7fc2e5bcfe08 di:ffffffffff600000 [8976732.929855] exe[975806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1f21e5a6 cs:33 sp:7fc2e5bcf8e8 ax:ffffffffff600000 si:7fc2e5bcfe08 di:ffffffffff600000 [8976733.058737] exe[969142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1f21e5a6 cs:33 sp:7fc2e5bcf8e8 ax:ffffffffff600000 si:7fc2e5bcfe08 di:ffffffffff600000 [8977119.107175] exe[991000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d95a1715a6 cs:33 sp:7fe16cf388e8 ax:ffffffffff600000 si:7fe16cf38e08 di:ffffffffff600000 [8977253.166682] exe[987535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8318085a6 cs:33 sp:7ee50aaa68e8 ax:ffffffffff600000 si:7ee50aaa6e08 di:ffffffffff600000 [8977278.864491] exe[986020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fe27565a6 cs:33 sp:7eadb16428e8 ax:ffffffffff600000 si:7eadb1642e08 di:ffffffffff600000 [8977278.973778] exe[6681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fe27565a6 cs:33 sp:7eadb16428e8 ax:ffffffffff600000 si:7eadb1642e08 di:ffffffffff600000 [8977279.075950] exe[986029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fe27565a6 cs:33 sp:7eadb16428e8 ax:ffffffffff600000 si:7eadb1642e08 di:ffffffffff600000 [8977279.169935] exe[7389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fe27565a6 cs:33 sp:7eadb16428e8 ax:ffffffffff600000 si:7eadb1642e08 di:ffffffffff600000 [8977546.285548] exe[6988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e03bf865a6 cs:33 sp:7f64c8ec38e8 ax:ffffffffff600000 si:7f64c8ec3e08 di:ffffffffff600000 [8977546.403281] exe[16112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e03bf865a6 cs:33 sp:7f64c8ec38e8 ax:ffffffffff600000 si:7f64c8ec3e08 di:ffffffffff600000 [8977546.527445] exe[6721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e03bf865a6 cs:33 sp:7f64c8ec38e8 ax:ffffffffff600000 si:7f64c8ec3e08 di:ffffffffff600000 [8977546.550100] exe[14930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c8251f5a6 cs:33 sp:7f7b7d2918e8 ax:ffffffffff600000 si:7f7b7d291e08 di:ffffffffff600000 [8977546.551961] exe[11182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561536cac5a6 cs:33 sp:7fbdfff5b8e8 ax:ffffffffff600000 si:7fbdfff5be08 di:ffffffffff600000 [8977546.659257] exe[11390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e03bf865a6 cs:33 sp:7f64c8ec38e8 ax:ffffffffff600000 si:7f64c8ec3e08 di:ffffffffff600000 [8977546.667250] exe[14943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c8251f5a6 cs:33 sp:7f7b7d2918e8 ax:ffffffffff600000 si:7f7b7d291e08 di:ffffffffff600000 [8977546.675881] exe[6721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561536cac5a6 cs:33 sp:7fbdfff5b8e8 ax:ffffffffff600000 si:7fbdfff5be08 di:ffffffffff600000 [8977546.764988] exe[14943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561536cac5a6 cs:33 sp:7fbdfff5b8e8 ax:ffffffffff600000 si:7fbdfff5be08 di:ffffffffff600000 [8977546.790066] exe[6542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c8251f5a6 cs:33 sp:7f7b7d2918e8 ax:ffffffffff600000 si:7f7b7d291e08 di:ffffffffff600000 [8977954.488557] exe[19930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2d5e45a6 cs:33 sp:7f594daccf88 ax:ffffffffff600000 si:20000280 di:ffffffffff600000 [8977955.252463] exe[21919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2d5e45a6 cs:33 sp:7f594daabf88 ax:ffffffffff600000 si:20000280 di:ffffffffff600000 [8977955.360889] exe[21751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2d5e45a6 cs:33 sp:7f594daccf88 ax:ffffffffff600000 si:20000280 di:ffffffffff600000 [8979141.442692] exe[42477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2d34c65a6 cs:33 sp:7f87155498e8 ax:ffffffffff600000 si:7f8715549e08 di:ffffffffff600000 [8979190.673428] exe[994598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0f5e0f5a6 cs:33 sp:7f0c70e628e8 ax:ffffffffff600000 si:7f0c70e62e08 di:ffffffffff600000 [8979566.173513] exe[49479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56452bd3c5a6 cs:33 sp:7fac7afb98e8 ax:ffffffffff600000 si:7fac7afb9e08 di:ffffffffff600000 [8979975.235445] exe[987040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e77b8af5a6 cs:33 sp:7f1c229368e8 ax:ffffffffff600000 si:7f1c22936e08 di:ffffffffff600000 [8979975.328844] exe[986609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e77b8af5a6 cs:33 sp:7f1c229368e8 ax:ffffffffff600000 si:7f1c22936e08 di:ffffffffff600000 [8979975.355191] exe[2469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e77b8af5a6 cs:33 sp:7f1c229368e8 ax:ffffffffff600000 si:7f1c22936e08 di:ffffffffff600000 [8979976.126671] exe[28569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e77b8af5a6 cs:33 sp:7f1c229368e8 ax:ffffffffff600000 si:7f1c22936e08 di:ffffffffff600000 [8980115.618808] exe[74335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169d6a45a6 cs:33 sp:7ed6bf7998e8 ax:ffffffffff600000 si:7ed6bf799e08 di:ffffffffff600000 [8980116.395802] exe[70477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169d6a45a6 cs:33 sp:7ed6bf7998e8 ax:ffffffffff600000 si:7ed6bf799e08 di:ffffffffff600000 [8980116.552487] exe[74043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169d6a45a6 cs:33 sp:7ed6bf7998e8 ax:ffffffffff600000 si:7ed6bf799e08 di:ffffffffff600000 [8980116.989198] exe[74291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169d6a45a6 cs:33 sp:7ed6bf7998e8 ax:ffffffffff600000 si:7ed6bf799e08 di:ffffffffff600000 [8981093.976368] exe[108544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e78a8e8 ax:ffffffffff600000 si:7fd16e78ae08 di:ffffffffff600000 [8981094.129728] exe[108463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e78a8e8 ax:ffffffffff600000 si:7fd16e78ae08 di:ffffffffff600000 [8981094.170925] exe[90430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.276620] exe[109008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.304496] exe[94106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.332657] exe[94106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.361313] exe[94106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.390255] exe[108446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.418361] exe[108446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981094.453301] exe[90418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a61565a6 cs:33 sp:7fd16e7698e8 ax:ffffffffff600000 si:7fd16e769e08 di:ffffffffff600000 [8981187.937627] warn_bad_vsyscall: 26 callbacks suppressed [8981187.937632] exe[105876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620aeb455a6 cs:33 sp:7ef57357a8e8 ax:ffffffffff600000 si:7ef57357ae08 di:ffffffffff600000 [8981188.726564] exe[106241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620aeb455a6 cs:33 sp:7ef57357a8e8 ax:ffffffffff600000 si:7ef57357ae08 di:ffffffffff600000 [8981188.780337] exe[105894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620aeb455a6 cs:33 sp:7ef57357a8e8 ax:ffffffffff600000 si:7ef57357ae08 di:ffffffffff600000 [8981259.701613] exe[70328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6619795a6 cs:33 sp:7f57821fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [8981259.802734] exe[114717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6619795a6 cs:33 sp:7f57821fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [8981259.911851] exe[70299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6619795a6 cs:33 sp:7f57821fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [8981268.863750] exe[98577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb88ac8e8 ax:ffffffffff600000 si:7fddb88ace08 di:ffffffffff600000 [8981268.987660] exe[88845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb88ac8e8 ax:ffffffffff600000 si:7fddb88ace08 di:ffffffffff600000 [8981269.106785] exe[95092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.139264] exe[97325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.168155] exe[97325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.198005] exe[96222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.228605] exe[96222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.261195] exe[95092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.291849] exe[95092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981269.327459] exe[88869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb886a8e8 ax:ffffffffff600000 si:7fddb886ae08 di:ffffffffff600000 [8981385.125532] warn_bad_vsyscall: 57 callbacks suppressed [8981385.125536] exe[82471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab7aaa5a6 cs:33 sp:7f08583c98e8 ax:ffffffffff600000 si:7f08583c9e08 di:ffffffffff600000 [8981385.172867] exe[82430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab7aaa5a6 cs:33 sp:7f08583a88e8 ax:ffffffffff600000 si:7f08583a8e08 di:ffffffffff600000 [8981385.215627] exe[85031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab7aaa5a6 cs:33 sp:7f08583c98e8 ax:ffffffffff600000 si:7f08583c9e08 di:ffffffffff600000 [8981739.759031] exe[80892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70c6503e8 cs:33 sp:7fd0fc29cf90 ax:7fd0fc29d020 si:ffffffffff600000 di:55c70c71a82f [8981740.603902] exe[120442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70c6503e8 cs:33 sp:7fd0fc25af90 ax:7fd0fc25b020 si:ffffffffff600000 di:55c70c71a82f [8981740.680695] exe[120494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c70c6503e8 cs:33 sp:7fd0fbdfef90 ax:7fd0fbdff020 si:ffffffffff600000 di:55c70c71a82f [8981951.459591] exe[98572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9a745a5a6 cs:33 sp:7f6bf0fd78e8 ax:ffffffffff600000 si:7f6bf0fd7e08 di:ffffffffff600000 [8981951.512839] exe[89886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9a745a5a6 cs:33 sp:7f6bf0fb68e8 ax:ffffffffff600000 si:7f6bf0fb6e08 di:ffffffffff600000 [8981951.512847] exe[98572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9a745a5a6 cs:33 sp:7f6bf0fd78e8 ax:ffffffffff600000 si:7f6bf0fd7e08 di:ffffffffff600000 [8981951.584614] exe[83849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9a745a5a6 cs:33 sp:7f6bf0fb68e8 ax:ffffffffff600000 si:7f6bf0fb6e08 di:ffffffffff600000 [8982052.576201] exe[119295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb88ac8e8 ax:ffffffffff600000 si:7fddb88ace08 di:ffffffffff600000 [8982052.683546] exe[96192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb88ac8e8 ax:ffffffffff600000 si:7fddb88ace08 di:ffffffffff600000 [8982052.728804] exe[88922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb888b8e8 ax:ffffffffff600000 si:7fddb888be08 di:ffffffffff600000 [8982052.830891] exe[96149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21cbc5a6 cs:33 sp:7fddb88ac8e8 ax:ffffffffff600000 si:7fddb88ace08 di:ffffffffff600000 [8982307.542982] exe[70872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6c64373e8 cs:33 sp:7f607b4cff90 ax:7f607b4d0020 si:ffffffffff600000 di:55b6c650182f [8982307.641022] exe[114513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6c64373e8 cs:33 sp:7f607b4aef90 ax:7f607b4af020 si:ffffffffff600000 di:55b6c650182f [8982307.741259] exe[70864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6c64373e8 cs:33 sp:7f607b4aef90 ax:7f607b4af020 si:ffffffffff600000 di:55b6c650182f [8983441.249604] exe[148804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1131ea5a6 cs:33 sp:7eb7da22a8e8 ax:ffffffffff600000 si:7eb7da22ae08 di:ffffffffff600000 [8983442.006799] exe[148804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1131ea5a6 cs:33 sp:7eb7da22a8e8 ax:ffffffffff600000 si:7eb7da22ae08 di:ffffffffff600000 [8983442.030122] exe[148812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1131ea5a6 cs:33 sp:7eb7da22a8e8 ax:ffffffffff600000 si:7eb7da22ae08 di:ffffffffff600000 [8983442.085592] exe[148812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1131ea5a6 cs:33 sp:7eb7da22a8e8 ax:ffffffffff600000 si:7eb7da22ae08 di:ffffffffff600000 [8985911.462980] exe[194633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560034c515a6 cs:33 sp:7eb0200548e8 ax:ffffffffff600000 si:7eb020054e08 di:ffffffffff600000 [8985911.576597] exe[166360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560034c515a6 cs:33 sp:7eb0200548e8 ax:ffffffffff600000 si:7eb020054e08 di:ffffffffff600000 [8985911.839794] exe[166370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560034c515a6 cs:33 sp:7eb0200548e8 ax:ffffffffff600000 si:7eb020054e08 di:ffffffffff600000 [8986238.032130] exe[206725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c535385a6 cs:33 sp:7f2fdb31a8e8 ax:ffffffffff600000 si:7f2fdb31ae08 di:ffffffffff600000 [8986238.159823] exe[206715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c535385a6 cs:33 sp:7f2fdb31a8e8 ax:ffffffffff600000 si:7f2fdb31ae08 di:ffffffffff600000 [8986238.278727] exe[177422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c535385a6 cs:33 sp:7f2fdb31a8e8 ax:ffffffffff600000 si:7f2fdb31ae08 di:ffffffffff600000 [8989259.240894] exe[286689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607fcd875a6 cs:33 sp:7ef6166e88e8 ax:ffffffffff600000 si:7ef6166e8e08 di:ffffffffff600000 [8989259.302710] exe[256355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607fcd875a6 cs:33 sp:7ef6166e88e8 ax:ffffffffff600000 si:7ef6166e8e08 di:ffffffffff600000 [8989259.347537] exe[286689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607fcd875a6 cs:33 sp:7ef6166a68e8 ax:ffffffffff600000 si:7ef6166a6e08 di:ffffffffff600000 [8989339.211858] exe[306912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398cd355a6 cs:33 sp:7f1059757f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [8989339.307572] exe[306656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398cd355a6 cs:33 sp:7f1059757f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [8989339.391049] exe[306688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398cd355a6 cs:33 sp:7f1059736f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [8989392.487886] exe[311523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161a68e8 ax:ffffffffff600000 si:7fae161a6e08 di:ffffffffff600000 [8989393.318422] exe[311531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.345127] exe[311531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.367669] exe[311531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.389558] exe[311531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.412273] exe[311531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.436216] exe[311124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.459655] exe[311124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.481208] exe[311124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8989393.504505] exe[311124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c75f2a75a6 cs:33 sp:7fae161858e8 ax:ffffffffff600000 si:7fae16185e08 di:ffffffffff600000 [8991936.109009] warn_bad_vsyscall: 25 callbacks suppressed [8991936.109012] exe[366302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596a34655a6 cs:33 sp:7edaa58a28e8 ax:ffffffffff600000 si:7edaa58a2e08 di:ffffffffff600000 [8991936.174877] exe[366302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596a34655a6 cs:33 sp:7edaa58818e8 ax:ffffffffff600000 si:7edaa5881e08 di:ffffffffff600000 [8991936.959560] exe[362860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596a34655a6 cs:33 sp:7edaa58a28e8 ax:ffffffffff600000 si:7edaa58a2e08 di:ffffffffff600000 [8991936.959603] exe[357990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596a34655a6 cs:33 sp:7edaa58818e8 ax:ffffffffff600000 si:7edaa5881e08 di:ffffffffff600000 [8992429.167413] exe[391351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ae7f5a6 cs:33 sp:7ff9199b78e8 ax:ffffffffff600000 si:7ff9199b7e08 di:ffffffffff600000 [8992429.308727] exe[364574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ae7f5a6 cs:33 sp:7ff9199b78e8 ax:ffffffffff600000 si:7ff9199b7e08 di:ffffffffff600000 [8992429.311262] exe[386858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ae7f5a6 cs:33 sp:7ff9199968e8 ax:ffffffffff600000 si:7ff919996e08 di:ffffffffff600000 [8992429.427780] exe[366335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ae7f5a6 cs:33 sp:7ff9199b78e8 ax:ffffffffff600000 si:7ff9199b7e08 di:ffffffffff600000 [8992955.633842] exe[392150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e8d3f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [8992956.430920] exe[352566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e891f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [8992956.515550] exe[356094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e8d3f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [8993235.429575] exe[407667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55901995c3e8 cs:33 sp:7fec71dfef90 ax:7fec71dff020 si:ffffffffff600000 di:559019a2682f [8993235.620969] exe[407251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55901995c3e8 cs:33 sp:7fec71dfef90 ax:7fec71dff020 si:ffffffffff600000 di:559019a2682f [8993235.805706] exe[370117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55901995c3e8 cs:33 sp:7fec71dfef90 ax:7fec71dff020 si:ffffffffff600000 di:559019a2682f [8993900.167908] exe[352748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e8d38e8 ax:ffffffffff600000 si:7f0a9e8d3e08 di:ffffffffff600000 [8993900.254045] exe[352703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e8d38e8 ax:ffffffffff600000 si:7f0a9e8d3e08 di:ffffffffff600000 [8993900.924962] exe[413683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960b4ac5a6 cs:33 sp:7f0a9e8d38e8 ax:ffffffffff600000 si:7f0a9e8d3e08 di:ffffffffff600000 [8994439.480438] exe[413534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cff6d5a6 cs:33 sp:7eb993ce88e8 ax:ffffffffff600000 si:7eb993ce8e08 di:ffffffffff600000 [8994439.666545] exe[358057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cff6d5a6 cs:33 sp:7eb993ce88e8 ax:ffffffffff600000 si:7eb993ce8e08 di:ffffffffff600000 [8994439.810957] exe[361739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cff6d5a6 cs:33 sp:7eb993ce88e8 ax:ffffffffff600000 si:7eb993ce8e08 di:ffffffffff600000 [8994548.653174] exe[424504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca3a2f5a6 cs:33 sp:7ecbaabfef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [8994548.814215] exe[424337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca3a2f5a6 cs:33 sp:7ecbaabddf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [8994548.956949] exe[404693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca3a2f5a6 cs:33 sp:7ecbaabfef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [8995167.754593] exe[443181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55944a0165a6 cs:33 sp:7ebc3c641f88 ax:ffffffffff600000 si:200007c0 di:ffffffffff600000 [8995167.828899] exe[444180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55944a0165a6 cs:33 sp:7ebc3c641f88 ax:ffffffffff600000 si:200007c0 di:ffffffffff600000 [8995167.905118] exe[444596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55944a0165a6 cs:33 sp:7ebc3c1fef88 ax:ffffffffff600000 si:200007c0 di:ffffffffff600000 [8995602.323633] exe[467455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576966b21a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [8995602.416469] exe[457427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576966b21a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [8995602.511032] exe[457696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576966b21a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [8996479.550981] exe[497800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627150533e8 cs:33 sp:7fc8e338bf90 ax:7fc8e338c020 si:ffffffffff600000 di:56271511d82f [8996479.655792] exe[495435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627150533e8 cs:33 sp:7fc8e338bf90 ax:7fc8e338c020 si:ffffffffff600000 di:56271511d82f [8996479.743749] exe[496429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580263c43e8 cs:33 sp:7f7e00785f90 ax:7f7e00786020 si:ffffffffff600000 di:55802648e82f [8996479.758200] exe[495447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627150533e8 cs:33 sp:7fc8e338bf90 ax:7fc8e338c020 si:ffffffffff600000 di:56271511d82f [8996479.758512] exe[495519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627150533e8 cs:33 sp:7fc8e336af90 ax:7fc8e336b020 si:ffffffffff600000 di:56271511d82f [8996479.840735] exe[495700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580263c43e8 cs:33 sp:7f7e00785f90 ax:7f7e00786020 si:ffffffffff600000 di:55802648e82f [8996479.927063] exe[495447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580263c43e8 cs:33 sp:7f7e00785f90 ax:7f7e00786020 si:ffffffffff600000 di:55802648e82f [8996480.036131] exe[497823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580263c43e8 cs:33 sp:7f7e00785f90 ax:7f7e00786020 si:ffffffffff600000 di:55802648e82f [8996480.149591] exe[495447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580263c43e8 cs:33 sp:7f7e00785f90 ax:7f7e00786020 si:ffffffffff600000 di:55802648e82f [8996585.328326] exe[498832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e611e23e8 cs:33 sp:7f77403c5f90 ax:7f77403c6020 si:ffffffffff600000 di:560e612ac82f [8996585.409141] exe[496202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e611e23e8 cs:33 sp:7f77403c5f90 ax:7f77403c6020 si:ffffffffff600000 di:560e612ac82f [8996585.491611] exe[497775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e611e23e8 cs:33 sp:7f77403c5f90 ax:7f77403c6020 si:ffffffffff600000 di:560e612ac82f [8996585.574408] exe[498868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e611e23e8 cs:33 sp:7f77403c5f90 ax:7f77403c6020 si:ffffffffff600000 di:560e612ac82f [8996585.660014] exe[495530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e611e23e8 cs:33 sp:7f77403c5f90 ax:7f77403c6020 si:ffffffffff600000 di:560e612ac82f [8996752.268252] exe[440744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dab51a5a6 cs:33 sp:7f8822dfb8e8 ax:ffffffffff600000 si:7f8822dfbe08 di:ffffffffff600000 [8996752.321497] exe[441890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dab51a5a6 cs:33 sp:7f8822dfb8e8 ax:ffffffffff600000 si:7f8822dfbe08 di:ffffffffff600000 [8996752.364269] exe[444493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559dab51a5a6 cs:33 sp:7f8822dfb8e8 ax:ffffffffff600000 si:7f8822dfbe08 di:ffffffffff600000 [8996857.733790] exe[497548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576965165a6 cs:33 sp:7eaee31fe8e8 ax:ffffffffff600000 si:7eaee31fee08 di:ffffffffff600000 [8996857.838818] exe[462616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576965165a6 cs:33 sp:7eaee31fe8e8 ax:ffffffffff600000 si:7eaee31fee08 di:ffffffffff600000 [8996857.907529] exe[497498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576965165a6 cs:33 sp:7eaee31fe8e8 ax:ffffffffff600000 si:7eaee31fee08 di:ffffffffff600000 [8997254.711623] exe[504349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997254.882529] exe[502293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997254.918237] exe[504455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997254.951131] exe[503202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997254.986828] exe[503202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997255.020071] exe[503202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997255.052279] exe[503090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997255.088074] exe[502144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997255.121889] exe[502144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997255.155226] exe[502144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598611f83e8 cs:33 sp:7f11c8378f90 ax:7f11c8379020 si:ffffffffff600000 di:5598612c282f [8997972.218571] warn_bad_vsyscall: 49 callbacks suppressed [8997972.218576] exe[534789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56376207c5a6 cs:33 sp:7ecf91b618e8 ax:ffffffffff600000 si:7ecf91b61e08 di:ffffffffff600000 [8997972.333306] exe[556345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56376207c5a6 cs:33 sp:7ecf91b618e8 ax:ffffffffff600000 si:7ecf91b61e08 di:ffffffffff600000 [8997972.982998] exe[532084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56376207c5a6 cs:33 sp:7ecf91b618e8 ax:ffffffffff600000 si:7ecf91b61e08 di:ffffffffff600000 [8997973.033435] exe[531820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56376207c5a6 cs:33 sp:7ecf91b618e8 ax:ffffffffff600000 si:7ecf91b61e08 di:ffffffffff600000 [8998246.015061] exe[533897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556153ed65a6 cs:33 sp:7f6c127208e8 ax:ffffffffff600000 si:7f6c12720e08 di:ffffffffff600000 [8998246.109007] exe[576963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556153ed65a6 cs:33 sp:7f6c127208e8 ax:ffffffffff600000 si:7f6c12720e08 di:ffffffffff600000 [8998246.199467] exe[533584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556153ed65a6 cs:33 sp:7f6c127208e8 ax:ffffffffff600000 si:7f6c12720e08 di:ffffffffff600000 [8998246.291832] exe[568611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556153ed65a6 cs:33 sp:7f6c127208e8 ax:ffffffffff600000 si:7f6c12720e08 di:ffffffffff600000 [8999109.706876] exe[669916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55731b2925a6 cs:33 sp:7fc64a3698e8 ax:ffffffffff600000 si:7fc64a369e08 di:ffffffffff600000 [8999109.836061] exe[668890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55731b2925a6 cs:33 sp:7fc64a3698e8 ax:ffffffffff600000 si:7fc64a369e08 di:ffffffffff600000 [8999109.951703] exe[668335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55731b2925a6 cs:33 sp:7fc64a3698e8 ax:ffffffffff600000 si:7fc64a369e08 di:ffffffffff600000 [8999110.075504] exe[668368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55731b2925a6 cs:33 sp:7fc64a3698e8 ax:ffffffffff600000 si:7fc64a369e08 di:ffffffffff600000 [8999252.608053] exe[670473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.688960] exe[674153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.689529] exe[674177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.793088] exe[676694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.802553] exe[676483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.803540] exe[675436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.807568] exe[675436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.815865] exe[675436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.818184] exe[674220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999252.818432] exe[675444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3427a91a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020000 [8999275.155493] warn_bad_vsyscall: 58 callbacks suppressed [8999275.155497] exe[665741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56396d2195a6 cs:33 sp:7eb6017348e8 ax:ffffffffff600000 si:7eb601734e08 di:ffffffffff600000 [8999275.218027] exe[666359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56396d2195a6 cs:33 sp:7eb6017348e8 ax:ffffffffff600000 si:7eb601734e08 di:ffffffffff600000 [8999275.283403] exe[665741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56396d2195a6 cs:33 sp:7eb6017348e8 ax:ffffffffff600000 si:7eb601734e08 di:ffffffffff600000 [8999275.357749] exe[666162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56396d2195a6 cs:33 sp:7eb6017348e8 ax:ffffffffff600000 si:7eb601734e08 di:ffffffffff600000 [8999500.027990] exe[657795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565162e175a6 cs:33 sp:7f8a7b5fe8e8 ax:ffffffffff600000 si:7f8a7b5fee08 di:ffffffffff600000 [8999500.084268] exe[662128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565162e175a6 cs:33 sp:7f8a7b5fe8e8 ax:ffffffffff600000 si:7f8a7b5fee08 di:ffffffffff600000 [8999500.131082] exe[662104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565162e175a6 cs:33 sp:7f8a7b5fe8e8 ax:ffffffffff600000 si:7f8a7b5fee08 di:ffffffffff600000 [8999500.190806] exe[682021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565162e175a6 cs:33 sp:7f8a7b5fe8e8 ax:ffffffffff600000 si:7f8a7b5fee08 di:ffffffffff600000 [9000303.738834] exe[685416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8f5d045a6 cs:33 sp:7ea915f0e8e8 ax:ffffffffff600000 si:7ea915f0ee08 di:ffffffffff600000 [9000303.903330] exe[682839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8f5d045a6 cs:33 sp:7ea915f0e8e8 ax:ffffffffff600000 si:7ea915f0ee08 di:ffffffffff600000 [9000304.047537] exe[695782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8f5d045a6 cs:33 sp:7ea915f0e8e8 ax:ffffffffff600000 si:7ea915f0ee08 di:ffffffffff600000 [9000304.234375] exe[704098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8f5d045a6 cs:33 sp:7ea915f0e8e8 ax:ffffffffff600000 si:7ea915f0ee08 di:ffffffffff600000 [9001142.409526] exe[721365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cddff15a6 cs:33 sp:7f92b08338e8 ax:ffffffffff600000 si:7f92b0833e08 di:ffffffffff600000 [9001142.473113] exe[712146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cddff15a6 cs:33 sp:7f92b08338e8 ax:ffffffffff600000 si:7f92b0833e08 di:ffffffffff600000 [9001142.526668] exe[666087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cddff15a6 cs:33 sp:7f92b08338e8 ax:ffffffffff600000 si:7f92b0833e08 di:ffffffffff600000 [9001142.571481] exe[717792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cddff15a6 cs:33 sp:7f92b08338e8 ax:ffffffffff600000 si:7f92b0833e08 di:ffffffffff600000 [9001583.128507] exe[673907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562be42d15a6 cs:33 sp:7f83954a58e8 ax:ffffffffff600000 si:7f83954a5e08 di:ffffffffff600000 [9001746.655606] exe[713194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c4302c5a6 cs:33 sp:7f64afdaf8e8 ax:ffffffffff600000 si:7f64afdafe08 di:ffffffffff600000 [9001779.489508] exe[740278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620b42705a6 cs:33 sp:7fef057fe8e8 ax:ffffffffff600000 si:7fef057fee08 di:ffffffffff600000 [9001779.587993] exe[734909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620b42705a6 cs:33 sp:7fef057fe8e8 ax:ffffffffff600000 si:7fef057fee08 di:ffffffffff600000 [9001779.691133] exe[740346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c56094c5a6 cs:33 sp:7fa3ef6bc8e8 ax:ffffffffff600000 si:7fa3ef6bce08 di:ffffffffff600000 [9001779.693982] exe[735355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620b42705a6 cs:33 sp:7fef057fe8e8 ax:ffffffffff600000 si:7fef057fee08 di:ffffffffff600000 [9001779.714433] exe[734971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633a767c5a6 cs:33 sp:7f478d0f88e8 ax:ffffffffff600000 si:7f478d0f8e08 di:ffffffffff600000 [9001779.808047] exe[734909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620b42705a6 cs:33 sp:7fef057fe8e8 ax:ffffffffff600000 si:7fef057fee08 di:ffffffffff600000 [9001779.808923] exe[735353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c56094c5a6 cs:33 sp:7fa3ef6bc8e8 ax:ffffffffff600000 si:7fa3ef6bce08 di:ffffffffff600000 [9001779.825143] exe[740348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633a767c5a6 cs:33 sp:7f478d0f88e8 ax:ffffffffff600000 si:7f478d0f8e08 di:ffffffffff600000 [9001779.894520] exe[741312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633a767c5a6 cs:33 sp:7f478d0f88e8 ax:ffffffffff600000 si:7f478d0f8e08 di:ffffffffff600000 [9001779.953076] exe[735395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c56094c5a6 cs:33 sp:7fa3ef6bc8e8 ax:ffffffffff600000 si:7fa3ef6bce08 di:ffffffffff600000 [9001934.959027] exe[728126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570c5e7d5a6 cs:33 sp:7fb715a5a8e8 ax:ffffffffff600000 si:7fb715a5ae08 di:ffffffffff600000 [9002030.982111] exe[741245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8c59535a6 cs:33 sp:7f1605bbe8e8 ax:ffffffffff600000 si:7f1605bbee08 di:ffffffffff600000 [9002031.111612] exe[741868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8c59535a6 cs:33 sp:7f1605bbe8e8 ax:ffffffffff600000 si:7f1605bbee08 di:ffffffffff600000 [9002031.228483] exe[741748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8c59535a6 cs:33 sp:7f1605bbe8e8 ax:ffffffffff600000 si:7f1605bbee08 di:ffffffffff600000 [9002031.350019] exe[741239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8c59535a6 cs:33 sp:7f1605bbe8e8 ax:ffffffffff600000 si:7f1605bbee08 di:ffffffffff600000 [9002443.301006] exe[763734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb498a85a6 cs:33 sp:7ed11fb6c8e8 ax:ffffffffff600000 si:7ed11fb6ce08 di:ffffffffff600000 [9003565.633589] exe[788092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9003565.693198] exe[787353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9003565.694519] exe[787360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c688e8 ax:ffffffffff600000 si:7eb4e4c68e08 di:ffffffffff600000 [9003565.783328] exe[787362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9003639.588930] exe[787364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9003639.649205] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.670168] exe[787355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.691219] exe[791284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.717562] exe[788196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.739330] exe[790885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.763337] exe[788196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.785204] exe[787355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.807385] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003639.828808] exe[788196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c268e8 ax:ffffffffff600000 si:7eb4e4c26e08 di:ffffffffff600000 [9003645.129752] warn_bad_vsyscall: 57 callbacks suppressed [9003645.129756] exe[790885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.199417] exe[787364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.266097] exe[787364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.330397] exe[788027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.381942] exe[791158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.458460] exe[787366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.537469] exe[787362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.615195] exe[787351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.674898] exe[787362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003645.762939] exe[787353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9003690.631468] exe[783313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c56094c5a6 cs:33 sp:7fa3ef6bc8e8 ax:ffffffffff600000 si:7fa3ef6bce08 di:ffffffffff600000 [9003882.775108] exe[723444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f00817a5a6 cs:33 sp:7fe5a81158e8 ax:ffffffffff600000 si:7fe5a8115e08 di:ffffffffff600000 [9003903.830185] exe[792970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f00817a5a6 cs:33 sp:7fe5a81158e8 ax:ffffffffff600000 si:7fe5a8115e08 di:ffffffffff600000 [9004026.726662] exe[776437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56050bba15a6 cs:33 sp:7f67b74db8e8 ax:ffffffffff600000 si:7f67b74dbe08 di:ffffffffff600000 [9004026.784226] exe[788931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56050bba15a6 cs:33 sp:7f67b74db8e8 ax:ffffffffff600000 si:7f67b74dbe08 di:ffffffffff600000 [9004026.851882] exe[788931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56050bba15a6 cs:33 sp:7f67b74db8e8 ax:ffffffffff600000 si:7f67b74dbe08 di:ffffffffff600000 [9004026.873993] exe[776446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56050bba15a6 cs:33 sp:7f67b74db8e8 ax:ffffffffff600000 si:7f67b74dbe08 di:ffffffffff600000 [9004553.355656] exe[767171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55961d59f5a6 cs:33 sp:7ea42572d8e8 ax:ffffffffff600000 si:7ea42572de08 di:ffffffffff600000 [9005038.106185] exe[813646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9005038.184861] exe[808261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9005038.271400] exe[813865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9005038.271691] exe[813876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9005054.697085] exe[808261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7afba5a6 cs:33 sp:7f36387698e8 ax:ffffffffff600000 si:7f3638769e08 di:ffffffffff600000 [9005054.788846] exe[814470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7afba5a6 cs:33 sp:7f36387698e8 ax:ffffffffff600000 si:7f3638769e08 di:ffffffffff600000 [9005054.865701] exe[813640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7afba5a6 cs:33 sp:7f36387698e8 ax:ffffffffff600000 si:7f3638769e08 di:ffffffffff600000 [9005054.952245] exe[808124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a7afba5a6 cs:33 sp:7f36387698e8 ax:ffffffffff600000 si:7f3638769e08 di:ffffffffff600000 [9005519.466820] exe[787355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9005519.555177] exe[798676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c688e8 ax:ffffffffff600000 si:7eb4e4c68e08 di:ffffffffff600000 [9005519.612860] exe[788027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9005895.004336] exe[791158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9005895.078649] exe[788196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb14690e8e8 ax:ffffffffff600000 si:7eb14690ee08 di:ffffffffff600000 [9005895.155147] exe[787355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a1c7495a6 cs:33 sp:7eb1468cc8e8 ax:ffffffffff600000 si:7eb1468cce08 di:ffffffffff600000 [9006504.397274] exe[809617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd755875a6 cs:33 sp:7f4274a288e8 ax:ffffffffff600000 si:7f4274a28e08 di:ffffffffff600000 [9006504.505655] exe[808801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd755875a6 cs:33 sp:7f4274a288e8 ax:ffffffffff600000 si:7f4274a28e08 di:ffffffffff600000 [9006504.638779] exe[820764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd755875a6 cs:33 sp:7f4274a288e8 ax:ffffffffff600000 si:7f4274a28e08 di:ffffffffff600000 [9006504.685075] exe[833612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd755875a6 cs:33 sp:7f42745fe8e8 ax:ffffffffff600000 si:7f42745fee08 di:ffffffffff600000 [9006512.177596] exe[813715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9006512.289946] exe[813715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9006512.381084] exe[839333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9006512.416528] exe[839333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9006626.302622] exe[808660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580290865a6 cs:33 sp:7f6a8423d8e8 ax:ffffffffff600000 si:7f6a8423de08 di:ffffffffff600000 [9006626.515283] exe[809567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580290865a6 cs:33 sp:7f6a8423d8e8 ax:ffffffffff600000 si:7f6a8423de08 di:ffffffffff600000 [9006626.687623] exe[860735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580290865a6 cs:33 sp:7f6a83dfe8e8 ax:ffffffffff600000 si:7f6a83dfee08 di:ffffffffff600000 [9006807.821928] exe[797937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.656280] exe[791284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.680864] exe[790885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.703137] exe[787351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.725263] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.746850] exe[788196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.768691] exe[787355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.789300] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.810618] exe[787351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006808.832363] exe[790885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b5b325a6 cs:33 sp:7eb4e4c898e8 ax:ffffffffff600000 si:7eb4e4c89e08 di:ffffffffff600000 [9006908.781425] warn_bad_vsyscall: 25 callbacks suppressed [9006908.781427] exe[787356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006908.849337] exe[794591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006908.876866] exe[787363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006908.936855] exe[787356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.007287] exe[791284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.068458] exe[788073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.090423] exe[787363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.153759] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.218263] exe[787366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006909.279932] exe[788092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.288008] warn_bad_vsyscall: 106 callbacks suppressed [9006914.288011] exe[787362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.315652] exe[787359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.363910] exe[787353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.573422] exe[794591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.648782] exe[787363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.704624] exe[790885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.727013] exe[787351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006914.788961] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.870854] exe[788027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006914.955893] exe[794591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006919.309233] warn_bad_vsyscall: 139 callbacks suppressed [9006919.309236] exe[788092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006919.368285] exe[787356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006919.390038] exe[788092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006919.456390] exe[793680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.478386] exe[794591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.499623] exe[787363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.526777] exe[793680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.547710] exe[787362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.569780] exe[794591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006919.590725] exe[793680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9cc8e8 ax:ffffffffff600000 si:7ea9ac9cce08 di:ffffffffff600000 [9006924.327730] warn_bad_vsyscall: 371 callbacks suppressed [9006924.327734] exe[797937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.401463] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.452649] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.476823] exe[787365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.534636] exe[791158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.617111] exe[787361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.684405] exe[797937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.746688] exe[787361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.802496] exe[787356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9006924.868869] exe[787361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e214f7c5a6 cs:33 sp:7ea9ac9ed8e8 ax:ffffffffff600000 si:7ea9ac9ede08 di:ffffffffff600000 [9008066.253055] warn_bad_vsyscall: 42 callbacks suppressed [9008066.253057] exe[885711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.353050] exe[885567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.444336] exe[885711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.557200] exe[863123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.654361] exe[865130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.699172] exe[813776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.864256] exe[885786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.896161] exe[885786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.922767] exe[885786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008066.956130] exe[885563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008071.432857] warn_bad_vsyscall: 77 callbacks suppressed [9008071.432859] exe[814967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.466650] exe[844830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.500023] exe[813748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.527412] exe[813748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.555608] exe[814967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.585319] exe[842225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.614607] exe[842225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.648892] exe[842225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.680509] exe[842225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008071.707739] exe[842225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008076.444379] warn_bad_vsyscall: 152 callbacks suppressed [9008076.444382] exe[813701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008076.615938] exe[864395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc5c8e8 ax:ffffffffff600000 si:7fb29dc5ce08 di:ffffffffff600000 [9008076.779289] exe[863792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008076.924200] exe[885737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008076.973859] exe[885444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008077.107101] exe[885050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008077.264173] exe[885085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008077.373647] exe[885085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008077.478142] exe[885118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008077.512902] exe[885171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008081.497779] warn_bad_vsyscall: 67 callbacks suppressed [9008081.497783] exe[885089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008081.636891] exe[869039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc5c8e8 ax:ffffffffff600000 si:7fb29dc5ce08 di:ffffffffff600000 [9008081.781761] exe[844830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008081.901305] exe[884387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008081.998265] exe[884287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008082.027856] exe[884290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008082.122881] exe[884290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008082.230910] exe[884330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008082.877665] exe[885516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008083.006943] exe[885731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008086.515870] warn_bad_vsyscall: 61 callbacks suppressed [9008086.515873] exe[884290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.553435] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.592855] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.621211] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.654473] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.683382] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.711978] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.739976] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.775546] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008086.807781] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008091.520309] warn_bad_vsyscall: 151 callbacks suppressed [9008091.520312] exe[863130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008091.613708] exe[885763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008091.654708] exe[885743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc5c8e8 ax:ffffffffff600000 si:7fb29dc5ce08 di:ffffffffff600000 [9008091.750489] exe[813722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008091.867707] exe[884610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008092.006393] exe[885764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008092.089207] exe[885882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008092.180277] exe[813740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008092.281742] exe[885788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008092.394139] exe[885740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008096.581566] warn_bad_vsyscall: 102 callbacks suppressed [9008096.581569] exe[813832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008096.692887] exe[863797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008096.789824] exe[813701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008096.919931] exe[884323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.008037] exe[884302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.135129] exe[863269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.234173] exe[885444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.371355] exe[885544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.458473] exe[885761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008097.600348] exe[885776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008101.636386] warn_bad_vsyscall: 115 callbacks suppressed [9008101.636390] exe[814941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008101.797082] exe[885723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008101.922770] exe[884110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008101.924187] exe[884104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008102.106580] exe[813889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008102.213362] exe[819103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008102.319770] exe[819103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008102.429739] exe[885503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008102.530910] exe[885106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008102.696349] exe[885050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008106.720952] warn_bad_vsyscall: 42 callbacks suppressed [9008106.720955] exe[885758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008106.723672] exe[884121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc7d8e8 ax:ffffffffff600000 si:7fb29dc7de08 di:ffffffffff600000 [9008107.103543] exe[839324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.234409] exe[884311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.260890] exe[884311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.289352] exe[884691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.318336] exe[884691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.350121] exe[884691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.376830] exe[884691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008107.406533] exe[884691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3cb8345a6 cs:33 sp:7fb29dc9e8e8 ax:ffffffffff600000 si:7fb29dc9ee08 di:ffffffffff600000 [9008306.561568] warn_bad_vsyscall: 36 callbacks suppressed [9008306.561571] exe[887662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599a90565a6 cs:33 sp:7f3e129c18e8 ax:ffffffffff600000 si:7f3e129c1e08 di:ffffffffff600000 [9008306.741626] exe[888915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599a90565a6 cs:33 sp:7f3e129c18e8 ax:ffffffffff600000 si:7f3e129c1e08 di:ffffffffff600000 [9008307.050942] exe[857619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599a90565a6 cs:33 sp:7f3e129a08e8 ax:ffffffffff600000 si:7f3e129a0e08 di:ffffffffff600000 [9011992.441387] exe[25892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c3c41d5a6 cs:33 sp:7f0fc11888e8 ax:ffffffffff600000 si:7f0fc1188e08 di:ffffffffff600000 [9011992.492255] exe[25892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c3c41d5a6 cs:33 sp:7f0fc11888e8 ax:ffffffffff600000 si:7f0fc1188e08 di:ffffffffff600000 [9011992.536355] exe[26018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c3c41d5a6 cs:33 sp:7f0fc11888e8 ax:ffffffffff600000 si:7f0fc1188e08 di:ffffffffff600000 [9012058.189834] exe[23031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c47cb3e8 cs:33 sp:7f5a56281f90 ax:7f5a56282020 si:ffffffffff600000 di:55f3c489582f [9012058.267164] exe[22067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c47cb3e8 cs:33 sp:7f5a56281f90 ax:7f5a56282020 si:ffffffffff600000 di:55f3c489582f [9012058.393553] exe[19658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c47cb3e8 cs:33 sp:7f5a56281f90 ax:7f5a56282020 si:ffffffffff600000 di:55f3c489582f [9012969.243327] exe[39852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.298720] exe[33938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.321568] exe[33964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.346048] exe[33961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.369138] exe[33646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.390895] exe[33964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.413147] exe[33810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.434953] exe[33961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.457927] exe[33809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9012969.479547] exe[33964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f37ee5a6 cs:33 sp:7eb667a338e8 ax:ffffffffff600000 si:7eb667a33e08 di:ffffffffff600000 [9013461.446654] warn_bad_vsyscall: 57 callbacks suppressed [9013461.446657] exe[55014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd50ac3e8 cs:33 sp:7fc8bb5def90 ax:7fc8bb5df020 si:ffffffffff600000 di:564cd517682f [9013461.535775] exe[55770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd50ac3e8 cs:33 sp:7fc8bb5def90 ax:7fc8bb5df020 si:ffffffffff600000 di:564cd517682f [9013462.288556] exe[36564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd50ac3e8 cs:33 sp:7fc8bb5def90 ax:7fc8bb5df020 si:ffffffffff600000 di:564cd517682f [9014634.972728] exe[41547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6e25653e8 cs:33 sp:7f51c4229f90 ax:7f51c422a020 si:ffffffffff600000 di:55e6e262f82f [9014635.492160] exe[42448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6e25653e8 cs:33 sp:7f51c4229f90 ax:7f51c422a020 si:ffffffffff600000 di:55e6e262f82f [9015092.644255] exe[80056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557018d225a6 cs:33 sp:7ee876edb8e8 ax:ffffffffff600000 si:7ee876edbe08 di:ffffffffff600000 [9015092.819262] exe[90245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557018d225a6 cs:33 sp:7ee876edb8e8 ax:ffffffffff600000 si:7ee876edbe08 di:ffffffffff600000 [9015092.819408] exe[90244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557018d225a6 cs:33 sp:7ee876eba8e8 ax:ffffffffff600000 si:7ee876ebae08 di:ffffffffff600000 [9015092.997975] exe[68576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557018d225a6 cs:33 sp:7ee876e998e8 ax:ffffffffff600000 si:7ee876e99e08 di:ffffffffff600000 [9016250.857912] exe[118162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8d7f1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [9016250.898961] exe[89856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8d7f1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [9016250.912663] exe[117381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8d7f1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [9016250.968987] exe[89856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8d7f1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1000000 [9017639.139955] exe[208199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b272dcf5a6 cs:33 sp:7ee185ea68e8 ax:ffffffffff600000 si:7ee185ea6e08 di:ffffffffff600000 [9017639.291521] exe[205932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b272dcf5a6 cs:33 sp:7ee185ea68e8 ax:ffffffffff600000 si:7ee185ea6e08 di:ffffffffff600000 [9017639.464016] exe[215944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b272dcf5a6 cs:33 sp:7ee185ea68e8 ax:ffffffffff600000 si:7ee185ea6e08 di:ffffffffff600000 [9017639.606000] exe[205926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b272dcf5a6 cs:33 sp:7ee185ea68e8 ax:ffffffffff600000 si:7ee185ea6e08 di:ffffffffff600000 [9017662.446902] exe[235759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc8d5115a6 cs:33 sp:7f2412de68e8 ax:ffffffffff600000 si:7f2412de6e08 di:ffffffffff600000 [9017662.535833] exe[226327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc8d5115a6 cs:33 sp:7f2412de68e8 ax:ffffffffff600000 si:7f2412de6e08 di:ffffffffff600000 [9017662.627441] exe[236110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc8d5115a6 cs:33 sp:7f2412de68e8 ax:ffffffffff600000 si:7f2412de6e08 di:ffffffffff600000 [9017662.715460] exe[236050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc8d5115a6 cs:33 sp:7f2412de68e8 ax:ffffffffff600000 si:7f2412de6e08 di:ffffffffff600000 [9018112.599965] exe[247332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600edee45a6 cs:33 sp:7fe7c58638e8 ax:ffffffffff600000 si:7fe7c5863e08 di:ffffffffff600000 [9018112.672293] exe[248625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600edee45a6 cs:33 sp:7fe7c58638e8 ax:ffffffffff600000 si:7fe7c5863e08 di:ffffffffff600000 [9018112.739457] exe[194289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600edee45a6 cs:33 sp:7fe7c58638e8 ax:ffffffffff600000 si:7fe7c5863e08 di:ffffffffff600000 [9018112.789153] exe[236317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600edee45a6 cs:33 sp:7fe7c58638e8 ax:ffffffffff600000 si:7fe7c5863e08 di:ffffffffff600000 [9018684.268235] exe[239464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575f22535a6 cs:33 sp:7f41990328e8 ax:ffffffffff600000 si:7f4199032e08 di:ffffffffff600000 [9018684.333702] exe[239860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575f22535a6 cs:33 sp:7f41990328e8 ax:ffffffffff600000 si:7f4199032e08 di:ffffffffff600000 [9018684.400738] exe[239129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575f22535a6 cs:33 sp:7f41990328e8 ax:ffffffffff600000 si:7f4199032e08 di:ffffffffff600000 [9018684.453634] exe[238782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575f22535a6 cs:33 sp:7f41990328e8 ax:ffffffffff600000 si:7f4199032e08 di:ffffffffff600000 [9018696.869632] exe[259095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba6f995a6 cs:33 sp:7f300e1ae8e8 ax:ffffffffff600000 si:7f300e1aee08 di:ffffffffff600000 [9018696.977731] exe[257432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba6f995a6 cs:33 sp:7f300e1ae8e8 ax:ffffffffff600000 si:7f300e1aee08 di:ffffffffff600000 [9018697.081514] exe[259011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba6f995a6 cs:33 sp:7f300e1ae8e8 ax:ffffffffff600000 si:7f300e1aee08 di:ffffffffff600000 [9018697.187924] exe[259183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba6f995a6 cs:33 sp:7f300e1ae8e8 ax:ffffffffff600000 si:7f300e1aee08 di:ffffffffff600000 [9018820.317651] exe[254936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1286405a6 cs:33 sp:7f608f2858e8 ax:ffffffffff600000 si:7f608f285e08 di:ffffffffff600000 [9018820.436160] exe[249298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1286405a6 cs:33 sp:7f608f2858e8 ax:ffffffffff600000 si:7f608f285e08 di:ffffffffff600000 [9018820.489209] exe[250143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610689145a6 cs:33 sp:7fbd9bc458e8 ax:ffffffffff600000 si:7fbd9bc45e08 di:ffffffffff600000 [9018820.932166] exe[249802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1286405a6 cs:33 sp:7f608f2858e8 ax:ffffffffff600000 si:7f608f285e08 di:ffffffffff600000 [9018821.004277] exe[250535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c98cff35a6 cs:33 sp:7fc1253078e8 ax:ffffffffff600000 si:7fc125307e08 di:ffffffffff600000 [9018821.023785] exe[256927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610689145a6 cs:33 sp:7fbd9bc458e8 ax:ffffffffff600000 si:7fbd9bc45e08 di:ffffffffff600000 [9018821.118209] exe[254936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1286405a6 cs:33 sp:7f608f2858e8 ax:ffffffffff600000 si:7f608f285e08 di:ffffffffff600000 [9018821.148301] exe[253683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610689145a6 cs:33 sp:7fbd9bc458e8 ax:ffffffffff600000 si:7fbd9bc45e08 di:ffffffffff600000 [9018821.169382] exe[254899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c98cff35a6 cs:33 sp:7fc1253078e8 ax:ffffffffff600000 si:7fc125307e08 di:ffffffffff600000 [9018821.321711] exe[250124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c98cff35a6 cs:33 sp:7fc1253078e8 ax:ffffffffff600000 si:7fc125307e08 di:ffffffffff600000 [9019200.039686] exe[251799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2bcbe5a6 cs:33 sp:7f8a085ef8e8 ax:ffffffffff600000 si:7f8a085efe08 di:ffffffffff600000 [9019200.139003] exe[255939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2bcbe5a6 cs:33 sp:7f8a085ef8e8 ax:ffffffffff600000 si:7f8a085efe08 di:ffffffffff600000 [9019200.255114] exe[265237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2bcbe5a6 cs:33 sp:7f8a085ef8e8 ax:ffffffffff600000 si:7f8a085efe08 di:ffffffffff600000 [9019200.351939] exe[259660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2bcbe5a6 cs:33 sp:7f8a085ef8e8 ax:ffffffffff600000 si:7f8a085efe08 di:ffffffffff600000 [9019358.920518] exe[264841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589f1ebe5a6 cs:33 sp:7f20d37c68e8 ax:ffffffffff600000 si:7f20d37c6e08 di:ffffffffff600000 [9019471.101860] exe[270855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7ebf05a6 cs:33 sp:7ef51ed508e8 ax:ffffffffff600000 si:7ef51ed50e08 di:ffffffffff600000 [9019471.160367] exe[270855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7ebf05a6 cs:33 sp:7ef51ed508e8 ax:ffffffffff600000 si:7ef51ed50e08 di:ffffffffff600000 [9019471.222089] exe[183937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7ebf05a6 cs:33 sp:7ef51ed508e8 ax:ffffffffff600000 si:7ef51ed50e08 di:ffffffffff600000 [9019471.275763] exe[194348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7ebf05a6 cs:33 sp:7ef51ed508e8 ax:ffffffffff600000 si:7ef51ed50e08 di:ffffffffff600000 [9019501.623331] exe[243069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2e6ca5a6 cs:33 sp:7f55467d58e8 ax:ffffffffff600000 si:7f55467d5e08 di:ffffffffff600000 [9020438.651652] exe[306315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960f1405a6 cs:33 sp:7fcfc6e988e8 ax:ffffffffff600000 si:7fcfc6e98e08 di:ffffffffff600000 [9020643.078537] exe[306839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a5d1b45a6 cs:33 sp:7eaa227fe8e8 ax:ffffffffff600000 si:7eaa227fee08 di:ffffffffff600000 [9021377.099025] exe[323159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e38577a5a6 cs:33 sp:7f10b2af0f88 ax:ffffffffff600000 si:200004c0 di:ffffffffff600000 [9021377.219720] exe[323243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e38577a5a6 cs:33 sp:7f10b2a8df88 ax:ffffffffff600000 si:200004c0 di:ffffffffff600000 [9021377.337571] exe[308309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e38577a5a6 cs:33 sp:7f10b2a8df88 ax:ffffffffff600000 si:200004c0 di:ffffffffff600000 [9022002.523340] exe[332534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622adbb15a6 cs:33 sp:7f70a7bf78e8 ax:ffffffffff600000 si:7f70a7bf7e08 di:ffffffffff600000 [9022637.748672] exe[363510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565168ad05a6 cs:33 sp:7f051edf28e8 ax:ffffffffff600000 si:7f051edf2e08 di:ffffffffff600000 [9022705.044677] exe[363248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d87f405a6 cs:33 sp:7fe00fa618e8 ax:ffffffffff600000 si:7fe00fa61e08 di:ffffffffff600000 [9023823.600727] exe[293218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da988f85a6 cs:33 sp:7eb77f7cb8e8 ax:ffffffffff600000 si:7eb77f7cbe08 di:ffffffffff600000 [9024077.063467] exe[373233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b225ce95a6 cs:33 sp:7fca11f0a8e8 ax:ffffffffff600000 si:7fca11f0ae08 di:ffffffffff600000 [9024078.061169] exe[374300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b225ce95a6 cs:33 sp:7fca11f0a8e8 ax:ffffffffff600000 si:7fca11f0ae08 di:ffffffffff600000 [9024079.115533] exe[403619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b225ce95a6 cs:33 sp:7fca11f0a8e8 ax:ffffffffff600000 si:7fca11f0ae08 di:ffffffffff600000 [9024169.984244] exe[385831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3e0d345a6 cs:33 sp:7f8d02fe68e8 ax:ffffffffff600000 si:7f8d02fe6e08 di:ffffffffff600000 [9024170.056863] exe[403921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3e0d345a6 cs:33 sp:7f8d02fe68e8 ax:ffffffffff600000 si:7f8d02fe6e08 di:ffffffffff600000 [9024170.132164] exe[405337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3e0d345a6 cs:33 sp:7f8d02fe68e8 ax:ffffffffff600000 si:7f8d02fe6e08 di:ffffffffff600000 [9024291.928288] exe[417558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e7c3263e8 cs:33 sp:7f8359e2ff90 ax:7f8359e30020 si:ffffffffff600000 di:564e7c3f082f [9024292.056257] exe[411390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e7c3263e8 cs:33 sp:7f8359e2ff90 ax:7f8359e30020 si:ffffffffff600000 di:564e7c3f082f [9024292.163481] exe[392394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e7c3263e8 cs:33 sp:7f83599fef90 ax:7f83599ff020 si:ffffffffff600000 di:564e7c3f082f [9024295.098538] exe[418884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.168094] exe[417188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.230820] exe[411201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.294241] exe[410000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.353690] exe[417189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.412221] exe[417536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024295.467024] exe[411367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560616d7a3e8 cs:33 sp:7f1923a7bf90 ax:7f1923a7c020 si:ffffffffff600000 di:560616e4482f [9024710.430344] warn_bad_vsyscall: 19 callbacks suppressed [9024710.430349] exe[373238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccf50de5a6 cs:33 sp:7f5cfcefef88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9024710.509382] exe[373406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccf50de5a6 cs:33 sp:7f5cfcefef88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9024710.587769] exe[372731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccf50de5a6 cs:33 sp:7f5cfcefef88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9027508.368792] exe[506639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d9c06c5a6 cs:33 sp:7fedbc1028e8 ax:ffffffffff600000 si:7fedbc102e08 di:ffffffffff600000 [9028375.579332] exe[491426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf325df8e8 ax:ffffffffff600000 si:7fcf325dfe08 di:ffffffffff600000 [9028375.699117] exe[478099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.727047] exe[488860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.757853] exe[476795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.787682] exe[476795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.815601] exe[477390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.843592] exe[477390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.871962] exe[477390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.902350] exe[477390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028375.931433] exe[477390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d353c5a6 cs:33 sp:7fcf3259d8e8 ax:ffffffffff600000 si:7fcf3259de08 di:ffffffffff600000 [9028521.027043] warn_bad_vsyscall: 58 callbacks suppressed [9028521.027046] exe[479623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bb6abe3e8 cs:33 sp:7fd527c36f90 ax:7fd527c37020 si:ffffffffff600000 di:557bb6b8882f [9028521.118016] exe[527643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bb6abe3e8 cs:33 sp:7fd527c36f90 ax:7fd527c37020 si:ffffffffff600000 di:557bb6b8882f [9028521.229150] exe[522435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bb6abe3e8 cs:33 sp:7fd527c36f90 ax:7fd527c37020 si:ffffffffff600000 di:557bb6b8882f [9029349.699732] exe[547114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f578dd5a6 cs:33 sp:7eb8cfe7df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9029349.770219] exe[547026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f578dd5a6 cs:33 sp:7eb8cfe7df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9029349.817022] exe[551969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f578dd5a6 cs:33 sp:7eb8cfe7df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9029647.330488] exe[520297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.541995] exe[552616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.572550] exe[552616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.608483] exe[520297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.655757] exe[520763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.687104] exe[482897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.719070] exe[482897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.751365] exe[546295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.783695] exe[482897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9029647.815727] exe[520763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56006817f5a6 cs:33 sp:7ee76fe698e8 ax:ffffffffff600000 si:7ee76fe69e08 di:ffffffffff600000 [9030920.225750] warn_bad_vsyscall: 52 callbacks suppressed [9030920.225754] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.284290] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9030920.338544] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.407153] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.483574] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.538130] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.594894] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.662042] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.713715] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030920.769136] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.310723] warn_bad_vsyscall: 166 callbacks suppressed [9030925.310727] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.361059] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.384672] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.421301] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.486896] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.532058] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030925.577000] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030925.629715] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.681727] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030925.719386] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030934.172575] warn_bad_vsyscall: 279 callbacks suppressed [9030934.172578] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030934.285564] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030935.297763] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030935.358114] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030935.405880] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030947.908883] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030947.950562] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030947.989853] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030948.622031] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030948.672165] exe[564540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030948.714313] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030949.288475] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030949.340914] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030949.388228] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030949.958685] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030953.866666] warn_bad_vsyscall: 2 callbacks suppressed [9030953.866670] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030953.911965] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030953.957045] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030953.957651] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030954.385180] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030954.452714] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9030954.473507] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9030954.493849] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9030954.537795] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030962.732989] exe[572198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030962.786028] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030962.847379] exe[572198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030962.848262] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030967.070881] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030967.117393] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030967.157899] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030969.420217] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030969.471376] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030969.512807] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030969.534935] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030972.651905] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030972.694762] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030972.716894] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030972.780464] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.467052] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.520702] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.544224] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.569205] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.594198] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.615971] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.637220] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.659698] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.681090] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030974.703065] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030981.337177] warn_bad_vsyscall: 35 callbacks suppressed [9030981.337180] exe[572198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030981.401614] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030981.425271] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030981.482783] exe[572198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030983.431360] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030983.472052] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030983.511830] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030990.069413] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030990.132693] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030990.133464] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9030990.202054] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030990.229421] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030994.824256] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030994.870997] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030994.914245] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030995.156884] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030995.221678] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030995.254093] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030995.304824] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030997.641656] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030997.689833] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9030997.736436] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031005.411986] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031005.452359] exe[564540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031005.491460] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031008.339236] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031008.382591] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031008.423893] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031013.628331] exe[570198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031013.670049] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.691727] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.713080] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.735231] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.758569] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.780208] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.801405] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.822044] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031013.843011] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031026.064326] warn_bad_vsyscall: 63 callbacks suppressed [9031026.064330] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031026.112596] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031026.157069] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031026.981257] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031027.032187] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031027.071674] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031028.531290] exe[512462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562007fbd5a6 cs:33 sp:7f10d5b658e8 ax:ffffffffff600000 si:7f10d5b65e08 di:ffffffffff600000 [9031028.572372] exe[504434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562007fbd5a6 cs:33 sp:7f10d5b658e8 ax:ffffffffff600000 si:7f10d5b65e08 di:ffffffffff600000 [9031028.611429] exe[504434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562007fbd5a6 cs:33 sp:7f10d5b658e8 ax:ffffffffff600000 si:7f10d5b65e08 di:ffffffffff600000 [9031028.612222] exe[536582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562007fbd5a6 cs:33 sp:7f10d5b448e8 ax:ffffffffff600000 si:7f10d5b44e08 di:ffffffffff600000 [9031032.554089] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031032.600962] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031032.647186] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031035.053644] exe[570198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031035.103178] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031035.146446] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031042.428265] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031042.471542] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031042.510729] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031042.534008] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031044.890058] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031044.944357] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031044.992204] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031055.570508] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031055.620522] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031055.679094] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031056.034288] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031056.077348] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031056.123590] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031073.877832] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031073.918837] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031074.011369] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031079.046780] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031079.126043] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031079.177051] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031083.738678] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031083.785260] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031083.831399] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031083.855273] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031085.576621] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031085.622817] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031085.676752] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.060115] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.101879] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.144066] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.337101] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.381746] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.426709] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031088.450035] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031093.508802] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031093.573422] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031093.624430] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031095.896190] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031095.940917] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031095.982335] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031097.195150] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031097.263107] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031097.307712] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031105.143324] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031105.224871] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031105.272553] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031110.298285] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031110.337871] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031110.379554] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031111.395692] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031111.453078] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031111.510245] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031112.475278] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031112.521392] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031112.541867] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031112.562614] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031119.344892] warn_bad_vsyscall: 70 callbacks suppressed [9031119.344896] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031119.396563] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031119.422034] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031119.466647] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031119.489321] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031144.386288] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031144.427303] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031144.469167] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031145.676801] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031145.728615] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031145.782019] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031147.111263] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031147.161563] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031147.211311] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031148.698971] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031168.534911] warn_bad_vsyscall: 69 callbacks suppressed [9031168.534915] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031168.587464] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031168.588527] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031168.650220] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031178.846101] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031178.894278] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031178.915603] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031178.936662] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031178.957838] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031178.979845] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031179.001324] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031179.023008] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031179.045121] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031179.066297] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031195.027323] warn_bad_vsyscall: 64 callbacks suppressed [9031195.027327] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031195.079662] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031195.143105] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031196.040845] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031196.093547] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031196.139912] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031200.943878] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031200.987994] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031200.989509] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031201.051255] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031201.931412] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031201.984214] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031202.029065] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031203.884272] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031203.934474] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031203.956384] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031219.985383] warn_bad_vsyscall: 5 callbacks suppressed [9031219.985387] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.031165] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.055609] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031220.100154] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.121188] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031220.840157] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.896312] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.919886] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031220.956372] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031221.069344] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031225.137122] warn_bad_vsyscall: 22 callbacks suppressed [9031225.137126] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031225.185801] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031225.233218] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031233.615851] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031233.696498] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031236.482624] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031236.525855] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031236.570269] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.409958] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.459779] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.481316] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.531141] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.586751] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.627460] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031275.677768] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.703585] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031275.810187] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031275.857825] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031289.444889] warn_bad_vsyscall: 4 callbacks suppressed [9031289.444893] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031289.503732] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031289.569129] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031289.570787] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031292.273958] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031292.320407] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031292.358501] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031292.381202] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031293.350814] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031293.395560] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031296.039963] warn_bad_vsyscall: 1 callbacks suppressed [9031296.039967] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031296.099032] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031296.099589] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031296.165728] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031296.188426] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031300.102761] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031300.165821] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031300.191826] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031300.240159] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031312.101515] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031312.169140] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031313.218448] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031313.261499] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031313.285101] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031313.329616] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031313.353226] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031321.232426] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031321.294445] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031322.335623] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031322.384159] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031322.407201] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031322.451727] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031324.233837] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031324.280682] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031324.329861] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031345.310763] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031345.351243] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031345.395072] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031345.417781] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031349.034331] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031349.076438] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031349.121193] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031359.842484] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031359.907027] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031360.145849] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031360.196910] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.217665] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.238457] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.258962] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.280149] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.302344] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031360.324103] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031364.940029] warn_bad_vsyscall: 38 callbacks suppressed [9031364.940033] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031364.992407] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031365.036510] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031365.395931] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031365.467032] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031365.530083] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031372.033190] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031372.092075] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031372.113220] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031372.134500] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031372.181457] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031372.210574] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc558e8 ax:ffffffffff600000 si:7f707cc55e08 di:ffffffffff600000 [9031376.610876] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031376.704604] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031376.775970] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031381.251334] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031381.299376] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031381.366583] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031382.456033] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031382.506542] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031382.550559] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031382.552613] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031403.574472] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031403.622696] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031403.645520] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031403.702914] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031403.728723] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031404.500419] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031404.548694] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031404.598946] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.083614] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.130620] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.156593] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031413.204134] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.204411] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031413.460484] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.504039] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.545694] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031413.547332] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031427.142479] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031427.195727] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031427.287155] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031431.688461] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031431.745831] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031431.745851] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031431.821125] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031440.034807] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031440.090881] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031440.144997] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031442.310988] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031442.381370] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031442.411396] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031442.461400] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031447.173713] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031447.226823] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031447.271441] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031449.782395] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031449.885525] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031449.954362] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031462.861575] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031462.900484] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031462.943857] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031464.688750] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031464.740602] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031469.794219] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031469.849872] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031469.920924] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031478.238484] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031478.285489] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.306142] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.326931] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.348243] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.370219] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.391803] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.414532] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.436940] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031478.458688] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031491.608168] warn_bad_vsyscall: 61 callbacks suppressed [9031491.608172] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031491.655488] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031491.698089] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031497.653025] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031497.712133] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031497.756508] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031500.888630] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031500.955813] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031501.008243] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031503.520947] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031503.566209] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031503.605485] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031503.606160] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031506.962816] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031507.012840] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031507.064022] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031530.655208] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031530.698473] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031530.742041] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031530.765181] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031532.819262] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031532.881304] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031532.952483] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031533.566025] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031533.625763] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031533.672198] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031548.246844] warn_bad_vsyscall: 3 callbacks suppressed [9031548.246847] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031548.305275] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031548.346580] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031549.044880] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031549.105137] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031549.175250] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031549.180489] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031550.538645] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031550.616199] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031550.662664] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031563.840668] warn_bad_vsyscall: 7 callbacks suppressed [9031563.840671] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031563.925521] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031563.968285] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031563.997406] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031566.526779] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031566.573233] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031566.597331] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031566.647276] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031566.766039] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031566.814980] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031575.622984] warn_bad_vsyscall: 3 callbacks suppressed [9031575.622987] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031575.687099] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031575.710941] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031575.765104] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.049171] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.093498] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.139391] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.766670] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.819135] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031578.866850] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031584.671216] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031584.731347] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031584.761157] exe[570203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031584.818244] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031610.953299] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031610.998236] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031611.039482] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031611.996313] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.045212] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.066050] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.087715] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.109971] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.132166] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031612.153993] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.009054] warn_bad_vsyscall: 60 callbacks suppressed [9031618.009058] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.061775] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.122158] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.145441] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.167389] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.191948] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.219926] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.241961] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.264145] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031618.288074] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031626.570630] warn_bad_vsyscall: 64 callbacks suppressed [9031626.570633] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031626.650444] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031626.699353] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031628.711991] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031628.756870] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031628.813168] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031632.824826] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031632.887220] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031632.934273] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031632.956910] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031635.883594] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031635.949882] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031636.011809] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031660.561711] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031660.612334] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031660.673243] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031670.245722] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031670.310342] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031670.359248] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031671.907105] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031671.998037] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031672.102305] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031672.147988] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031675.344652] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031675.403371] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031675.447608] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.165991] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.212942] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.269433] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.334023] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.444011] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031706.445632] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031706.529960] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031714.381862] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031714.441778] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031714.518751] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031714.543249] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031719.198830] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031719.254791] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031719.304729] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031719.328281] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031727.578711] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031727.637904] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031730.867549] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031730.912291] exe[570201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031730.941120] exe[570201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031731.016543] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031733.222205] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031733.266777] exe[570201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031733.327002] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031738.996112] exe[571016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031739.114102] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031739.359210] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031750.810061] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031753.622492] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031753.817431] exe[571009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031753.957797] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031762.056279] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031762.119756] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031762.169570] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031764.474140] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031764.519729] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031764.566652] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031765.188135] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031765.284781] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031765.338251] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031769.765791] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031769.808995] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031769.833754] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031769.891404] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031769.916411] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031776.933533] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031776.988933] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031777.037807] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031781.637018] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031781.688022] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031781.713202] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031781.767472] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031807.694132] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031807.747439] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031807.808326] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031815.680804] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031815.736485] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031815.758235] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031815.823895] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031815.848711] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031829.922003] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031829.969210] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031830.020040] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031830.020447] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031834.523225] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031834.576283] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031834.623467] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031834.647309] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031834.704982] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031834.775768] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031839.397872] warn_bad_vsyscall: 2 callbacks suppressed [9031839.397875] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031839.467290] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031839.495628] exe[570203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031839.558797] exe[570203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031840.559615] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031840.619135] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031840.645132] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031840.693149] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031841.545895] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031841.596521] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031851.667588] warn_bad_vsyscall: 8 callbacks suppressed [9031851.667592] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031851.742947] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031851.771406] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031851.844922] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031851.870166] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031862.982938] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031863.047425] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031863.162859] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9031865.189203] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.244808] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.267720] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.288836] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.310895] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.333742] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031865.355849] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031873.942100] warn_bad_vsyscall: 35 callbacks suppressed [9031873.942103] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031873.997152] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031874.048912] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.528462] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.600574] exe[570636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.649677] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.801646] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.856525] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031876.904367] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031880.981808] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031881.031663] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031881.056409] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9031881.101534] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031886.972848] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031887.025341] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031887.067478] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031894.291714] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031894.334710] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031894.386043] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031919.403611] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031919.453196] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031919.501039] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031920.508141] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031920.553352] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031920.600149] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031948.392885] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031948.441186] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9031948.491409] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032054.342467] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032054.400390] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032054.462179] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032054.491401] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032061.820780] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032061.878477] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032061.926047] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032061.959476] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032063.751950] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032063.803096] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032063.825511] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032063.869020] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032067.024781] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032067.081417] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032067.113453] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032067.161208] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032067.183610] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032079.526082] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032079.589384] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032079.614216] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032079.654545] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032083.238965] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032083.295663] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032083.319573] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032083.369963] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032083.397412] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032089.038725] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032089.091528] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032089.092029] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032089.157440] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032090.916062] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032090.971869] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032090.993647] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032091.048652] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032101.475908] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032101.519396] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032101.542971] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032101.593752] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032110.996230] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032111.050104] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032111.075466] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032111.114966] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032115.060726] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032115.109718] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032115.163298] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032115.989936] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032116.038123] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032116.074913] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032120.381924] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032120.434224] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032120.485855] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032127.489570] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032127.569432] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032127.666440] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032128.323028] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032128.373012] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032128.420337] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032146.788010] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032146.854509] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032146.880056] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032146.933551] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032164.331468] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032164.383598] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032164.433840] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032164.434451] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032167.195214] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032167.251911] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032167.338857] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032167.709538] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032167.752341] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032167.824532] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032172.240238] warn_bad_vsyscall: 4 callbacks suppressed [9032172.240242] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032172.300080] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032172.359493] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032173.450492] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032173.494542] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032173.533825] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032173.556068] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032174.253517] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032174.301609] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032174.347721] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032177.288184] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032177.339797] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032177.393305] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032178.942792] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032179.001579] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032179.074473] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032181.549669] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032181.609124] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032181.611668] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032181.677197] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032188.755300] warn_bad_vsyscall: 1 callbacks suppressed [9032188.755304] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032188.811471] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032188.864456] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032188.888694] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032190.591535] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032190.657510] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032190.718373] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032197.801942] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032197.853637] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032197.899513] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032198.374301] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032198.424249] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032198.467912] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032198.489933] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032200.343867] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032200.391928] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032200.438743] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032209.535827] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032209.588531] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032209.616781] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032209.658689] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.465548] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.520787] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.543661] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.589542] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.711763] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.756070] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032227.812769] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032228.047262] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032228.104328] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032228.158750] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032240.323721] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032240.368240] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032240.421606] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032243.091705] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032243.140329] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032243.142176] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032243.208643] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032246.175280] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032246.221210] exe[570328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032246.283060] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032249.926542] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032249.999772] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032250.027427] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032250.088512] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032256.210767] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032256.262464] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032256.334603] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032266.160908] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032266.217622] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032266.269561] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032273.970344] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032274.013478] exe[570198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032274.058254] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032282.695493] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032282.739160] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032282.784922] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032286.387164] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032286.439463] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032286.510877] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032288.308498] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032289.059226] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032290.021055] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032295.364816] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.406974] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.433052] exe[570203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032295.473350] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.523675] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.568575] exe[571037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.611636] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.633050] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.655413] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032295.677450] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032308.934204] warn_bad_vsyscall: 64 callbacks suppressed [9032308.934208] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032309.014661] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032309.039100] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032309.077393] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032320.192997] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032320.245045] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032320.292239] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032324.595951] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032324.641511] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032324.688181] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032326.179168] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032326.222192] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032326.264575] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032326.291310] exe[570223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032341.424783] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032341.465748] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032341.514120] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032361.600317] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032361.647053] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032361.669806] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032361.715504] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032362.009141] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032362.071464] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032362.092772] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032362.113828] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032362.135345] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032362.158314] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032367.800456] warn_bad_vsyscall: 130 callbacks suppressed [9032367.800459] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032367.859749] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032367.906313] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032368.816326] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032368.862373] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032368.908113] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032381.902191] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032381.957412] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032382.030092] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032385.888881] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032385.933818] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032385.987667] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032391.989877] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032392.040462] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032392.085658] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032393.091479] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032393.135337] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032393.175524] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032393.196347] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032393.218424] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032393.239828] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032393.260618] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032398.948439] warn_bad_vsyscall: 31 callbacks suppressed [9032398.948443] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032398.999798] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032399.043522] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032416.990377] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.044496] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.069377] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032417.112939] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.732087] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.777597] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.778226] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032417.843031] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032417.843843] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032417.974974] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032425.793535] warn_bad_vsyscall: 2 callbacks suppressed [9032425.793539] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032425.852217] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032425.891082] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032428.359790] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032428.408309] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032428.453888] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032444.032055] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032444.080260] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032444.125471] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032456.729339] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032456.775045] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032456.818567] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032462.689496] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032462.739295] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032462.779139] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032462.803053] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032469.040279] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032469.086090] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032469.125755] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032469.150522] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.162783] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.209642] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.250173] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.289480] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.329178] exe[572201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032474.371174] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032474.393144] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032475.100546] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032475.164862] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032475.214459] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032490.503221] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032490.562215] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032490.617786] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032490.639718] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032500.216187] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032500.262322] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032500.311947] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032500.428574] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032500.474008] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032500.512905] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.310450] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.358713] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.404927] exe[564533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.406436] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032514.863714] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.923465] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032514.950513] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032514.999781] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032518.559611] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032518.608480] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.825216] warn_bad_vsyscall: 33 callbacks suppressed [9032522.825219] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.876058] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.916314] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.937999] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.958545] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032522.979272] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032523.001413] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032523.023861] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032523.045292] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032523.066936] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032529.622815] warn_bad_vsyscall: 25 callbacks suppressed [9032529.622820] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032529.687999] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032529.734028] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032537.290687] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032537.344859] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032537.394704] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032543.139293] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032543.213063] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032543.260118] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032543.280766] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032546.094782] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032546.149050] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032546.197260] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032550.140770] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032550.183734] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032550.184656] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032550.242510] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032551.877480] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032551.937209] exe[564706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032551.982767] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032552.004040] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032552.034216] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032552.056001] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032572.721133] warn_bad_vsyscall: 29 callbacks suppressed [9032572.721138] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032572.774753] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032572.819009] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032575.820451] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032575.883382] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032575.929994] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032580.135813] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032580.174470] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032580.217462] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032581.991053] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032582.036001] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032582.091067] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032591.828609] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032591.889075] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032591.934498] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032591.934525] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032592.931420] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032592.975262] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032593.019002] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032593.429585] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032593.475960] exe[572206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032593.497270] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032597.468279] warn_bad_vsyscall: 4 callbacks suppressed [9032597.468282] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032597.523325] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032597.564906] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032609.895863] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032609.945677] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032609.990052] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032610.015053] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032610.504252] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032610.560264] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032610.622189] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032613.706696] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032613.762320] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032613.809827] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032615.922227] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032615.982961] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032616.005848] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032616.043362] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032620.577538] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032620.634571] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032620.697701] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032620.719561] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032628.773519] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032628.833809] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032628.889270] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032628.921760] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032629.474549] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032629.535738] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032629.588685] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032629.613614] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032636.317533] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032636.363596] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032636.416584] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032636.440127] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032645.019882] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032645.082417] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032645.133762] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032645.160908] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032651.723101] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032651.770122] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032651.816446] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.003652] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.161030] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.214960] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.432012] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.479543] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.519790] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.846046] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032656.892403] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032656.939661] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032658.735812] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032658.789726] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032658.790433] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032658.854143] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032669.563395] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032669.606301] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032669.627284] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032669.668292] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032670.405052] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032670.451025] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032670.498236] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.066736] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.122086] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.144600] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.196630] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.220144] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.335475] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.380916] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.403072] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032678.451634] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032678.672261] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032690.093690] warn_bad_vsyscall: 66 callbacks suppressed [9032690.093695] exe[572480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032690.187439] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032704.034330] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032704.086068] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032704.129646] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032704.129650] exe[572239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032714.789985] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032714.841562] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032714.887367] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032722.996819] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032723.054857] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032723.103970] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032724.705647] exe[564536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032724.755322] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032724.800795] exe[564994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032726.600377] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032728.395484] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032728.439284] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032728.480000] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032729.424569] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032729.464664] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032729.465166] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032729.531772] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032733.186610] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032733.235453] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032733.280466] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032734.711920] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032734.769567] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032734.817944] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.269035] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.316144] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.338205] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.385992] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.430086] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.469240] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032738.469526] exe[564538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032749.420969] warn_bad_vsyscall: 2 callbacks suppressed [9032749.420972] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032749.471366] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032749.518648] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032752.493466] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032752.551124] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032752.571678] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032752.592129] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032752.612884] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032752.634622] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032752.655646] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032771.322301] warn_bad_vsyscall: 60 callbacks suppressed [9032771.322305] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032771.375494] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032771.420029] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032771.443533] exe[564669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032773.016352] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032773.069359] exe[564895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032773.124709] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032773.148540] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032787.238999] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032787.280321] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032787.302882] exe[564545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032787.345046] exe[564577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032787.367698] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032795.841874] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032795.900586] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032795.929068] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032795.969509] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032796.567919] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032796.617288] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032796.641333] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032796.695890] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032810.369838] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032810.425922] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032810.485194] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032811.862543] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032811.913188] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032811.969383] exe[571020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032811.970593] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032815.702746] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032815.756800] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032815.756872] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032817.259862] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032817.320118] exe[570287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032817.372231] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032825.914008] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032825.966026] exe[570209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032825.990662] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032826.039284] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032845.174616] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032845.244444] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032845.268335] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032845.319196] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032846.217957] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032846.276239] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032846.298918] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032846.344116] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032846.366039] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032846.386796] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032860.037745] warn_bad_vsyscall: 65 callbacks suppressed [9032860.037748] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032860.102780] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032860.151356] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032864.106273] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032864.151133] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032864.176085] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032864.224908] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032867.101712] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032867.150791] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032867.204432] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032869.492549] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032869.538330] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032869.578394] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032885.373352] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032885.434499] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032885.488973] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032887.216193] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032887.256375] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032887.278778] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032887.320407] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032887.321194] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032891.760354] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032891.806227] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032891.827967] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032891.869201] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032892.349485] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032892.395138] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032892.418383] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc568e8 ax:ffffffffff600000 si:7f707cc56e08 di:ffffffffff600000 [9032892.463330] exe[570218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc568e8 ax:ffffffffff600000 si:7f707cc56e08 di:ffffffffff600000 [9032893.392149] exe[571021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032893.432755] exe[570225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032897.442181] warn_bad_vsyscall: 38 callbacks suppressed [9032897.442184] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032897.496039] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032897.542230] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032927.203381] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032927.257771] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032927.304548] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032931.666613] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032931.753783] exe[570443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032931.816531] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032932.773978] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032932.832185] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032932.877317] exe[570222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032958.132924] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032958.179184] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032958.201983] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9032958.252682] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032958.254260] exe[570810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9032964.296528] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032964.335978] exe[570226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032964.379695] exe[570205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032974.830722] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032974.885941] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032974.941131] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032974.966580] exe[570215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032991.691327] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032991.739748] exe[571087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032991.762055] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032991.819590] exe[570211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9032991.842142] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033001.040705] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033001.085860] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033001.108967] exe[570199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033001.153317] exe[570806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033001.177622] exe[570207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033002.036038] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033002.086774] exe[570707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033002.130085] exe[571018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033004.436716] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033004.500600] exe[570289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033017.215208] exe[567514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033017.291354] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc368e8 ax:ffffffffff600000 si:7f707cc36e08 di:ffffffffff600000 [9033017.339905] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033017.367006] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033022.402885] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033022.448780] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033022.498506] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033023.559536] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033023.615547] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033023.664720] exe[564535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033023.689576] exe[572204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033027.071436] exe[564912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033027.116997] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033027.139548] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033034.791785] warn_bad_vsyscall: 1 callbacks suppressed [9033034.791789] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033034.851930] exe[565008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033034.909499] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033034.935305] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033035.687197] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033035.774591] exe[564760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033035.847122] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033044.976456] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033045.024034] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033045.045597] exe[565724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033045.107530] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033045.130933] exe[572479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033050.970154] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033051.038952] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033051.038972] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033051.105264] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033066.182721] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033066.227974] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033066.252177] exe[564659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033066.293966] exe[564529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033066.318886] exe[572197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033072.901913] exe[564984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033072.953267] exe[564672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033072.999479] exe[564897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc788e8 ax:ffffffffff600000 si:7f707cc78e08 di:ffffffffff600000 [9033073.001224] exe[565089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586fed915a6 cs:33 sp:7f707cc578e8 ax:ffffffffff600000 si:7f707cc57e08 di:ffffffffff600000 [9033519.339614] exe[615555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5764665a6 cs:33 sp:7f656cff6f88 ax:ffffffffff600000 si:20008880 di:ffffffffff600000 [9033519.409461] exe[615569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5764665a6 cs:33 sp:7f656cfd5f88 ax:ffffffffff600000 si:20008880 di:ffffffffff600000 [9033519.517786] exe[633195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5764665a6 cs:33 sp:7f656cfb4f88 ax:ffffffffff600000 si:20008880 di:ffffffffff600000 [9034755.014918] exe[664748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7ec82e3e8 cs:33 sp:7f8b7e8bff90 ax:7f8b7e8c0020 si:ffffffffff600000 di:55b7ec8f882f [9034755.108550] exe[625837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7ec82e3e8 cs:33 sp:7f8b7e89ef90 ax:7f8b7e89f020 si:ffffffffff600000 di:55b7ec8f882f [9034755.162280] exe[643028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7ec82e3e8 cs:33 sp:7f8b7e8bff90 ax:7f8b7e8c0020 si:ffffffffff600000 di:55b7ec8f882f [9034755.192087] exe[645304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7ec82e3e8 cs:33 sp:7f8b7e8bff90 ax:7f8b7e8c0020 si:ffffffffff600000 di:55b7ec8f882f [9035048.684703] exe[676561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55871bf115a6 cs:33 sp:7f903bd878e8 ax:ffffffffff600000 si:7f903bd87e08 di:ffffffffff600000 [9035048.835757] exe[676695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55871bf115a6 cs:33 sp:7f903bd878e8 ax:ffffffffff600000 si:7f903bd87e08 di:ffffffffff600000 [9035049.294107] exe[655505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55871bf115a6 cs:33 sp:7f903bd668e8 ax:ffffffffff600000 si:7f903bd66e08 di:ffffffffff600000 [9035858.908542] exe[693399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd0c5015a6 cs:33 sp:7f4a246ac8e8 ax:ffffffffff600000 si:7f4a246ace08 di:ffffffffff600000 [9035859.739026] exe[693399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd0c5015a6 cs:33 sp:7f4a246ac8e8 ax:ffffffffff600000 si:7f4a246ace08 di:ffffffffff600000 [9035859.887863] exe[694710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd0c5015a6 cs:33 sp:7f4a246ac8e8 ax:ffffffffff600000 si:7f4a246ace08 di:ffffffffff600000 [9035859.887903] exe[694814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd0c5015a6 cs:33 sp:7f4a2468b8e8 ax:ffffffffff600000 si:7f4a2468be08 di:ffffffffff600000 [9037445.610607] exe[726411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c20840e5a6 cs:33 sp:7eb5cea608e8 ax:ffffffffff600000 si:7eb5cea60e08 di:ffffffffff600000 [9037446.487298] exe[726429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c20840e5a6 cs:33 sp:7eb5cea608e8 ax:ffffffffff600000 si:7eb5cea60e08 di:ffffffffff600000 [9037447.380077] exe[726411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c20840e5a6 cs:33 sp:7eb5cea608e8 ax:ffffffffff600000 si:7eb5cea60e08 di:ffffffffff600000 [9037449.966604] exe[727370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c1cf855a6 cs:33 sp:7ef95107a8e8 ax:ffffffffff600000 si:7ef95107ae08 di:ffffffffff600000 [9037450.137928] exe[727365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c1cf855a6 cs:33 sp:7ef9510388e8 ax:ffffffffff600000 si:7ef951038e08 di:ffffffffff600000 [9037450.286631] exe[727343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c1cf855a6 cs:33 sp:7ef95107a8e8 ax:ffffffffff600000 si:7ef95107ae08 di:ffffffffff600000 [9039914.329445] exe[718028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612d7673e8 cs:33 sp:7f55a094af90 ax:7f55a094b020 si:ffffffffff600000 di:55612d83182f [9039914.479927] exe[717601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612d7673e8 cs:33 sp:7f55a094af90 ax:7f55a094b020 si:ffffffffff600000 di:55612d83182f [9039915.132686] exe[717685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55612d7673e8 cs:33 sp:7f55a094af90 ax:7f55a094b020 si:ffffffffff600000 di:55612d83182f [9041518.364769] exe[826793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56467ea385a6 cs:33 sp:7fe87a93f8e8 ax:ffffffffff600000 si:7fe87a93fe08 di:ffffffffff600000 [9041518.425899] exe[839005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56467ea385a6 cs:33 sp:7fe87a91e8e8 ax:ffffffffff600000 si:7fe87a91ee08 di:ffffffffff600000 [9041519.170656] exe[841189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56467ea385a6 cs:33 sp:7fe87a93f8e8 ax:ffffffffff600000 si:7fe87a93fe08 di:ffffffffff600000 [9041519.218799] exe[840264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56467ea385a6 cs:33 sp:7fe87a93f8e8 ax:ffffffffff600000 si:7fe87a93fe08 di:ffffffffff600000 [9041972.143120] exe[867738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618fd1715a6 cs:33 sp:7ec0d82358e8 ax:ffffffffff600000 si:7ec0d8235e08 di:ffffffffff600000 [9041972.261647] exe[869882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618fd1715a6 cs:33 sp:7ec0d82358e8 ax:ffffffffff600000 si:7ec0d8235e08 di:ffffffffff600000 [9041972.403882] exe[869882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618fd1715a6 cs:33 sp:7ec0d82358e8 ax:ffffffffff600000 si:7ec0d8235e08 di:ffffffffff600000 [9042435.882225] exe[838023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.640847] exe[828576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.680380] exe[837932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.698859] exe[838016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.714935] exe[828584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.731828] exe[838018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.751444] exe[873255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.763490] exe[838016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.775805] exe[870137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9042436.791855] exe[874263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597dd3411a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4000000 [9043646.918951] warn_bad_vsyscall: 73 callbacks suppressed [9043646.918954] exe[895620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.095854] exe[898096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.130347] exe[898123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.163588] exe[898093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.199683] exe[898093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.233052] exe[897430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.265413] exe[897430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.298786] exe[897422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.329522] exe[898096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043647.362084] exe[898096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633399445a6 cs:33 sp:7fa26817b8e8 ax:ffffffffff600000 si:7fa26817be08 di:ffffffffff600000 [9043678.035100] warn_bad_vsyscall: 75 callbacks suppressed [9043678.035104] exe[839504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b96c5b1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [9043678.096938] exe[875500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b96c5b1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [9043678.113361] exe[839515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b96c5b1a1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [9044093.857564] exe[840661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6facf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044093.985614] exe[901605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.771147] exe[897829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.813727] exe[897859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.845666] exe[897859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.875757] exe[897859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.909180] exe[901620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.940483] exe[901620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044094.975170] exe[901620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9044095.005214] exe[829213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55778ea9b5a6 cs:33 sp:7fc4f6f8bf88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [9045541.480865] warn_bad_vsyscall: 57 callbacks suppressed [9045541.480869] exe[943132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef783a05a6 cs:33 sp:7eea5e52a8e8 ax:ffffffffff600000 si:7eea5e52ae08 di:ffffffffff600000 [9045542.180641] exe[943141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef783a05a6 cs:33 sp:7eea5e52a8e8 ax:ffffffffff600000 si:7eea5e52ae08 di:ffffffffff600000 [9045542.285023] exe[943127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef783a05a6 cs:33 sp:7eea5e52a8e8 ax:ffffffffff600000 si:7eea5e52ae08 di:ffffffffff600000 [9045563.488307] exe[947163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045563.623189] exe[947163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045563.741014] exe[943140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045563.854291] exe[943133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045563.993890] exe[943133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045564.157022] exe[948039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045564.274000] exe[943141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045564.408018] exe[943134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9045627.493214] exe[949686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b98cab3e8 cs:33 sp:7f8d40456f90 ax:7f8d40457020 si:ffffffffff600000 di:559b98d7582f [9045628.238741] exe[953914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b98cab3e8 cs:33 sp:7f8d40456f90 ax:7f8d40457020 si:ffffffffff600000 di:559b98d7582f [9045628.353019] exe[953914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b98cab3e8 cs:33 sp:7f8d40435f90 ax:7f8d40436020 si:ffffffffff600000 di:559b98d7582f [9047017.360960] exe[910838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566326a05a6 cs:33 sp:7f3506727f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9047017.470301] exe[975093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566326a05a6 cs:33 sp:7f3506727f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9047017.603676] exe[910838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566326a05a6 cs:33 sp:7f3506727f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9047341.592577] exe[961442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa880845a6 cs:33 sp:7ebb3d4568e8 ax:ffffffffff600000 si:7ebb3d456e08 di:ffffffffff600000 [9047341.679795] exe[958894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa880845a6 cs:33 sp:7ebb3d4568e8 ax:ffffffffff600000 si:7ebb3d456e08 di:ffffffffff600000 [9047341.741239] exe[958256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa880845a6 cs:33 sp:7ebb3d4358e8 ax:ffffffffff600000 si:7ebb3d435e08 di:ffffffffff600000 [9047590.049346] exe[943133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9047590.222685] exe[943133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f5078e8 ax:ffffffffff600000 si:7ee79f507e08 di:ffffffffff600000 [9047590.396857] exe[943137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3766c5a6 cs:33 sp:7ee79f4e68e8 ax:ffffffffff600000 si:7ee79f4e6e08 di:ffffffffff600000 [9048186.277535] exe[948797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57889f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.368326] exe[982171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.388738] exe[982171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.418020] exe[982188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.439645] exe[987476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.465940] exe[940146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.490039] exe[987474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.512095] exe[987474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.535850] exe[987474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048186.560361] exe[987474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627988885a6 cs:33 sp:7f3b57868f88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [9048749.852752] warn_bad_vsyscall: 89 callbacks suppressed [9048749.852755] exe[18364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048749.924377] exe[18817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048749.996090] exe[18457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048760.610884] exe[17717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048760.676966] exe[17214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048760.764699] exe[18386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048760.833334] exe[17048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9048760.897667] exe[18386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978df875a6 cs:33 sp:7ff00bffe8e8 ax:ffffffffff600000 si:7ff00bffee08 di:ffffffffff600000 [9049154.352394] exe[979781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557ffa125a6 cs:33 sp:7ff3040728e8 ax:ffffffffff600000 si:7ff304072e08 di:ffffffffff600000 [9049154.488720] exe[981046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557ffa125a6 cs:33 sp:7ff3040728e8 ax:ffffffffff600000 si:7ff304072e08 di:ffffffffff600000 [9049154.548756] exe[978233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557ffa125a6 cs:33 sp:7ff3040518e8 ax:ffffffffff600000 si:7ff304051e08 di:ffffffffff600000 [9049154.663729] exe[985511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557ffa125a6 cs:33 sp:7ff3040728e8 ax:ffffffffff600000 si:7ff304072e08 di:ffffffffff600000 [9049154.706026] exe[986083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557ffa125a6 cs:33 sp:7ff3040518e8 ax:ffffffffff600000 si:7ff304051e08 di:ffffffffff600000 [9050675.448263] exe[40926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641313a95a6 cs:33 sp:7f1c562a2f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9050675.545407] exe[38122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641313a95a6 cs:33 sp:7f1c56281f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9050675.650253] exe[41221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641313a95a6 cs:33 sp:7f1c56281f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000