8 14:42:23.926381 182129 task_exit.go:204] [ 38683( 534): 38683( 534)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.927395 182129 task_signals.go:204] [ 38683( 534): 38687( 535)] Signal 9, PID: 38683, TID: 38687, fault addr: 0x0: terminating thread group D0318 14:42:23.927544 182129 task_exit.go:204] [ 38683( 534): 38683( 534)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.927800 182129 task_exit.go:204] [ 38683( 534): 38687( 535)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.933255 182129 task_exit.go:204] [ 38680(1287): 38680(1287)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.933556 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:23.934851 182129 task_exit.go:204] [ 38680(1287): 38680(1287)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) D0318 14:42:23.938476 182129 task_exit.go:204] [ 38683( 534): 38687( 535)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.938619 182129 task_exit.go:204] [ 38683( 534): 38687( 535)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:23.938785 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:23.939743 182129 task_exit.go:204] [ 38683( 534): 38683( 534)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:23 executing program 2: r0 = socket(0x25, 0x5, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) D0318 14:42:23.943343 182129 usertrap_amd64.go:212] [ 38686( 556): 38686( 556)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:23.943477 182129 usertrap_amd64.go:122] [ 38686( 556): 38686( 556)] Allocate a new trap: 0xc000e684e0 39 D0318 14:42:23.943559 182129 usertrap_amd64.go:225] [ 38686( 556): 38686( 556)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:23.956243 182129 usertrap_amd64.go:212] [ 38682( 475): 38682( 475)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:23.956347 182129 usertrap_amd64.go:122] [ 38682( 475): 38682( 475)] Allocate a new trap: 0xc000e684b0 42 D0318 14:42:23.956502 182129 usertrap_amd64.go:225] [ 38682( 475): 38682( 475)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:23.957313 182129 usertrap_amd64.go:212] [ 38686( 556): 38686( 556)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:23.957416 182129 usertrap_amd64.go:122] [ 38686( 556): 38686( 556)] Allocate a new trap: 0xc000e684e0 40 D0318 14:42:23.957517 182129 usertrap_amd64.go:225] [ 38686( 556): 38686( 556)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:23.959984 182129 usertrap_amd64.go:212] [ 38686( 556): 38686( 556)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:23.960097 182129 usertrap_amd64.go:122] [ 38686( 556): 38686( 556)] Allocate a new trap: 0xc000e684e0 41 D0318 14:42:23.960224 182129 usertrap_amd64.go:225] [ 38686( 556): 38686( 556)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:23.961064 182129 usertrap_amd64.go:212] [ 38686( 556): 38689( 557)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:23.961171 182129 usertrap_amd64.go:122] [ 38686( 556): 38689( 557)] Allocate a new trap: 0xc000e684e0 42 D0318 14:42:23.961297 182129 usertrap_amd64.go:225] [ 38686( 556): 38689( 557)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:23.964018 182129 usertrap_amd64.go:212] [ 38686( 556): 38686( 556)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:23.964092 182129 usertrap_amd64.go:122] [ 38686( 556): 38686( 556)] Allocate a new trap: 0xc000e684e0 43 D0318 14:42:23.964169 182129 usertrap_amd64.go:225] [ 38686( 556): 38686( 556)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:23.968686 182129 task_exit.go:204] [ 38682( 475): 38682( 475)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.968971 182129 task_signals.go:204] [ 38682( 475): 38685( 476)] Signal 9, PID: 38682, TID: 38685, fault addr: 0x0: terminating thread group D0318 14:42:23.969792 182129 task_exit.go:204] [ 38682( 475): 38682( 475)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.969793 182129 task_signals.go:204] [ 38682( 475): 38688( 477)] Signal 9, PID: 38682, TID: 38688, fault addr: 0x0: terminating thread group D0318 14:42:23.969948 182129 task_exit.go:204] [ 38682( 475): 38685( 476)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.970644 182129 task_exit.go:204] [ 38682( 475): 38685( 476)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.970737 182129 task_exit.go:204] [ 38682( 475): 38685( 476)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:23.970892 182129 task_exit.go:204] [ 38682( 475): 38688( 477)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.975292 182129 task_exit.go:204] [ 38686( 556): 38686( 556)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.975519 182129 task_signals.go:204] [ 38686( 556): 38689( 557)] Signal 9, PID: 38686, TID: 38689, fault addr: 0x0: terminating thread group D0318 14:42:23.976291 182129 task_exit.go:204] [ 38686( 556): 38686( 556)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.976461 182129 task_exit.go:204] [ 38686( 556): 38689( 557)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:23.982430 182129 task_exit.go:204] [ 38682( 475): 38688( 477)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.982579 182129 task_exit.go:204] [ 38682( 475): 38688( 477)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:23.982731 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:23.983341 182129 task_exit.go:204] [ 38682( 475): 38682( 475)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000001180)="0c477fed", 0x4) D0318 14:42:23.985495 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:23.985632 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 37 D0318 14:42:23.986627 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:23.987045 182129 task_exit.go:204] [ 38686( 556): 38689( 557)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:23.987121 182129 task_exit.go:204] [ 38686( 556): 38689( 557)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:23.987231 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:23.989691 182129 task_exit.go:204] [ 38686( 556): 38686( 556)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:23.992078 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:23.992204 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 38 D0318 14:42:23.992294 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) 14:42:23 executing program 3: r0 = getpgrp(0xffffffffffffffff) waitid(0x3, r0, 0x0, 0x2, 0x0) D0318 14:42:24.005984 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:24.006127 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 36 D0318 14:42:24.007124 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:24.013920 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:24.013933 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.014043 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 39 D0318 14:42:24.014005 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 37 D0318 14:42:24.014137 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.014153 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:24.029093 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.029263 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 40 D0318 14:42:24.029355 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.031918 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.032077 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 41 D0318 14:42:24.032225 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.032547 182129 usertrap_amd64.go:212] [ 38690(1289): 38694(1290)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.032641 182129 usertrap_amd64.go:122] [ 38690(1289): 38694(1290)] Allocate a new trap: 0xc004db0960 42 D0318 14:42:24.032782 182129 usertrap_amd64.go:225] [ 38690(1289): 38694(1290)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.033164 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:24.033238 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 38 D0318 14:42:24.033362 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:24.034992 182129 usertrap_amd64.go:212] [ 38690(1289): 38690(1289)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.035062 182129 usertrap_amd64.go:122] [ 38690(1289): 38690(1289)] Allocate a new trap: 0xc004db0960 43 D0318 14:42:24.035175 182129 usertrap_amd64.go:225] [ 38690(1289): 38690(1289)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.041005 182129 task_exit.go:204] [ 38690(1289): 38690(1289)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.041249 182129 task_signals.go:204] [ 38690(1289): 38694(1290)] Signal 9, PID: 38690, TID: 38694, fault addr: 0x0: terminating thread group D0318 14:42:24.042004 182129 task_exit.go:204] [ 38690(1289): 38690(1289)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.042143 182129 task_exit.go:204] [ 38690(1289): 38694(1290)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.044656 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:24.044718 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 39 D0318 14:42:24.044946 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:24.047085 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:24.047237 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 40 D0318 14:42:24.047444 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:24.048316 182129 usertrap_amd64.go:212] [ 38691( 536): 38695( 537)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:24.048453 182129 usertrap_amd64.go:122] [ 38691( 536): 38695( 537)] Allocate a new trap: 0xc0004e07b0 41 D0318 14:42:24.048606 182129 usertrap_amd64.go:225] [ 38691( 536): 38695( 537)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:24.050324 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.050559 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 37 D0318 14:42:24.051399 182129 usertrap_amd64.go:212] [ 38691( 536): 38691( 536)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:24.051460 182129 usertrap_amd64.go:122] [ 38691( 536): 38691( 536)] Allocate a new trap: 0xc0004e07b0 42 D0318 14:42:24.051562 182129 usertrap_amd64.go:225] [ 38691( 536): 38691( 536)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:24.051759 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.055739 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.055871 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 36 D0318 14:42:24.056039 182129 task_exit.go:204] [ 38690(1289): 38694(1290)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.056169 182129 task_exit.go:204] [ 38690(1289): 38694(1290)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.056360 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.056666 182129 task_exit.go:204] [ 38690(1289): 38690(1289)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.056879 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.057888 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.058068 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 38 D0318 14:42:24.058173 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) 14:42:24 executing program 1: process_vm_readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/28, 0x1c}], 0x1, 0x0, 0x0, 0x0) D0318 14:42:24.064086 182129 task_exit.go:204] [ 38691( 536): 38691( 536)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.064320 182129 task_signals.go:204] [ 38691( 536): 38695( 537)] Signal 9, PID: 38691, TID: 38695, fault addr: 0x0: terminating thread group D0318 14:42:24.065205 182129 task_exit.go:204] [ 38691( 536): 38691( 536)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.065348 182129 task_exit.go:204] [ 38691( 536): 38695( 537)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.065948 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.066076 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 37 D0318 14:42:24.066147 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.073882 182129 task_exit.go:204] [ 38691( 536): 38695( 537)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.074031 182129 task_exit.go:204] [ 38691( 536): 38695( 537)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.074233 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:24.074405 182129 task_exit.go:204] [ 38691( 536): 38691( 536)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0x0, @b}, 0x48, r0) D0318 14:42:24.077344 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.077463 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 39 D0318 14:42:24.077566 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:24.092587 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.092686 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 40 D0318 14:42:24.092771 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.093885 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.094053 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 38 D0318 14:42:24.094217 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.095761 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.095849 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 41 D0318 14:42:24.095972 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.096286 182129 usertrap_amd64.go:212] [ 38693( 558): 38697( 559)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.096352 182129 usertrap_amd64.go:122] [ 38693( 558): 38697( 559)] Allocate a new trap: 0xc000428990 42 D0318 14:42:24.096433 182129 usertrap_amd64.go:225] [ 38693( 558): 38697( 559)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.098207 182129 usertrap_amd64.go:212] [ 38693( 558): 38693( 558)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.098282 182129 usertrap_amd64.go:122] [ 38693( 558): 38693( 558)] Allocate a new trap: 0xc000428990 43 D0318 14:42:24.098427 182129 usertrap_amd64.go:225] [ 38693( 558): 38693( 558)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:24.108134 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.108258 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 37 D0318 14:42:24.109240 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.109421 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.109527 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 39 D0318 14:42:24.109623 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.111999 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.112236 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 40 D0318 14:42:24.112397 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.113003 182129 usertrap_amd64.go:212] [ 38692( 478): 38699( 479)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.113119 182129 usertrap_amd64.go:122] [ 38692( 478): 38699( 479)] Allocate a new trap: 0xc0004e07e0 41 D0318 14:42:24.113349 182129 usertrap_amd64.go:225] [ 38692( 478): 38699( 479)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.115645 182129 task_exit.go:204] [ 38693( 558): 38693( 558)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.115868 182129 task_signals.go:204] [ 38693( 558): 38697( 559)] Signal 9, PID: 38693, TID: 38697, fault addr: 0x0: terminating thread group D0318 14:42:24.116438 182129 task_exit.go:204] [ 38693( 558): 38693( 558)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.116475 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.116589 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 38 D0318 14:42:24.116587 182129 task_exit.go:204] [ 38693( 558): 38697( 559)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.116661 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.125382 182129 task_exit.go:204] [ 38693( 558): 38697( 559)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.125509 182129 task_exit.go:204] [ 38693( 558): 38697( 559)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.126151 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.126867 182129 task_exit.go:204] [ 38693( 558): 38693( 558)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.127455 182129 usertrap_amd64.go:212] [ 38692( 478): 38692( 478)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.127592 182129 usertrap_amd64.go:122] [ 38692( 478): 38692( 478)] Allocate a new trap: 0xc0004e07e0 42 D0318 14:42:24.127732 182129 usertrap_amd64.go:225] [ 38692( 478): 38692( 478)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 14:42:24 executing program 3: prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') read$FUSE(r0, &(0x7f0000001b00)={0x2020}, 0x2020) mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0) read$FUSE(r0, &(0x7f00000041c0)={0x2020}, 0x2026) D0318 14:42:24.134108 182129 task_exit.go:204] [ 38692( 478): 38692( 478)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.134265 182129 task_signals.go:204] [ 38692( 478): 38699( 479)] Signal 9, PID: 38692, TID: 38699, fault addr: 0x0: terminating thread group D0318 14:42:24.134774 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:24.134884 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 36 D0318 14:42:24.134971 182129 task_exit.go:204] [ 38692( 478): 38692( 478)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.135128 182129 task_exit.go:204] [ 38692( 478): 38699( 479)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.136013 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:24.136341 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.136419 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 39 D0318 14:42:24.136586 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.142020 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:24.142123 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 37 D0318 14:42:24.142241 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:24.145299 182129 task_exit.go:204] [ 38692( 478): 38699( 479)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.145528 182129 task_exit.go:204] [ 38692( 478): 38699( 479)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.145670 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.145794 182129 task_exit.go:204] [ 38692( 478): 38692( 478)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 0: pipe2(&(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000002480)={0x18}, 0x18) write$FUSE_LSEEK(r1, &(0x7f0000002f00)={0x18}, 0xfdef) read$FUSE(r0, &(0x7f0000002f40)={0x2020}, 0x2020) write$FUSE_LSEEK(r1, &(0x7f0000000200)={0x18}, 0x18) D0318 14:42:24.152006 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.152118 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 40 D0318 14:42:24.152221 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.154594 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.154730 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 41 D0318 14:42:24.154827 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.155112 182129 usertrap_amd64.go:212] [ 38696(1291): 38700(1292)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.155234 182129 usertrap_amd64.go:122] [ 38696(1291): 38700(1292)] Allocate a new trap: 0xc0004289c0 42 D0318 14:42:24.155363 182129 usertrap_amd64.go:225] [ 38696(1291): 38700(1292)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.157885 182129 usertrap_amd64.go:212] [ 38696(1291): 38696(1291)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.158024 182129 usertrap_amd64.go:122] [ 38696(1291): 38696(1291)] Allocate a new trap: 0xc0004289c0 43 D0318 14:42:24.158257 182129 usertrap_amd64.go:225] [ 38696(1291): 38696(1291)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.165642 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:24.165765 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 38 D0318 14:42:24.165859 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:24.176630 182129 task_exit.go:204] [ 38696(1291): 38696(1291)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.177670 182129 task_signals.go:204] [ 38696(1291): 38700(1292)] Signal 9, PID: 38696, TID: 38700, fault addr: 0x0: terminating thread group D0318 14:42:24.177790 182129 task_exit.go:204] [ 38696(1291): 38696(1291)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.178057 182129 task_exit.go:204] [ 38696(1291): 38700(1292)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.184744 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.184980 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 37 D0318 14:42:24.186095 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.188011 182129 task_exit.go:204] [ 38696(1291): 38700(1292)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.188219 182129 task_exit.go:204] [ 38696(1291): 38700(1292)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.188392 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.188559 182129 task_exit.go:204] [ 38696(1291): 38696(1291)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.188617 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:24.188748 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 39 D0318 14:42:24.188952 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:24.191947 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:24.192024 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 40 D0318 14:42:24.192134 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:24.192394 182129 usertrap_amd64.go:212] [ 38698( 538): 38703( 539)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:24.192475 182129 usertrap_amd64.go:122] [ 38698( 538): 38703( 539)] Allocate a new trap: 0xc0004289f0 41 D0318 14:42:24.192558 182129 usertrap_amd64.go:225] [ 38698( 538): 38703( 539)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) 14:42:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x845018, &(0x7f00000021c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}, 0x0, 0x0, 0x0) D0318 14:42:24.200387 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.200452 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 38 D0318 14:42:24.200604 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.201039 182129 usertrap_amd64.go:212] [ 38698( 538): 38698( 538)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:24.201118 182129 usertrap_amd64.go:122] [ 38698( 538): 38698( 538)] Allocate a new trap: 0xc0004289f0 42 D0318 14:42:24.201267 182129 usertrap_amd64.go:225] [ 38698( 538): 38698( 538)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:24.205555 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.205650 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 36 D0318 14:42:24.206630 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.214406 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.214534 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 37 D0318 14:42:24.214633 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.219720 182129 task_signals.go:204] [ 38698( 538): 38703( 539)] Signal 9, PID: 38698, TID: 38703, fault addr: 0x0: terminating thread group D0318 14:42:24.219881 182129 task_exit.go:204] [ 38698( 538): 38698( 538)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.221000 182129 task_exit.go:204] [ 38698( 538): 38703( 539)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.221912 182129 task_exit.go:204] [ 38698( 538): 38698( 538)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.231411 182129 task_exit.go:204] [ 38698( 538): 38703( 539)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.231501 182129 task_exit.go:204] [ 38698( 538): 38703( 539)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.231651 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:24.231986 182129 task_exit.go:204] [ 38698( 538): 38698( 538)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.233704 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.233821 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 39 D0318 14:42:24.233916 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) 14:42:24 executing program 2: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RSETATTR(r0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) timerfd_create(0x0, 0x0) D0318 14:42:24.239051 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.239178 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 38 D0318 14:42:24.239294 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.244436 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.244550 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 37 D0318 14:42:24.245697 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.246607 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.246732 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 40 D0318 14:42:24.246939 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.249312 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.249419 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 41 D0318 14:42:24.249520 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.250119 182129 usertrap_amd64.go:212] [ 38701( 560): 38705( 561)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.250206 182129 usertrap_amd64.go:122] [ 38701( 560): 38705( 561)] Allocate a new trap: 0xc000e68570 42 D0318 14:42:24.250358 182129 usertrap_amd64.go:225] [ 38701( 560): 38705( 561)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.251771 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.251891 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 39 D0318 14:42:24.251976 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.253037 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.253138 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 38 D0318 14:42:24.253276 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.253686 182129 usertrap_amd64.go:212] [ 38701( 560): 38705( 561)] Found the pattern at ip 55ff40476999:sysno 257 D0318 14:42:24.253766 182129 usertrap_amd64.go:122] [ 38701( 560): 38705( 561)] Allocate a new trap: 0xc000e68570 43 D0318 14:42:24.253854 182129 usertrap_amd64.go:225] [ 38701( 560): 38705( 561)] Apply the binary patch addr 55ff40476999 trap addr 68d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:24.254341 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.254457 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 40 D0318 14:42:24.254566 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.254850 182129 usertrap_amd64.go:212] [ 38702( 480): 38706( 481)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.254910 182129 usertrap_amd64.go:122] [ 38702( 480): 38706( 481)] Allocate a new trap: 0xc005d96810 41 D0318 14:42:24.254995 182129 usertrap_amd64.go:225] [ 38702( 480): 38706( 481)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.261084 182129 usertrap_amd64.go:212] [ 38702( 480): 38702( 480)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.261239 182129 usertrap_amd64.go:122] [ 38702( 480): 38702( 480)] Allocate a new trap: 0xc005d96810 42 D0318 14:42:24.261332 182129 usertrap_amd64.go:225] [ 38702( 480): 38702( 480)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.267348 182129 usertrap_amd64.go:212] [ 38701( 560): 38701( 560)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.267471 182129 usertrap_amd64.go:122] [ 38701( 560): 38701( 560)] Allocate a new trap: 0xc000e68570 44 D0318 14:42:24.267656 182129 usertrap_amd64.go:225] [ 38701( 560): 38701( 560)] Apply the binary patch addr 55ff40476c93 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0318 14:42:24.270608 182129 task_exit.go:204] [ 38702( 480): 38702( 480)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.271457 182129 task_signals.go:204] [ 38702( 480): 38706( 481)] Signal 9, PID: 38702, TID: 38706, fault addr: 0x0: terminating thread group D0318 14:42:24.271574 182129 task_exit.go:204] [ 38702( 480): 38702( 480)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.271857 182129 task_signals.go:204] [ 38701( 560): 38705( 561)] Signal 9, PID: 38701, TID: 38705, fault addr: 0x0: terminating thread group D0318 14:42:24.272045 182129 task_exit.go:204] [ 38701( 560): 38705( 561)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.272956 182129 task_exit.go:204] [ 38701( 560): 38701( 560)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.273110 182129 task_exit.go:204] [ 38702( 480): 38706( 481)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.273328 182129 task_exit.go:204] [ 38701( 560): 38705( 561)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.273407 182129 task_exit.go:204] [ 38701( 560): 38705( 561)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.278842 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:24.279005 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 36 D0318 14:42:24.280003 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.280115 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 39 D0318 14:42:24.280207 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.284029 182129 task_exit.go:204] [ 38701( 560): 38701( 560)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.284173 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.284986 182129 task_exit.go:204] [ 38702( 480): 38706( 481)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.285085 182129 task_exit.go:204] [ 38702( 480): 38706( 481)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.285205 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.285396 182129 task_exit.go:204] [ 38702( 480): 38702( 480)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.285645 182129 task_exit.go:204] [ 38701( 560): 38701( 560)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.288141 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) 14:42:24 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) ftruncate(r0, 0x0) 14:42:24 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = dup3(r4, r3, 0x0) r6 = accept(r5, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r6, 0x0, r7) fchownat(r0, &(0x7f0000000040)='./file0\x00', r2, r7, 0x400) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:24.296265 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.296470 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 40 D0318 14:42:24.296610 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.297345 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:24.297501 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 37 D0318 14:42:24.297618 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:24.298720 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.298805 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 41 D0318 14:42:24.298902 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.299396 182129 usertrap_amd64.go:212] [ 38704(1293): 38708(1294)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.299486 182129 usertrap_amd64.go:122] [ 38704(1293): 38708(1294)] Allocate a new trap: 0xc000880cf0 42 D0318 14:42:24.299572 182129 usertrap_amd64.go:225] [ 38704(1293): 38708(1294)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.302447 182129 usertrap_amd64.go:212] [ 38704(1293): 38704(1293)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.302567 182129 usertrap_amd64.go:122] [ 38704(1293): 38704(1293)] Allocate a new trap: 0xc000880cf0 43 D0318 14:42:24.302651 182129 usertrap_amd64.go:225] [ 38704(1293): 38704(1293)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.308807 182129 task_exit.go:204] [ 38704(1293): 38704(1293)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.309014 182129 task_signals.go:204] [ 38704(1293): 38708(1294)] Signal 9, PID: 38704, TID: 38708, fault addr: 0x0: terminating thread group D0318 14:42:24.309674 182129 task_exit.go:204] [ 38704(1293): 38704(1293)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.309890 182129 task_exit.go:204] [ 38704(1293): 38708(1294)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.312307 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:24.312404 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 38 D0318 14:42:24.312505 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:24.320263 182129 task_exit.go:204] [ 38704(1293): 38708(1294)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.321169 182129 task_exit.go:204] [ 38704(1293): 38708(1294)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.321447 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.321526 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:24.321604 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 39 D0318 14:42:24.321717 182129 task_exit.go:204] [ 38704(1293): 38704(1293)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.321822 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) 14:42:24 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lchown(&(0x7f0000001400)='./file0\x00', 0x0, 0x0) recvmsg$inet_nvme(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/103, 0x67}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/56, 0x38}, {&(0x7f0000001100)=""/219, 0xdb}, {&(0x7f0000001200)=""/71, 0x47}, {&(0x7f0000001280)=""/233, 0xe9}, {&(0x7f0000001380)=""/36, 0x24}, {&(0x7f00000013c0)=""/6, 0x6}], 0x8}, 0x42) D0318 14:42:24.323673 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:24.323943 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 40 D0318 14:42:24.324115 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:24.325118 182129 usertrap_amd64.go:212] [ 38707( 540): 38711( 541)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:24.325380 182129 usertrap_amd64.go:122] [ 38707( 540): 38711( 541)] Allocate a new trap: 0xc005f00990 41 D0318 14:42:24.325981 182129 usertrap_amd64.go:225] [ 38707( 540): 38711( 541)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:24.337601 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.337879 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 36 D0318 14:42:24.338966 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.342055 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.342215 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 37 D0318 14:42:24.343120 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.343271 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.343364 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 37 D0318 14:42:24.343493 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.348488 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.348581 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 38 D0318 14:42:24.348642 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.365114 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.365208 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 37 D0318 14:42:24.366088 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.368390 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.368466 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 38 D0318 14:42:24.368630 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.371979 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.372091 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 38 D0318 14:42:24.372243 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.378463 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.378565 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 39 D0318 14:42:24.378659 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.380887 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.380936 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 40 D0318 14:42:24.381051 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.381916 182129 usertrap_amd64.go:212] [ 38709( 482): 38713( 483)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.381992 182129 usertrap_amd64.go:122] [ 38709( 482): 38713( 483)] Allocate a new trap: 0xc0004e0810 41 D0318 14:42:24.382130 182129 usertrap_amd64.go:225] [ 38709( 482): 38713( 483)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.388221 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.388402 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 39 D0318 14:42:24.388207 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.388571 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 39 D0318 14:42:24.388592 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.388673 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:24.392702 182129 usertrap_amd64.go:212] [ 38709( 482): 38709( 482)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.392762 182129 usertrap_amd64.go:122] [ 38709( 482): 38709( 482)] Allocate a new trap: 0xc0004e0810 42 D0318 14:42:24.392866 182129 usertrap_amd64.go:225] [ 38709( 482): 38709( 482)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.400306 182129 task_exit.go:204] [ 38709( 482): 38709( 482)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.401253 182129 task_signals.go:204] [ 38709( 482): 38713( 483)] Signal 9, PID: 38709, TID: 38713, fault addr: 0x0: terminating thread group D0318 14:42:24.401317 182129 task_exit.go:204] [ 38709( 482): 38709( 482)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.401527 182129 task_exit.go:204] [ 38709( 482): 38713( 483)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.405227 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.405389 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 40 D0318 14:42:24.405526 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.407557 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.407679 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 40 D0318 14:42:24.407818 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.407912 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.407951 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 41 D0318 14:42:24.408224 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.408486 182129 usertrap_amd64.go:212] [ 38710( 562): 38715( 563)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.408559 182129 usertrap_amd64.go:122] [ 38710( 562): 38715( 563)] Allocate a new trap: 0xc0043f0570 42 D0318 14:42:24.408666 182129 usertrap_amd64.go:225] [ 38710( 562): 38715( 563)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.410347 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.410427 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 41 D0318 14:42:24.410564 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.410904 182129 usertrap_amd64.go:212] [ 38712(1295): 38716(1296)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.411004 182129 usertrap_amd64.go:122] [ 38712(1295): 38716(1296)] Allocate a new trap: 0xc000681290 42 D0318 14:42:24.411123 182129 usertrap_amd64.go:225] [ 38712(1295): 38716(1296)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.416968 182129 task_exit.go:204] [ 38709( 482): 38713( 483)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.417056 182129 task_exit.go:204] [ 38709( 482): 38713( 483)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.417165 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.417475 182129 task_exit.go:204] [ 38709( 482): 38709( 482)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x7ff, &(0x7f0000000040)) D0318 14:42:24.420055 182129 usertrap_amd64.go:212] [ 38712(1295): 38712(1295)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.420365 182129 usertrap_amd64.go:122] [ 38712(1295): 38712(1295)] Allocate a new trap: 0xc000681290 43 D0318 14:42:24.420474 182129 usertrap_amd64.go:225] [ 38712(1295): 38712(1295)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.422235 182129 usertrap_amd64.go:212] [ 38710( 562): 38710( 562)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.422330 182129 usertrap_amd64.go:122] [ 38710( 562): 38710( 562)] Allocate a new trap: 0xc0043f0570 43 D0318 14:42:24.422418 182129 usertrap_amd64.go:225] [ 38710( 562): 38710( 562)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:24.429720 182129 task_exit.go:204] [ 38712(1295): 38712(1295)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.430667 182129 task_signals.go:204] [ 38712(1295): 38716(1296)] Signal 9, PID: 38712, TID: 38716, fault addr: 0x0: terminating thread group D0318 14:42:24.430846 182129 task_exit.go:204] [ 38712(1295): 38712(1295)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.431088 182129 task_exit.go:204] [ 38712(1295): 38716(1296)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.432569 182129 task_exit.go:204] [ 38710( 562): 38710( 562)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.432728 182129 task_signals.go:204] [ 38710( 562): 38715( 563)] Signal 9, PID: 38710, TID: 38715, fault addr: 0x0: terminating thread group D0318 14:42:24.433429 182129 task_exit.go:204] [ 38710( 562): 38710( 562)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.433687 182129 task_exit.go:204] [ 38710( 562): 38715( 563)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.441009 182129 task_exit.go:204] [ 38712(1295): 38716(1296)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.441136 182129 task_exit.go:204] [ 38712(1295): 38716(1296)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.441277 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.441448 182129 task_exit.go:204] [ 38712(1295): 38712(1295)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) (async, rerun: 64) r3 = socket$unix(0x1, 0x1, 0x0) (async, rerun: 64) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) listen(r4, 0x0) (async) connect$unix(r3, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) r5 = dup3(r4, r3, 0x0) r6 = accept(r5, 0x0, 0x0) (async) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r6, 0x0, r7) (async) fchownat(r0, &(0x7f0000000040)='./file0\x00', r2, r7, 0x400) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:24.443834 182129 task_exit.go:204] [ 38710( 562): 38715( 563)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.443942 182129 task_exit.go:204] [ 38710( 562): 38715( 563)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.444097 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.444198 182129 task_exit.go:204] [ 38710( 562): 38710( 562)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lchown(&(0x7f0000001400)='./file0\x00', 0x0, 0x0) recvmsg$inet_nvme(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/103, 0x67}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/56, 0x38}, {&(0x7f0000001100)=""/219, 0xdb}, {&(0x7f0000001200)=""/71, 0x47}, {&(0x7f0000001280)=""/233, 0xe9}, {&(0x7f0000001380)=""/36, 0x24}, {&(0x7f00000013c0)=""/6, 0x6}], 0x8}, 0x42) D0318 14:42:24.469149 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.469290 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 36 D0318 14:42:24.470314 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.476630 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.476771 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 37 D0318 14:42:24.476934 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.490428 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.490584 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 37 D0318 14:42:24.491789 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.497405 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.497576 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 38 D0318 14:42:24.497704 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.498723 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.499029 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 37 D0318 14:42:24.500297 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.501199 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.501283 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 38 D0318 14:42:24.501462 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.508461 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.508551 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 38 D0318 14:42:24.508726 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.524710 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.524953 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 39 D0318 14:42:24.525299 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.532502 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.532701 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 39 D0318 14:42:24.532811 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:24.535126 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.535222 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 40 D0318 14:42:24.535443 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.535524 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.535926 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 39 D0318 14:42:24.536150 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.538568 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.538649 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 41 D0318 14:42:24.538842 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.539192 182129 usertrap_amd64.go:212] [ 38719(1297): 38722(1298)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.539292 182129 usertrap_amd64.go:122] [ 38719(1297): 38722(1298)] Allocate a new trap: 0xc000428a20 42 D0318 14:42:24.539395 182129 usertrap_amd64.go:225] [ 38719(1297): 38722(1298)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.540965 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.541060 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 40 D0318 14:42:24.541190 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.541462 182129 usertrap_amd64.go:212] [ 38718( 484): 38723( 485)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.541536 182129 usertrap_amd64.go:122] [ 38718( 484): 38723( 485)] Allocate a new trap: 0xc003f5e6c0 41 D0318 14:42:24.541662 182129 usertrap_amd64.go:225] [ 38718( 484): 38723( 485)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.544237 182129 task_run.go:306] [ 38718( 484): 38723( 485)] Unhandled user fault: addr=0 ip=560b68d03ab9 access=r-- sig=11 err=bad address D0318 14:42:24.544381 182129 task_log.go:87] [ 38718( 484): 38723( 485)] Registers: D0318 14:42:24.544500 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Cs = 0000000000000033 D0318 14:42:24.544607 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Ds = 0000000000000000 D0318 14:42:24.545256 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Eflags = 0000000000010283 D0318 14:42:24.545338 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Es = 0000000000000000 D0318 14:42:24.545428 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Fs = 0000000000000000 D0318 14:42:24.545548 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Fs_base = 00007ef74c7f46c0 D0318 14:42:24.545585 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Gs = 0000000000000000 D0318 14:42:24.545642 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Gs_base = 0000000000000000 D0318 14:42:24.545691 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Orig_rax = ffffffffffffffff D0318 14:42:24.545732 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R10 = 0000000000000000 D0318 14:42:24.545779 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R11 = 0000000000000000 D0318 14:42:24.545843 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R12 = 0000000020000180 D0318 14:42:24.545895 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R13 = 00007ef74c7f3f40 D0318 14:42:24.545948 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R14 = 0000000000000000 D0318 14:42:24.546035 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R15 = 0000000000000000 D0318 14:42:24.546153 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R8 = 0000000000000000 D0318 14:42:24.546244 182129 task_log.go:94] [ 38718( 484): 38723( 485)] R9 = 0000000000000000 D0318 14:42:24.546300 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rax = 0000000000000000 D0318 14:42:24.546350 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rbp = 0000000000000000 D0318 14:42:24.546439 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rbx = 00007ef74c7f3f80 D0318 14:42:24.546485 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rcx = 0000000000000000 D0318 14:42:24.546605 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rdi = 0000000000000000 D0318 14:42:24.546641 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rdx = 0000000000000000 D0318 14:42:24.546694 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rip = 0000560b68d03ab9 D0318 14:42:24.546769 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rsi = 0000000020000180 D0318 14:42:24.546854 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Rsp = 00007ef74c7f3ef8 D0318 14:42:24.546923 182129 task_log.go:94] [ 38718( 484): 38723( 485)] Ss = 000000000000002b D0318 14:42:24.547007 182129 task_log.go:111] [ 38718( 484): 38723( 485)] Stack: D0318 14:42:24.547112 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3ef0: 00 00 00 00 00 00 00 00 1d 08 cc 68 0b 56 00 00 D0318 14:42:24.547210 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547270 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547329 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547383 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f30: 80 01 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547498 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547598 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547696 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547783 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547823 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547870 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.547958 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548079 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548204 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548257 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548360 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548399 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f3ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548453 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548506 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548520 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c731ae:sysno 230 D0318 14:42:24.548578 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548615 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 42 D0318 14:42:24.548636 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.548711 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c731ae trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:24.548740 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.549185 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.549277 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.549334 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.549441 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4080: 00 00 00 00 00 00 00 00 80 ff e3 68 0b 56 00 00 D0318 14:42:24.549542 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4090: 7a e4 d5 68 0b 56 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.549636 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40a0: 0b 00 00 00 00 00 00 00 80 ff e3 68 0b 56 00 00 D0318 14:42:24.549859 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40b0: 28 e2 d0 53 af 7e 00 00 a8 fb cb 68 0b 56 00 00 D0318 14:42:24.550044 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.550274 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40d0: 00 00 00 00 00 00 00 00 7a e4 d5 68 0b 56 00 00 D0318 14:42:24.550353 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40e0: 80 ff e3 68 0b 56 00 00 11 2b cc 68 0b 56 00 00 D0318 14:42:24.550419 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f40f0: 80 ff e3 68 0b 56 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.550604 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4100: 37 10 00 00 ff ff ff ff 10 25 e0 68 0b 56 00 00 D0318 14:42:24.550870 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4110: 4b 06 00 00 00 00 00 00 f4 32 b3 0a 00 00 00 00 D0318 14:42:24.551008 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.551282 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.551436 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.551660 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4150: 00 00 00 00 00 00 00 00 88 ff e3 68 0b 56 00 00 D0318 14:42:24.551805 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4160: 80 ff e3 68 0b 56 00 00 8c ff e3 68 0b 56 00 00 D0318 14:42:24.551748 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.552040 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4170: 40 e1 d0 53 af 7e 00 00 06 8c cc 68 0b 56 00 00 D0318 14:42:24.552214 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 40 D0318 14:42:24.552443 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.552269 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4180: c0 46 7f 4c f7 7e 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.552782 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4190: b0 ff ff ff ff ff ff ff 3e 65 ce 68 0b 56 00 00 D0318 14:42:24.553036 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41a0: 00 00 00 00 00 00 00 00 c0 46 7f 4c f7 7e 00 00 D0318 14:42:24.553230 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41b0: c0 46 7f 4c f7 7e 00 00 01 c7 14 86 c0 b6 39 36 D0318 14:42:24.553479 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41c0: b0 ff ff ff ff ff ff ff 0b 00 00 00 00 00 00 00 D0318 14:42:24.553538 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41d0: 40 e1 d0 53 af 7e 00 00 28 e2 d0 53 af 7e 00 00 D0318 14:42:24.553626 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41e0: 01 c7 54 05 3e 2e d7 cb 01 c7 76 40 5c 67 2f 9a D0318 14:42:24.553879 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f41f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554097 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554274 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4210: 00 00 00 00 00 00 00 00 00 72 7b b8 8f 93 1f 4f D0318 14:42:24.554405 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4220: 00 00 00 00 00 00 00 00 70 62 ce 68 0b 56 00 00 D0318 14:42:24.554500 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4230: 00 00 00 00 00 00 00 00 ac db d3 68 0b 56 00 00 D0318 14:42:24.554573 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554641 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554744 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554786 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554862 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.554931 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f4290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555000 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f42a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555060 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f42b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555050 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.555107 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f42c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555145 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 41 D0318 14:42:24.555195 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f42d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555259 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.555496 182129 task_log.go:128] [ 38718( 484): 38723( 485)] 7ef74c7f42e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.555720 182129 task_log.go:149] [ 38718( 484): 38723( 485)] Code: D0318 14:42:24.555816 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03a70: c9 48 01 c8 48 29 f8 c3 0f 1f 84 00 00 00 00 00 D0318 14:42:24.555961 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03a80: e9 5b 8c 00 00 0f 1f 00 89 c8 c3 66 2e 0f 1f 84 D0318 14:42:24.556066 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03a90: 00 00 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 D0318 14:42:24.556159 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03aa0: 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 D0318 14:42:24.556103 182129 usertrap_amd64.go:212] [ 38720( 564): 38726( 565)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.556211 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03ab0: 0f 00 00 0f 87 37 01 00 00 c5 fd 74 0f c5 fd d7 D0318 14:42:24.556232 182129 usertrap_amd64.go:122] [ 38720( 564): 38726( 565)] Allocate a new trap: 0xc000428a50 42 D0318 14:42:24.556349 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03ac0: c1 85 c0 74 5b f3 0f bc c0 c5 f8 77 c3 0f 1f 00 D0318 14:42:24.556369 182129 usertrap_amd64.go:225] [ 38720( 564): 38726( 565)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.556452 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03ad0: f3 0f bc c0 29 d7 ff c7 01 f8 c5 f8 77 c3 66 90 D0318 14:42:24.556627 182129 task_log.go:167] [ 38718( 484): 38723( 485)] 560b68d03ae0: f3 0f bc c0 29 d7 83 c7 21 01 f8 c5 f8 77 c3 90 D0318 14:42:24.556716 182129 task_log.go:71] [ 38718( 484): 38723( 485)] Mappings: VMAs: 00062000-00067000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2f920000-1b2f960000 rw-s 00000000 00:05 3 /memfd:syz-shared-mem (deleted) 560b68c94000-560b68cb9000 r--p 00000000 00:11 8 /syz-executor 560b68cb9000-560b68d5d000 r-xp 00025000 00:11 8 /syz-executor 560b68d5d000-560b68e0d000 r--p 000c9000 00:11 8 /syz-executor 560b68e0d000-560b68e16000 rw-p 00179000 00:11 8 /syz-executor 560b68e24000-560b69970000 rw-p 00000000 00:00 0 560b69970000-560b69992000 rw-p 00000000 00:00 0 [heap] 7eaf5350f000-7eaf53d0f000 rw-p 00000000 00:00 0 [stack] 7ef74c200000-7ef74c600000 r--p 00000000 00:05 2 /memfd:syz-shared-mem (deleted) 7ef74c7d4000-7ef74c7d5000 ---p 00000000 00:00 0 7ef74c7d5000-7ef74c7f5000 rw-p 00000000 00:00 0 7ef74c7f5000-7ef74c7f6000 r--p 00000000 00:00 0 [vvar] 7ef74c7f6000-7ef74c7f8000 r-xp 00000000 00:00 0 PMAs: 00062000-00063000 r-xp 0b760000 *pgalloc.MemoryFile 00063000-00067000 r-xp 0cff6000 *pgalloc.MemoryFile 20000000-20200000 rwxp 18600000 *pgalloc.MemoryFile 1b2f920000-1b2f960000 rw-s 20e00000 *pgalloc.MemoryFile 560b68c94000-560b68cb9000 r--p 0d9bc000 *pgalloc.MemoryFile 560b68cb9000-560b68cd5000 r-xs 00025000 *gofer.dentryPlatformFile 560b68cd5000-560b68cd6000 r-xp 0b77c000 *pgalloc.MemoryFile 560b68cd6000-560b68ce6000 r-xs 00042000 *gofer.dentryPlatformFile 560b68ce6000-560b68ce7000 r-xp 0d6ad000 *pgalloc.MemoryFile 560b68ce7000-560b68d0e000 r-xs 00053000 *gofer.dentryPlatformFile 560b68d0e000-560b68d0f000 r-xp 0b9ef000 *pgalloc.MemoryFile 560b68d0f000-560b68d10000 r-xp 0b771000 *pgalloc.MemoryFile 560b68d10000-560b68d11000 r-xp 0b840000 *pgalloc.MemoryFile 560b68d11000-560b68d12000 r-xp 0b84c000 *pgalloc.MemoryFile 560b68d13000-560b68d14000 r-xp 035ff000 *pgalloc.MemoryFile 560b68d14000-560b68d1b000 r-xs 00080000 *gofer.dentryPlatformFile 560b68d1b000-560b68d1c000 r-xp 0b545000 *pgalloc.MemoryFile 560b68d2b000-560b68d2c000 r-xp 0b638000 *pgalloc.MemoryFile 560b68d2c000-560b68d3d000 r-xs 00098000 *gofer.dentryPlatformFile 560b68d3d000-560b68d3e000 r-xp 0b804000 *pgalloc.MemoryFile 560b68d5c000-560b68d5d000 r-xp 00bfc000 *pgalloc.MemoryFile 560b68d5d000-560b68db1000 r--p 0dcd9000 *pgalloc.MemoryFile 560b68db1000-560b68e00000 r--p 0e57e000 *pgalloc.MemoryFile 560b68e00000-560b68e16000 rw-p 0dff5000 *pgalloc.MemoryFile 560b68e24000-560b69000000 rw-p 18a00000 *pgalloc.MemoryFile 560b69800000-560b69970000 rw-p 18200000 *pgalloc.MemoryFile 560b69970000-560b69971000 rw-p 0b63b000 *pgalloc.MemoryFile 560b69971000-560b69992000 rw-p 0e8a1000 *pgalloc.MemoryFile 7eaf53c00000-7eaf53d0b000 r--p 10700000 *pgalloc.MemoryFile 7eaf53d0b000-7eaf53d0d000 r--p 0d7b8000 *pgalloc.MemoryFile 7eaf53d0d000-7eaf53d0f000 rw-p 0b526000 *pgalloc.MemoryFile 7ef74c200000-7ef74c600000 r--s 20a00000 *pgalloc.MemoryFile 7ef74c7d5000-7ef74c7f5000 rw-p 0e2b0000 *pgalloc.MemoryFile 7ef74c7f5000-7ef74c7f6000 r--s 00002000 *pgalloc.MemoryFile 7ef74c7f6000-7ef74c7f8000 r-xs 00000000 *pgalloc.MemoryFile D0318 14:42:24.559240 182129 task_log.go:73] [ 38718( 484): 38723( 485)] FDTable: fd:0 => name pipe:[1825] fd:1 => name pipe:[1825] fd:2 => name pipe:[1825] fd:200 => name /dev/net/tun fd:201 => name / D0318 14:42:24.560314 182129 task_signals.go:470] [ 38718( 484): 38723( 485)] Notified of signal 11 D0318 14:42:24.560436 182129 task_signals.go:220] [ 38718( 484): 38723( 485)] Signal 11: delivering to handler D0318 14:42:24.561470 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d58640d1ae:sysno 230 D0318 14:42:24.561564 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 43 D0318 14:42:24.561635 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d58640d1ae trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.562114 182129 usertrap_amd64.go:212] [ 38718( 484): 38718( 484)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.562198 182129 usertrap_amd64.go:122] [ 38718( 484): 38718( 484)] Allocate a new trap: 0xc003f5e6c0 42 D0318 14:42:24.562441 182129 usertrap_amd64.go:225] [ 38718( 484): 38718( 484)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.575096 182129 usertrap_amd64.go:212] [ 38720( 564): 38720( 564)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.575240 182129 usertrap_amd64.go:122] [ 38720( 564): 38720( 564)] Allocate a new trap: 0xc000428a50 43 D0318 14:42:24.575371 182129 usertrap_amd64.go:225] [ 38720( 564): 38720( 564)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:24.575901 182129 usertrap_amd64.go:212] [ 38719(1297): 38719(1297)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.576032 182129 usertrap_amd64.go:122] [ 38719(1297): 38719(1297)] Allocate a new trap: 0xc000428a20 44 D0318 14:42:24.576170 182129 usertrap_amd64.go:225] [ 38719(1297): 38719(1297)] Apply the binary patch addr 55d5863e0c93 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0318 14:42:24.578318 182129 task_exit.go:204] [ 38718( 484): 38718( 484)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.578709 182129 task_signals.go:204] [ 38718( 484): 38723( 485)] Signal 9, PID: 38718, TID: 38723, fault addr: 0x0: terminating thread group D0318 14:42:24.579484 182129 task_exit.go:204] [ 38718( 484): 38718( 484)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.579671 182129 task_exit.go:204] [ 38718( 484): 38723( 485)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.584360 182129 task_exit.go:204] [ 38720( 564): 38720( 564)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.584651 182129 task_signals.go:204] [ 38720( 564): 38726( 565)] Signal 9, PID: 38720, TID: 38726, fault addr: 0x0: terminating thread group D0318 14:42:24.584751 182129 task_signals.go:204] [ 38720( 564): 38728( 566)] Signal 9, PID: 38720, TID: 38728, fault addr: 0x0: terminating thread group D0318 14:42:24.584830 182129 task_exit.go:204] [ 38720( 564): 38726( 565)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.585856 182129 task_exit.go:204] [ 38720( 564): 38720( 564)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.586000 182129 task_signals.go:204] [ 38719(1297): 38722(1298)] Signal 9, PID: 38719, TID: 38722, fault addr: 0x0: terminating thread group D0318 14:42:24.586048 182129 task_exit.go:204] [ 38719(1297): 38719(1297)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.586218 182129 task_signals.go:204] [ 38719(1297): 38724(1299)] Signal 9, PID: 38719, TID: 38724, fault addr: 0x0: terminating thread group D0318 14:42:24.586233 182129 task_signals.go:204] [ 38719(1297): 38725(1300)] Signal 9, PID: 38719, TID: 38725, fault addr: 0x0: terminating thread group D0318 14:42:24.586319 182129 task_signals.go:204] [ 38719(1297): 38727(1301)] Signal 9, PID: 38719, TID: 38727, fault addr: 0x0: terminating thread group D0318 14:42:24.586393 182129 task_exit.go:204] [ 38719(1297): 38724(1299)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.586617 182129 task_exit.go:204] [ 38719(1297): 38727(1301)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.587850 182129 task_exit.go:204] [ 38719(1297): 38719(1297)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.588003 182129 task_exit.go:204] [ 38720( 564): 38728( 566)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.588141 182129 task_exit.go:204] [ 38719(1297): 38722(1298)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.588264 182129 task_exit.go:204] [ 38719(1297): 38725(1300)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.589954 182129 task_exit.go:204] [ 38719(1297): 38724(1299)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.590048 182129 task_exit.go:204] [ 38719(1297): 38724(1299)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.590369 182129 task_exit.go:204] [ 38720( 564): 38726( 565)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.590447 182129 task_exit.go:204] [ 38720( 564): 38726( 565)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.591215 182129 task_exit.go:204] [ 38719(1297): 38727(1301)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.591303 182129 task_exit.go:204] [ 38719(1297): 38727(1301)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.592451 182129 task_exit.go:204] [ 38719(1297): 38725(1300)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.592540 182129 task_exit.go:204] [ 38719(1297): 38725(1300)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.593442 182129 task_exit.go:204] [ 38718( 484): 38723( 485)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.593574 182129 task_exit.go:204] [ 38718( 484): 38723( 485)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.593718 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.594026 182129 task_exit.go:204] [ 38718( 484): 38718( 484)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) (async) ftruncate(r0, 0x0) D0318 14:42:24.603298 182129 task_exit.go:204] [ 38720( 564): 38728( 566)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.603501 182129 task_exit.go:204] [ 38720( 564): 38728( 566)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.603740 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.605277 182129 task_exit.go:204] [ 38720( 564): 38720( 564)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.605802 182129 task_exit.go:204] [ 38719(1297): 38722(1298)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.605928 182129 task_exit.go:204] [ 38719(1297): 38722(1298)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.606104 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.606635 182129 task_exit.go:204] [ 38719(1297): 38719(1297)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) (async) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x7ff, &(0x7f0000000040)) 14:42:24 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0xd0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:24.641741 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.641974 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 36 D0318 14:42:24.643495 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.648600 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.648750 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 37 D0318 14:42:24.648869 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.651560 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.651724 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 37 D0318 14:42:24.656035 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.666873 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.667187 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 37 D0318 14:42:24.668600 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.674328 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.674440 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 38 D0318 14:42:24.674372 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.674693 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 38 D0318 14:42:24.674543 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.675019 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.677948 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.678047 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 38 D0318 14:42:24.678224 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.692904 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.693142 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 39 D0318 14:42:24.693401 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.697187 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.697288 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 39 D0318 14:42:24.697449 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.699839 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.699927 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 39 D0318 14:42:24.700190 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:24.700170 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.700292 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 40 D0318 14:42:24.700471 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.700722 182129 usertrap_amd64.go:212] [ 38729( 486): 38732( 487)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.700848 182129 usertrap_amd64.go:122] [ 38729( 486): 38732( 487)] Allocate a new trap: 0xc000e685d0 41 D0318 14:42:24.700958 182129 usertrap_amd64.go:225] [ 38729( 486): 38732( 487)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.707715 182129 usertrap_amd64.go:212] [ 38729( 486): 38729( 486)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.708047 182129 usertrap_amd64.go:122] [ 38729( 486): 38729( 486)] Allocate a new trap: 0xc000e685d0 42 D0318 14:42:24.708311 182129 usertrap_amd64.go:225] [ 38729( 486): 38729( 486)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.713035 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.713207 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 40 D0318 14:42:24.713333 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.714478 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.714632 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 40 D0318 14:42:24.714747 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.716618 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.716733 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 41 D0318 14:42:24.716938 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.717182 182129 usertrap_amd64.go:212] [ 38731( 567): 38734( 568)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.717260 182129 usertrap_amd64.go:122] [ 38731( 567): 38734( 568)] Allocate a new trap: 0xc0043f0630 42 D0318 14:42:24.717398 182129 usertrap_amd64.go:225] [ 38731( 567): 38734( 568)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.718440 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.718627 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 41 D0318 14:42:24.718723 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.719071 182129 usertrap_amd64.go:212] [ 38730(1302): 38735(1303)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.719132 182129 task_exit.go:204] [ 38729( 486): 38729( 486)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.719158 182129 usertrap_amd64.go:122] [ 38730(1302): 38735(1303)] Allocate a new trap: 0xc003f5e7b0 42 D0318 14:42:24.719340 182129 usertrap_amd64.go:225] [ 38730(1302): 38735(1303)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.719505 182129 task_signals.go:204] [ 38729( 486): 38732( 487)] Signal 9, PID: 38729, TID: 38732, fault addr: 0x0: terminating thread group D0318 14:42:24.719723 182129 task_run.go:306] [ 38731( 567): 38734( 568)] Unhandled user fault: addr=0 ip=55ff40469ab9 access=r-- sig=11 err=bad address D0318 14:42:24.719936 182129 task_log.go:87] [ 38731( 567): 38734( 568)] Registers: D0318 14:42:24.720016 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Cs = 0000000000000033 D0318 14:42:24.720069 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Ds = 0000000000000000 D0318 14:42:24.720135 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Eflags = 0000000000010283 D0318 14:42:24.720179 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Es = 0000000000000000 D0318 14:42:24.720276 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Fs = 0000000000000000 D0318 14:42:24.720346 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Fs_base = 00007eebfe26e6c0 D0318 14:42:24.720399 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Gs = 0000000000000000 D0318 14:42:24.720455 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Gs_base = 0000000000000000 D0318 14:42:24.720429 182129 task_signals.go:204] [ 38729( 486): 38733( 488)] Signal 9, PID: 38729, TID: 38733, fault addr: 0x0: terminating thread group D0318 14:42:24.720503 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Orig_rax = ffffffffffffffff D0318 14:42:24.720596 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R10 = 0000000000000000 D0318 14:42:24.720453 182129 task_exit.go:204] [ 38729( 486): 38729( 486)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.720701 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R11 = 0000000000000000 D0318 14:42:24.720777 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R12 = 0000000020000180 D0318 14:42:24.720857 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R13 = 00007eebfe26df40 D0318 14:42:24.720921 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R14 = 0000000000000000 D0318 14:42:24.720991 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R15 = 0000000000000000 D0318 14:42:24.720997 182129 task_exit.go:204] [ 38729( 486): 38732( 487)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.721038 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R8 = 0000000000000000 D0318 14:42:24.721075 182129 task_log.go:94] [ 38731( 567): 38734( 568)] R9 = 0000000000000000 D0318 14:42:24.721168 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rax = 0000000000000000 D0318 14:42:24.721241 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rbp = 0000000000000000 D0318 14:42:24.721278 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rbx = 00007eebfe26df80 D0318 14:42:24.721343 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rcx = 0000000000000000 D0318 14:42:24.721398 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rdi = 0000000000000000 D0318 14:42:24.721338 182129 task_exit.go:204] [ 38729( 486): 38733( 488)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.721456 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rdx = 0000000000000000 D0318 14:42:24.721500 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rip = 000055ff40469ab9 D0318 14:42:24.721585 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rsi = 0000000020000180 D0318 14:42:24.721657 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Rsp = 00007eebfe26def8 D0318 14:42:24.721701 182129 task_log.go:94] [ 38731( 567): 38734( 568)] Ss = 000000000000002b D0318 14:42:24.721729 182129 task_log.go:111] [ 38731( 567): 38734( 568)] Stack: D0318 14:42:24.721795 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26def0: 00 00 00 00 00 00 00 00 1d 68 42 40 ff 55 00 00 D0318 14:42:24.721919 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.721992 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722064 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722134 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df30: 80 01 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722272 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722370 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722443 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722481 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722526 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722712 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26df90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722859 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dfa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.722851 182129 task_exit.go:204] [ 38729( 486): 38733( 488)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.722996 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dfb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723066 182129 task_exit.go:204] [ 38729( 486): 38733( 488)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.723129 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dfc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723229 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dfd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723381 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dfe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723461 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26dff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723554 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723657 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723744 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723829 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.723960 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.724080 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.724217 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.724346 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.724510 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e080: 00 00 00 00 00 00 00 00 80 5f 5a 40 ff 55 00 00 D0318 14:42:24.724666 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e090: 7a 44 4c 40 ff 55 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.724901 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0a0: 0b 00 00 00 00 00 00 00 80 5f 5a 40 ff 55 00 00 D0318 14:42:24.725099 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0b0: 28 82 a8 91 e8 7e 00 00 a8 5b 42 40 ff 55 00 00 D0318 14:42:24.725260 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.725358 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0d0: 00 00 00 00 00 00 00 00 7a 44 4c 40 ff 55 00 00 D0318 14:42:24.725422 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0e0: 80 5f 5a 40 ff 55 00 00 11 8b 42 40 ff 55 00 00 D0318 14:42:24.725493 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e0f0: 80 5f 5a 40 ff 55 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.725603 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e100: 37 10 00 00 ff ff ff ff 10 85 56 40 ff 55 00 00 D0318 14:42:24.725701 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e110: 4b 06 00 00 00 00 00 00 09 97 2c 15 00 00 00 00 D0318 14:42:24.725778 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.725835 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.725914 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.726059 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e150: 00 00 00 00 00 00 00 00 88 5f 5a 40 ff 55 00 00 D0318 14:42:24.726124 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e160: 80 5f 5a 40 ff 55 00 00 8c 5f 5a 40 ff 55 00 00 D0318 14:42:24.726202 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e170: 40 81 a8 91 e8 7e 00 00 06 ec 42 40 ff 55 00 00 D0318 14:42:24.726285 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e180: c0 e6 26 fe eb 7e 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.726343 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e190: b0 ff ff ff ff ff ff ff 3e c5 44 40 ff 55 00 00 D0318 14:42:24.726455 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1a0: 00 00 00 00 00 00 00 00 c0 e6 26 fe eb 7e 00 00 D0318 14:42:24.726533 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1b0: c0 e6 26 fe eb 7e 00 00 10 df dc d3 38 40 d1 27 D0318 14:42:24.726604 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1c0: b0 ff ff ff ff ff ff ff 0b 00 00 00 00 00 00 00 D0318 14:42:24.726640 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1d0: 40 81 a8 91 e8 7e 00 00 28 82 a8 91 e8 7e 00 00 D0318 14:42:24.726715 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1e0: 10 df 9c 10 75 bc 06 da 10 df be 55 b1 c0 2f 8c D0318 14:42:24.726816 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.726854 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.726896 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e210: 00 00 00 00 00 00 00 00 00 f1 37 02 ec 9c c9 69 D0318 14:42:24.726912 182129 usertrap_amd64.go:212] [ 38730(1302): 38730(1302)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.727049 182129 usertrap_amd64.go:122] [ 38730(1302): 38730(1302)] Allocate a new trap: 0xc003f5e7b0 43 D0318 14:42:24.727197 182129 usertrap_amd64.go:225] [ 38730(1302): 38730(1302)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.726968 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e220: 00 00 00 00 00 00 00 00 70 c2 44 40 ff 55 00 00 D0318 14:42:24.727446 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e230: 00 00 00 00 00 00 00 00 ac 3b 4a 40 ff 55 00 00 D0318 14:42:24.727650 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.727815 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728003 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728074 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728146 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728304 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728371 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e2a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728453 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e2b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728547 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e2c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728615 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e2d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728687 182129 task_log.go:128] [ 38731( 567): 38734( 568)] 7eebfe26e2e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:24.728737 182129 task_log.go:149] [ 38731( 567): 38734( 568)] Code: D0318 14:42:24.728963 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469a70: c9 48 01 c8 48 29 f8 c3 0f 1f 84 00 00 00 00 00 D0318 14:42:24.729137 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469a80: e9 5b 8c 00 00 0f 1f 00 89 c8 c3 66 2e 0f 1f 84 D0318 14:42:24.729473 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469a90: 00 00 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 D0318 14:42:24.729567 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469aa0: 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 D0318 14:42:24.729748 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469ab0: 0f 00 00 0f 87 37 01 00 00 c5 fd 74 0f c5 fd d7 D0318 14:42:24.729861 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469ac0: c1 85 c0 74 5b f3 0f bc c0 c5 f8 77 c3 0f 1f 00 D0318 14:42:24.730026 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469ad0: f3 0f bc c0 29 d7 ff c7 01 f8 c5 f8 77 c3 66 90 D0318 14:42:24.730219 182129 task_log.go:167] [ 38731( 567): 38734( 568)] 55ff40469ae0: f3 0f bc c0 29 d7 83 c7 21 01 f8 c5 f8 77 c3 90 D0318 14:42:24.730339 182129 task_log.go:71] [ 38731( 567): 38734( 568)] Mappings: VMAs: 00068000-0006d000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2cc20000-1b2cc60000 rw-s 00000000 00:05 9 /memfd:syz-shared-mem (deleted) 55ff403fa000-55ff4041f000 r--p 00000000 00:11 8 /syz-executor 55ff4041f000-55ff404c3000 r-xp 00025000 00:11 8 /syz-executor 55ff404c3000-55ff40573000 r--p 000c9000 00:11 8 /syz-executor 55ff40573000-55ff4057c000 rw-p 00179000 00:11 8 /syz-executor 55ff4058a000-55ff410d6000 rw-p 00000000 00:00 0 55ff410d6000-55ff410f8000 rw-p 00000000 00:00 0 [heap] 7ee891289000-7ee891a89000 rw-p 00000000 00:00 0 [stack] 7eebfde00000-7eebfe200000 r--p 00000000 00:05 8 /memfd:syz-shared-mem (deleted) 7eebfe24e000-7eebfe24f000 ---p 00000000 00:00 0 7eebfe24f000-7eebfe26f000 rw-p 00000000 00:00 0 7eebfe26f000-7eebfe270000 r--p 00000000 00:00 0 [vvar] 7eebfe270000-7eebfe272000 r-xp 00000000 00:00 0 PMAs: 00068000-00069000 r-xp 0bda3000 *pgalloc.MemoryFile 00069000-0006d000 r-xp 0b87a000 *pgalloc.MemoryFile 20000000-20200000 rwxp 19a00000 *pgalloc.MemoryFile 1b2cc20000-1b2cc60000 rw-s 1e400000 *pgalloc.MemoryFile 55ff40400000-55ff4041f000 r--p 0d975000 *pgalloc.MemoryFile 55ff4041f000-55ff4043b000 r-xs 00025000 *gofer.dentryPlatformFile 55ff4043b000-55ff4043c000 r-xp 0b639000 *pgalloc.MemoryFile 55ff4043c000-55ff4044c000 r-xs 00042000 *gofer.dentryPlatformFile 55ff4044c000-55ff4044d000 r-xp 0d6c2000 *pgalloc.MemoryFile 55ff4044d000-55ff40474000 r-xs 00053000 *gofer.dentryPlatformFile 55ff40474000-55ff40475000 r-xp 0b9ee000 *pgalloc.MemoryFile 55ff40475000-55ff40476000 r-xp 0b869000 *pgalloc.MemoryFile 55ff40476000-55ff40477000 r-xp 0b875000 *pgalloc.MemoryFile 55ff40477000-55ff40478000 r-xp 0d6af000 *pgalloc.MemoryFile 55ff40479000-55ff4047a000 r-xp 0b85e000 *pgalloc.MemoryFile 55ff4047a000-55ff40481000 r-xs 00080000 *gofer.dentryPlatformFile 55ff40481000-55ff40482000 r-xp 0b75a000 *pgalloc.MemoryFile 55ff40491000-55ff40492000 r-xp 0b767000 *pgalloc.MemoryFile 55ff40492000-55ff404a3000 r-xs 00098000 *gofer.dentryPlatformFile 55ff404a3000-55ff404a4000 r-xp 0cff5000 *pgalloc.MemoryFile 55ff404c2000-55ff404c3000 r-xp 0b641000 *pgalloc.MemoryFile 55ff404c3000-55ff40517000 r--p 0db4f000 *pgalloc.MemoryFile 55ff40517000-55ff4057c000 rw-p 10dfa000 *pgalloc.MemoryFile 55ff4058a000-55ff40600000 rw-p 138ce000 *pgalloc.MemoryFile 55ff41000000-55ff410d6000 rw-p 143d0000 *pgalloc.MemoryFile 55ff410d6000-55ff410d7000 rw-p 0b63b000 *pgalloc.MemoryFile 55ff410d7000-55ff410f8000 rw-p 1080d000 *pgalloc.MemoryFile 7ee891a00000-7ee891a85000 r--p 135e8000 *pgalloc.MemoryFile 7ee891a85000-7ee891a87000 r--p 0b5b6000 *pgalloc.MemoryFile 7ee891a87000-7ee891a89000 rw-p 0b85b000 *pgalloc.MemoryFile 7eebfde00000-7eebfe200000 r--s 1e000000 *pgalloc.MemoryFile 7eebfe24f000-7eebfe26f000 rw-p 0f37a000 *pgalloc.MemoryFile 7eebfe26f000-7eebfe270000 r--s 00002000 *pgalloc.MemoryFile 7eebfe270000-7eebfe272000 r-xs 00000000 *pgalloc.MemoryFile D0318 14:42:24.732612 182129 task_log.go:73] [ 38731( 567): 38734( 568)] FDTable: fd:0 => name pipe:[1789] fd:1 => name pipe:[1789] fd:2 => name pipe:[1789] fd:200 => name /dev/net/tun fd:201 => name / D0318 14:42:24.733766 182129 task_signals.go:470] [ 38731( 567): 38734( 568)] Notified of signal 11 D0318 14:42:24.733940 182129 task_signals.go:220] [ 38731( 567): 38734( 568)] Signal 11: delivering to handler D0318 14:42:24.734157 182129 task_exit.go:204] [ 38729( 486): 38732( 487)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.734276 182129 task_exit.go:204] [ 38729( 486): 38732( 487)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.734436 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.734621 182129 task_signals.go:204] [ 38730(1302): 38735(1303)] Signal 9, PID: 38730, TID: 38735, fault addr: 0x0: terminating thread group D0318 14:42:24.734753 182129 task_exit.go:204] [ 38730(1302): 38730(1302)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.735874 182129 task_exit.go:204] [ 38730(1302): 38730(1302)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.736163 182129 task_exit.go:204] [ 38730(1302): 38735(1303)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.736442 182129 task_exit.go:204] [ 38729( 486): 38729( 486)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x501000, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$binfmt_aout(r1, &(0x7f0000000100)={{0x108, 0x20, 0x1, 0xbf, 0x1aa, 0x3, 0x21f, 0x3}, "ca1a0af3781ddc7971d37f988c0c75238bb9a03f53af9c22d939a2c8f220ee2ca48f2bf6bfae43eae21e343de21a4a778e87024b1e421cfea79bc01e30c615fb5da008f494a2fe5cddc3f6236bff34e5d0810d5cc60865633ac825ee4b538b5b0cc8dc9cc0103d9b976cbf04fd9c3e8b0b0e39094db23d3d581705d93dc0360efb5191f42eb5b4ccc120bd7811febd7e86dd3a82c6fcf8a7d1723587dc50870657a5053e7fb666bee35a351caf", ['\x00']}, 0x1cd) r2 = getuid() fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, 0xee00, 0x1000) connect$unix(r1, &(0x7f0000000300)=@abs={0x2, 0x0, 0x100}, 0x6e) D0318 14:42:24.739533 182129 usertrap_amd64.go:212] [ 38731( 567): 38731( 567)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.739662 182129 usertrap_amd64.go:122] [ 38731( 567): 38731( 567)] Allocate a new trap: 0xc0043f0630 43 D0318 14:42:24.739748 182129 usertrap_amd64.go:225] [ 38731( 567): 38731( 567)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:24.748425 182129 task_exit.go:204] [ 38730(1302): 38735(1303)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.748690 182129 task_exit.go:204] [ 38730(1302): 38735(1303)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.748858 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.749141 182129 task_exit.go:204] [ 38730(1302): 38730(1302)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f0000000040)=0x1c) creat(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x24) ftruncate(r0, 0x2) r1 = dup3(r0, r0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) D0318 14:42:24.752068 182129 task_exit.go:204] [ 38731( 567): 38731( 567)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.752284 182129 task_signals.go:204] [ 38731( 567): 38736( 569)] Signal 9, PID: 38731, TID: 38736, fault addr: 0x0: terminating thread group D0318 14:42:24.752342 182129 task_signals.go:204] [ 38731( 567): 38734( 568)] Signal 9, PID: 38731, TID: 38734, fault addr: 0x0: terminating thread group D0318 14:42:24.753356 182129 task_exit.go:204] [ 38731( 567): 38731( 567)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.753492 182129 task_exit.go:204] [ 38731( 567): 38736( 569)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.753674 182129 task_exit.go:204] [ 38731( 567): 38734( 568)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.755000 182129 task_exit.go:204] [ 38731( 567): 38736( 569)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.755103 182129 task_exit.go:204] [ 38731( 567): 38736( 569)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.765797 182129 task_exit.go:204] [ 38731( 567): 38734( 568)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.765908 182129 task_exit.go:204] [ 38731( 567): 38734( 568)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.766059 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.766347 182129 task_exit.go:204] [ 38731( 567): 38731( 567)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0xd0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:24.787477 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.787698 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 36 D0318 14:42:24.789232 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.795880 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.796058 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 37 D0318 14:42:24.796172 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.803357 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.803506 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 37 D0318 14:42:24.804691 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.817890 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.817986 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 38 D0318 14:42:24.818118 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.819959 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.820120 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 38 D0318 14:42:24.820244 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.822838 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.823143 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 37 D0318 14:42:24.828032 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.831560 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.831727 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 39 D0318 14:42:24.831877 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.834393 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.834532 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.834673 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 40 D0318 14:42:24.834569 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 38 D0318 14:42:24.834833 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.834933 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.835264 182129 usertrap_amd64.go:212] [ 38737( 489): 38740( 490)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.835323 182129 usertrap_amd64.go:122] [ 38737( 489): 38740( 490)] Allocate a new trap: 0xc000881170 41 D0318 14:42:24.835448 182129 usertrap_amd64.go:225] [ 38737( 489): 38740( 490)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.837122 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.837252 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 39 D0318 14:42:24.837343 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.841224 182129 usertrap_amd64.go:212] [ 38737( 489): 38737( 489)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.841293 182129 usertrap_amd64.go:122] [ 38737( 489): 38737( 489)] Allocate a new trap: 0xc000881170 42 D0318 14:42:24.841399 182129 usertrap_amd64.go:225] [ 38737( 489): 38737( 489)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.848886 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.848994 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 40 D0318 14:42:24.849079 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.851964 182129 task_signals.go:204] [ 38737( 489): 38740( 490)] Signal 9, PID: 38737, TID: 38740, fault addr: 0x0: terminating thread group D0318 14:42:24.852111 182129 task_exit.go:204] [ 38737( 489): 38740( 490)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.852240 182129 task_exit.go:204] [ 38737( 489): 38737( 489)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.852225 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:24.852461 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 41 D0318 14:42:24.852578 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:24.853079 182129 usertrap_amd64.go:212] [ 38738(1304): 38741(1305)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:24.853232 182129 task_exit.go:204] [ 38737( 489): 38737( 489)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.853195 182129 usertrap_amd64.go:122] [ 38738(1304): 38741(1305)] Allocate a new trap: 0xc0004e0b10 42 D0318 14:42:24.853393 182129 usertrap_amd64.go:225] [ 38738(1304): 38741(1305)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:24.856016 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:24.856213 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 39 D0318 14:42:24.856401 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:24.859014 182129 usertrap_amd64.go:212] [ 38738(1304): 38738(1304)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:24.859107 182129 usertrap_amd64.go:122] [ 38738(1304): 38738(1304)] Allocate a new trap: 0xc0004e0b10 43 D0318 14:42:24.859221 182129 usertrap_amd64.go:225] [ 38738(1304): 38738(1304)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:24.861981 182129 task_exit.go:204] [ 38737( 489): 38740( 490)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.862088 182129 task_exit.go:204] [ 38737( 489): 38740( 490)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.862363 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:24.862918 182129 task_exit.go:204] [ 38737( 489): 38737( 489)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.863181 182129 task_exit.go:204] [ 38738(1304): 38738(1304)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.863370 182129 task_signals.go:204] [ 38738(1304): 38741(1305)] Signal 9, PID: 38738, TID: 38741, fault addr: 0x0: terminating thread group D0318 14:42:24.864140 182129 task_exit.go:204] [ 38738(1304): 38738(1304)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.864278 182129 task_exit.go:204] [ 38738(1304): 38741(1305)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:24 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0xd0) (async, rerun: 32) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 32) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:24.867518 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:24.867630 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 40 D0318 14:42:24.867734 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:24.870800 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:24.870910 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 41 D0318 14:42:24.871327 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:24.871663 182129 usertrap_amd64.go:212] [ 38739( 570): 38742( 571)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:24.871782 182129 usertrap_amd64.go:122] [ 38739( 570): 38742( 571)] Allocate a new trap: 0xc0047affb0 42 D0318 14:42:24.871874 182129 usertrap_amd64.go:225] [ 38739( 570): 38742( 571)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:24.874576 182129 task_exit.go:204] [ 38738(1304): 38741(1305)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.874646 182129 task_exit.go:204] [ 38738(1304): 38741(1305)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.874814 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:24.875211 182129 task_exit.go:204] [ 38738(1304): 38738(1304)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.875678 182129 usertrap_amd64.go:212] [ 38739( 570): 38739( 570)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:24.875750 182129 usertrap_amd64.go:122] [ 38739( 570): 38739( 570)] Allocate a new trap: 0xc0047affb0 43 D0318 14:42:24.875904 182129 usertrap_amd64.go:225] [ 38739( 570): 38739( 570)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) 14:42:24 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x501000, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$binfmt_aout(r1, &(0x7f0000000100)={{0x108, 0x20, 0x1, 0xbf, 0x1aa, 0x3, 0x21f, 0x3}, "ca1a0af3781ddc7971d37f988c0c75238bb9a03f53af9c22d939a2c8f220ee2ca48f2bf6bfae43eae21e343de21a4a778e87024b1e421cfea79bc01e30c615fb5da008f494a2fe5cddc3f6236bff34e5d0810d5cc60865633ac825ee4b538b5b0cc8dc9cc0103d9b976cbf04fd9c3e8b0b0e39094db23d3d581705d93dc0360efb5191f42eb5b4ccc120bd7811febd7e86dd3a82c6fcf8a7d1723587dc50870657a5053e7fb666bee35a351caf", ['\x00']}, 0x1cd) r2 = getuid() fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, 0xee00, 0x1000) connect$unix(r1, &(0x7f0000000300)=@abs={0x2, 0x0, 0x100}, 0x6e) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x501000, 0x0) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) (async) dup(r0) (async) write$binfmt_aout(r1, &(0x7f0000000100)={{0x108, 0x20, 0x1, 0xbf, 0x1aa, 0x3, 0x21f, 0x3}, "ca1a0af3781ddc7971d37f988c0c75238bb9a03f53af9c22d939a2c8f220ee2ca48f2bf6bfae43eae21e343de21a4a778e87024b1e421cfea79bc01e30c615fb5da008f494a2fe5cddc3f6236bff34e5d0810d5cc60865633ac825ee4b538b5b0cc8dc9cc0103d9b976cbf04fd9c3e8b0b0e39094db23d3d581705d93dc0360efb5191f42eb5b4ccc120bd7811febd7e86dd3a82c6fcf8a7d1723587dc50870657a5053e7fb666bee35a351caf", ['\x00']}, 0x1cd) (async) getuid() (async) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, 0xee00, 0x1000) (async) connect$unix(r1, &(0x7f0000000300)=@abs={0x2, 0x0, 0x100}, 0x6e) (async) D0318 14:42:24.894646 182129 task_exit.go:204] [ 38739( 570): 38739( 570)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.895881 182129 task_signals.go:204] [ 38739( 570): 38742( 571)] Signal 9, PID: 38739, TID: 38742, fault addr: 0x0: terminating thread group D0318 14:42:24.895976 182129 task_exit.go:204] [ 38739( 570): 38739( 570)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.896227 182129 task_exit.go:204] [ 38739( 570): 38742( 571)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.910059 182129 task_exit.go:204] [ 38739( 570): 38742( 571)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:24.910227 182129 task_exit.go:204] [ 38739( 570): 38742( 571)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:24.910474 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:24.911910 182129 task_exit.go:204] [ 38739( 570): 38739( 570)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:24 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f0000000040)=0x1c) creat(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x24) ftruncate(r0, 0x2) r1 = dup3(r0, r0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f0000000040)=0x1c) (async) creat(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x24) (async) ftruncate(r0, 0x2) (async) dup3(r0, r0, 0x0) (async) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) (async) D0318 14:42:24.917595 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:24.917741 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 36 D0318 14:42:24.918916 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:24.925137 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:24.925252 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 37 D0318 14:42:24.925354 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:24.930858 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:24.931012 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 37 D0318 14:42:24.932123 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:24.937116 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:24.937314 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 38 D0318 14:42:24.937421 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:24.949632 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:24.949719 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 38 D0318 14:42:24.949831 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:24.960861 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:24.961071 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 39 D0318 14:42:24.961189 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:24.964163 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:24.964252 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 40 D0318 14:42:24.964361 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:24.964982 182129 usertrap_amd64.go:212] [ 38743( 491): 38746( 492)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:24.965072 182129 usertrap_amd64.go:122] [ 38743( 491): 38746( 492)] Allocate a new trap: 0xc005f00a50 41 D0318 14:42:24.965171 182129 usertrap_amd64.go:225] [ 38743( 491): 38746( 492)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:24.966480 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:24.966747 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 37 D0318 14:42:24.968307 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:24.969360 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:24.969470 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 39 D0318 14:42:24.969646 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:24.974794 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:24.974935 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 38 D0318 14:42:24.975090 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:24.982064 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68d3d1ae:sysno 230 D0318 14:42:24.982194 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 42 D0318 14:42:24.982311 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68d3d1ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:24.985119 182129 usertrap_amd64.go:212] [ 38743( 491): 38743( 491)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:24.985367 182129 usertrap_amd64.go:122] [ 38743( 491): 38743( 491)] Allocate a new trap: 0xc005f00a50 43 D0318 14:42:24.985509 182129 usertrap_amd64.go:225] [ 38743( 491): 38743( 491)] Apply the binary patch addr 560b68d10c93 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0318 14:42:24.995929 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:24.996014 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 40 D0318 14:42:24.996136 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:24.996410 182129 task_signals.go:204] [ 38743( 491): 38746( 492)] Signal 9, PID: 38743, TID: 38746, fault addr: 0x0: terminating thread group D0318 14:42:24.996722 182129 task_signals.go:204] [ 38743( 491): 38747( 493)] Signal 9, PID: 38743, TID: 38747, fault addr: 0x0: terminating thread group D0318 14:42:24.996842 182129 task_exit.go:204] [ 38743( 491): 38743( 491)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:24.998117 182129 task_exit.go:204] [ 38743( 491): 38743( 491)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.000242 182129 task_exit.go:204] [ 38743( 491): 38746( 492)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.000637 182129 task_exit.go:204] [ 38743( 491): 38747( 493)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.000999 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.001167 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 41 D0318 14:42:25.001274 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.001941 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.002027 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 39 D0318 14:42:25.002048 182129 usertrap_amd64.go:212] [ 38744(1306): 38748(1307)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.001940 182129 task_exit.go:204] [ 38743( 491): 38747( 493)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.002177 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.002388 182129 task_exit.go:204] [ 38743( 491): 38747( 493)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.002340 182129 usertrap_amd64.go:122] [ 38744(1306): 38748(1307)] Allocate a new trap: 0xc003f5f8c0 42 D0318 14:42:25.002527 182129 usertrap_amd64.go:225] [ 38744(1306): 38748(1307)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.013353 182129 task_exit.go:204] [ 38743( 491): 38746( 492)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.013635 182129 task_exit.go:204] [ 38743( 491): 38746( 492)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.013993 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.013997 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:25.014331 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 40 D0318 14:42:25.014594 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.014693 182129 task_exit.go:204] [ 38743( 491): 38743( 491)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0xd0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:25.017714 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.017774 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 41 D0318 14:42:25.017894 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.018386 182129 usertrap_amd64.go:212] [ 38745( 572): 38749( 573)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.018588 182129 usertrap_amd64.go:122] [ 38745( 572): 38749( 573)] Allocate a new trap: 0xc0043f06c0 42 D0318 14:42:25.018700 182129 usertrap_amd64.go:225] [ 38745( 572): 38749( 573)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.025357 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d58640d1ae:sysno 230 D0318 14:42:25.025488 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 43 D0318 14:42:25.025754 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d58640d1ae trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.028348 182129 usertrap_amd64.go:212] [ 38744(1306): 38744(1306)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.028446 182129 usertrap_amd64.go:122] [ 38744(1306): 38744(1306)] Allocate a new trap: 0xc003f5f8c0 44 D0318 14:42:25.028558 182129 usertrap_amd64.go:225] [ 38744(1306): 38744(1306)] Apply the binary patch addr 55d5863e0c93 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0318 14:42:25.033022 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:25.033639 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 43 D0318 14:42:25.033752 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.037439 182129 task_exit.go:204] [ 38744(1306): 38744(1306)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.039140 182129 task_signals.go:204] [ 38744(1306): 38751(1309)] Signal 9, PID: 38744, TID: 38751, fault addr: 0x0: terminating thread group D0318 14:42:25.039185 182129 task_signals.go:204] [ 38744(1306): 38750(1308)] Signal 9, PID: 38744, TID: 38750, fault addr: 0x0: terminating thread group D0318 14:42:25.039296 182129 task_signals.go:204] [ 38744(1306): 38748(1307)] Signal 9, PID: 38744, TID: 38748, fault addr: 0x0: terminating thread group D0318 14:42:25.039426 182129 task_exit.go:204] [ 38744(1306): 38744(1306)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.039882 182129 usertrap_amd64.go:212] [ 38745( 572): 38745( 572)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.040040 182129 usertrap_amd64.go:122] [ 38745( 572): 38745( 572)] Allocate a new trap: 0xc0043f06c0 44 D0318 14:42:25.039879 182129 task_exit.go:204] [ 38744(1306): 38750(1308)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.040184 182129 usertrap_amd64.go:225] [ 38745( 572): 38745( 572)] Apply the binary patch addr 55ff40476c93 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0318 14:42:25.040223 182129 task_exit.go:204] [ 38744(1306): 38751(1309)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.040577 182129 task_exit.go:204] [ 38744(1306): 38748(1307)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.041540 182129 task_exit.go:204] [ 38744(1306): 38750(1308)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.041611 182129 task_exit.go:204] [ 38744(1306): 38750(1308)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.042571 182129 task_exit.go:204] [ 38744(1306): 38751(1309)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.042637 182129 task_exit.go:204] [ 38744(1306): 38751(1309)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.045690 182129 task_exit.go:204] [ 38745( 572): 38745( 572)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.045922 182129 task_signals.go:204] [ 38745( 572): 38749( 573)] Signal 9, PID: 38745, TID: 38749, fault addr: 0x0: terminating thread group D0318 14:42:25.045873 182129 task_signals.go:204] [ 38745( 572): 38752( 574)] Signal 9, PID: 38745, TID: 38752, fault addr: 0x0: terminating thread group D0318 14:42:25.046899 182129 task_exit.go:204] [ 38745( 572): 38745( 572)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.046889 182129 task_signals.go:204] [ 38745( 572): 38753( 575)] Signal 9, PID: 38745, TID: 38753, fault addr: 0x0: terminating thread group D0318 14:42:25.047060 182129 task_exit.go:204] [ 38745( 572): 38749( 573)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.047290 182129 task_exit.go:204] [ 38745( 572): 38752( 574)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.048331 182129 task_exit.go:204] [ 38745( 572): 38752( 574)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.048417 182129 task_exit.go:204] [ 38745( 572): 38752( 574)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.048594 182129 task_exit.go:204] [ 38745( 572): 38753( 575)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.052584 182129 task_exit.go:204] [ 38744(1306): 38748(1307)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.052721 182129 task_exit.go:204] [ 38744(1306): 38748(1307)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.052866 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:25.053073 182129 task_exit.go:204] [ 38745( 572): 38749( 573)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.053187 182129 task_exit.go:204] [ 38745( 572): 38749( 573)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.054011 182129 task_exit.go:204] [ 38744(1306): 38744(1306)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = epoll_create(0x1f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r3, 0x0) getpeername$inet(r3, 0x0, &(0x7f0000000180)) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x24000, 0x0) write$binfmt_elf32(r4, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xca, 0x5, 0x8, 0x81, 0x0, 0x3, 0x6, 0x5, 0x379, 0x38, 0x81, 0x3, 0xfffe, 0x20, 0x2, 0x1, 0x7, 0x7}, [{0x4, 0xeaa, 0x9, 0x5, 0x9, 0x7, 0x1ff, 0x400}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xb56) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)={0x200b}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x10002008}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000080)) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r5) D0318 14:42:25.062379 182129 task_exit.go:204] [ 38745( 572): 38753( 575)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.062487 182129 task_exit.go:204] [ 38745( 572): 38753( 575)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.062684 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.063163 182129 task_exit.go:204] [ 38745( 572): 38745( 572)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 3: r0 = dup(0xffffffffffffffff) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x100) D0318 14:42:25.070952 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:25.071066 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 36 D0318 14:42:25.072227 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:25.078744 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:25.078834 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 37 D0318 14:42:25.078948 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:25.101689 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:25.101790 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 38 D0318 14:42:25.101930 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:25.104190 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.104359 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 37 D0318 14:42:25.105362 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.111241 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.111350 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 38 D0318 14:42:25.111539 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.114658 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.114847 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 37 D0318 14:42:25.116037 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.116428 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:25.116728 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 39 D0318 14:42:25.116873 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:25.119814 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:25.119975 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 40 D0318 14:42:25.120173 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:25.120418 182129 usertrap_amd64.go:212] [ 38754( 494): 38757( 495)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:25.120522 182129 usertrap_amd64.go:122] [ 38754( 494): 38757( 495)] Allocate a new trap: 0xc0043f06f0 41 D0318 14:42:25.120624 182129 usertrap_amd64.go:225] [ 38754( 494): 38757( 495)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:25.122220 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.122306 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 38 D0318 14:42:25.122699 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.124447 182129 usertrap_amd64.go:212] [ 38754( 494): 38754( 494)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:25.124513 182129 usertrap_amd64.go:122] [ 38754( 494): 38754( 494)] Allocate a new trap: 0xc0043f06f0 42 D0318 14:42:25.124604 182129 usertrap_amd64.go:225] [ 38754( 494): 38754( 494)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:25.134326 182129 task_exit.go:204] [ 38754( 494): 38754( 494)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.135638 182129 task_signals.go:204] [ 38754( 494): 38757( 495)] Signal 9, PID: 38754, TID: 38757, fault addr: 0x0: terminating thread group D0318 14:42:25.135652 182129 task_exit.go:204] [ 38754( 494): 38754( 494)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.136056 182129 task_exit.go:204] [ 38754( 494): 38757( 495)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.138160 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.138306 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 39 D0318 14:42:25.138388 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.139955 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.140034 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 39 D0318 14:42:25.140274 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.143063 182129 usertrap_amd64.go:212] [ 38707( 540): 38707( 540)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:25.143209 182129 usertrap_amd64.go:122] [ 38707( 540): 38707( 540)] Allocate a new trap: 0xc005f00990 43 D0318 14:42:25.143430 182129 usertrap_amd64.go:225] [ 38707( 540): 38707( 540)] Apply the binary patch addr 556d17c46c93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 14:42:25.145943 182129 task_exit.go:204] [ 38754( 494): 38757( 495)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.146065 182129 task_exit.go:204] [ 38754( 494): 38757( 495)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.146277 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:25.146663 182129 task_exit.go:204] [ 38754( 494): 38754( 494)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ftruncate(r0, 0x4) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) D0318 14:42:25.160978 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:25.161122 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.161115 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 40 D0318 14:42:25.161402 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:25.161289 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 40 D0318 14:42:25.161693 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.259119 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.259366 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 41 D0318 14:42:25.259535 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.259001 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.260185 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 41 D0318 14:42:25.260394 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.260572 182129 usertrap_amd64.go:212] [ 38756( 576): 38759( 577)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.260879 182129 usertrap_amd64.go:122] [ 38756( 576): 38759( 577)] Allocate a new trap: 0xc0004e0b70 42 D0318 14:42:25.261034 182129 usertrap_amd64.go:225] [ 38756( 576): 38759( 577)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.261680 182129 usertrap_amd64.go:212] [ 38755(1310): 38758(1311)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.261781 182129 usertrap_amd64.go:122] [ 38755(1310): 38758(1311)] Allocate a new trap: 0xc0043f0720 42 D0318 14:42:25.261901 182129 usertrap_amd64.go:225] [ 38755(1310): 38758(1311)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.272278 182129 usertrap_amd64.go:212] [ 38756( 576): 38756( 576)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.272679 182129 usertrap_amd64.go:122] [ 38756( 576): 38756( 576)] Allocate a new trap: 0xc0004e0b70 43 D0318 14:42:25.273116 182129 usertrap_amd64.go:225] [ 38756( 576): 38756( 576)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.288075 182129 usertrap_amd64.go:212] [ 38755(1310): 38755(1310)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.288201 182129 usertrap_amd64.go:122] [ 38755(1310): 38755(1310)] Allocate a new trap: 0xc0043f0720 43 D0318 14:42:25.288299 182129 usertrap_amd64.go:225] [ 38755(1310): 38755(1310)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.292929 182129 task_exit.go:204] [ 38756( 576): 38756( 576)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.294169 182129 task_signals.go:204] [ 38756( 576): 38759( 577)] Signal 9, PID: 38756, TID: 38759, fault addr: 0x0: terminating thread group D0318 14:42:25.294226 182129 task_exit.go:204] [ 38756( 576): 38756( 576)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.295165 182129 task_exit.go:204] [ 38756( 576): 38759( 577)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.297520 182129 task_exit.go:204] [ 38755(1310): 38755(1310)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.297771 182129 task_signals.go:204] [ 38755(1310): 38758(1311)] Signal 9, PID: 38755, TID: 38758, fault addr: 0x0: terminating thread group D0318 14:42:25.298752 182129 task_exit.go:204] [ 38755(1310): 38758(1311)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.299017 182129 task_exit.go:204] [ 38755(1310): 38755(1310)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.306264 182129 task_exit.go:204] [ 38756( 576): 38759( 577)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.306341 182129 task_exit.go:204] [ 38756( 576): 38759( 577)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.306620 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.306927 182129 task_exit.go:204] [ 38756( 576): 38756( 576)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.310120 182129 task_exit.go:204] [ 38755(1310): 38758(1311)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.310256 182129 task_exit.go:204] [ 38755(1310): 38758(1311)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.310557 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:25.311101 182129 task_exit.go:204] [ 38755(1310): 38755(1310)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.311886 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:25.312055 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 36 14:42:25 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0xd0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) 14:42:25 executing program 1: r0 = dup(0xffffffffffffffff) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000000) (async) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x100) D0318 14:42:25.313680 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:25.321170 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:25.321373 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 37 D0318 14:42:25.321512 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:25.341103 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:25.341359 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 38 D0318 14:42:25.341496 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:25.352303 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.352632 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 37 D0318 14:42:25.353901 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.356924 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:25.357220 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 39 D0318 14:42:25.357483 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:25.359298 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.359420 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 38 D0318 14:42:25.359553 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.360405 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:25.360513 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 40 D0318 14:42:25.360617 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:25.361256 182129 usertrap_amd64.go:212] [ 38760( 496): 38763( 497)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:25.361350 182129 usertrap_amd64.go:122] [ 38760( 496): 38763( 497)] Allocate a new trap: 0xc000706270 41 D0318 14:42:25.361521 182129 usertrap_amd64.go:225] [ 38760( 496): 38763( 497)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:25.380284 182129 usertrap_amd64.go:212] [ 38760( 496): 38760( 496)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:25.380417 182129 usertrap_amd64.go:122] [ 38760( 496): 38760( 496)] Allocate a new trap: 0xc000706270 42 D0318 14:42:25.380614 182129 usertrap_amd64.go:225] [ 38760( 496): 38760( 496)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:25.382647 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.382873 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 39 D0318 14:42:25.383088 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.385084 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.385280 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 37 D0318 14:42:25.386316 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.391841 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.392089 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 38 D0318 14:42:25.392339 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.396044 182129 task_exit.go:204] [ 38760( 496): 38760( 496)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.396532 182129 task_signals.go:204] [ 38760( 496): 38763( 497)] Signal 9, PID: 38760, TID: 38763, fault addr: 0x0: terminating thread group D0318 14:42:25.397316 182129 task_exit.go:204] [ 38760( 496): 38760( 496)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.398103 182129 task_exit.go:204] [ 38760( 496): 38763( 497)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.398161 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.398552 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 40 D0318 14:42:25.398666 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.401650 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.401742 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 41 D0318 14:42:25.401864 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.404665 182129 usertrap_amd64.go:212] [ 38761( 578): 38764( 579)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.404860 182129 usertrap_amd64.go:122] [ 38761( 578): 38764( 579)] Allocate a new trap: 0xc0004e0bd0 42 D0318 14:42:25.405124 182129 usertrap_amd64.go:225] [ 38761( 578): 38764( 579)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.409128 182129 usertrap_amd64.go:212] [ 38761( 578): 38761( 578)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.409259 182129 usertrap_amd64.go:122] [ 38761( 578): 38761( 578)] Allocate a new trap: 0xc0004e0bd0 43 D0318 14:42:25.409265 182129 task_exit.go:204] [ 38760( 496): 38763( 497)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.409367 182129 task_exit.go:204] [ 38760( 496): 38763( 497)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.409456 182129 usertrap_amd64.go:225] [ 38761( 578): 38761( 578)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.409572 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:25.409844 182129 task_exit.go:204] [ 38760( 496): 38760( 496)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) r1 = epoll_create(0x1f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) (async, rerun: 64) r3 = socket$inet6_udp(0xa, 0x2, 0x0) (rerun: 64) dup3(r2, r3, 0x0) getpeername$inet(r3, 0x0, &(0x7f0000000180)) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x24000, 0x0) write$binfmt_elf32(r4, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xca, 0x5, 0x8, 0x81, 0x0, 0x3, 0x6, 0x5, 0x379, 0x38, 0x81, 0x3, 0xfffe, 0x20, 0x2, 0x1, 0x7, 0x7}, [{0x4, 0xeaa, 0x9, 0x5, 0x9, 0x7, 0x1ff, 0x400}], "cdfa9158e0a9de2407b61993a85665cda47a043e3661d0b8cf0ba5aa280071f0104262d4f1504d4398a13ec0c332e2937a5b3391353f1531925a0df659efc8b9f36c7769d203332a72194ee66a5617c0c8576a5d65c5ff3d87669027b842e662be15ab9a25ce3ad822635bb684fa976d917214202350bc13d60a4ca6e55df7f4c55cf14057bb51e5f6b10cec12d254f906a8999256e7efbccd780a08373abb1a1b1961c85a7dcaa74e7ea6296281b0742c7614c9ce0347ea2340431d50f68a36cbb1d7d75d2c8d8c6eae97a02cc72223bc949dde0fa1ec9b654766c70e7869761ef78ffa534eaf9b75fb6e2612e2986c06664465d32da09a72a4fc8700f0", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xb56) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)={0x200b}) (async) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x10002008}) (async) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000080)) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r5) D0318 14:42:25.415896 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.416034 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 39 D0318 14:42:25.416172 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.423145 182129 task_exit.go:204] [ 38761( 578): 38761( 578)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.423395 182129 task_signals.go:204] [ 38761( 578): 38764( 579)] Signal 9, PID: 38761, TID: 38764, fault addr: 0x0: terminating thread group D0318 14:42:25.424310 182129 task_exit.go:204] [ 38761( 578): 38764( 579)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.425237 182129 task_exit.go:204] [ 38761( 578): 38761( 578)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.431122 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:25.431286 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 40 D0318 14:42:25.431372 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:25.436946 182129 task_exit.go:204] [ 38761( 578): 38764( 579)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.437091 182129 task_exit.go:204] [ 38761( 578): 38764( 579)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.437282 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.437427 182129 task_exit.go:204] [ 38761( 578): 38761( 578)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) (async) fcntl$dupfd(r0, 0x0, r0) ftruncate(r0, 0x4) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) D0318 14:42:25.439979 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.440090 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 41 D0318 14:42:25.440167 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.440655 182129 usertrap_amd64.go:212] [ 38762(1312): 38765(1313)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.440763 182129 usertrap_amd64.go:122] [ 38762(1312): 38765(1313)] Allocate a new trap: 0xc005d977d0 42 D0318 14:42:25.440975 182129 usertrap_amd64.go:225] [ 38762(1312): 38765(1313)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.456013 182129 usertrap_amd64.go:212] [ 38762(1312): 38762(1312)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.456094 182129 usertrap_amd64.go:122] [ 38762(1312): 38762(1312)] Allocate a new trap: 0xc005d977d0 43 D0318 14:42:25.456252 182129 usertrap_amd64.go:225] [ 38762(1312): 38762(1312)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.458452 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:25.458741 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 36 D0318 14:42:25.459975 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:25.466867 182129 task_exit.go:204] [ 38762(1312): 38762(1312)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.467139 182129 task_signals.go:204] [ 38762(1312): 38765(1313)] Signal 9, PID: 38762, TID: 38765, fault addr: 0x0: terminating thread group D0318 14:42:25.467241 182129 task_signals.go:204] [ 38762(1312): 38767(1314)] Signal 9, PID: 38762, TID: 38767, fault addr: 0x0: terminating thread group D0318 14:42:25.467778 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:25.467914 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 37 D0318 14:42:25.468034 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:25.468114 182129 task_exit.go:204] [ 38762(1312): 38762(1312)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.468266 182129 task_exit.go:204] [ 38762(1312): 38765(1313)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.472030 182129 task_exit.go:204] [ 38762(1312): 38767(1314)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.472465 182129 task_exit.go:204] [ 38762(1312): 38765(1313)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.472682 182129 task_exit.go:204] [ 38762(1312): 38765(1313)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.489696 182129 task_exit.go:204] [ 38762(1312): 38767(1314)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.489886 182129 task_exit.go:204] [ 38762(1312): 38767(1314)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.490062 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:25.490302 182129 task_exit.go:204] [ 38762(1312): 38762(1312)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0xd0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:25.496253 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.496607 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 37 D0318 14:42:25.498237 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.508780 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:25.509012 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 38 D0318 14:42:25.509279 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:25.513741 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.514014 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 38 D0318 14:42:25.514238 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.525125 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:25.525297 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 39 D0318 14:42:25.525458 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:25.529924 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:25.530030 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 40 D0318 14:42:25.530159 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:25.530406 182129 usertrap_amd64.go:212] [ 38766( 498): 38770( 499)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:25.530515 182129 usertrap_amd64.go:122] [ 38766( 498): 38770( 499)] Allocate a new trap: 0xc004db1290 41 D0318 14:42:25.530639 182129 usertrap_amd64.go:225] [ 38766( 498): 38770( 499)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:25.538397 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.538522 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 37 D0318 14:42:25.539739 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.544520 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.544697 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 38 D0318 14:42:25.544842 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.548469 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.548559 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 39 D0318 14:42:25.548700 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.562389 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.562527 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 40 D0318 14:42:25.562606 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.562692 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.562741 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 39 D0318 14:42:25.562823 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.565280 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.565377 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 41 D0318 14:42:25.565479 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.566104 182129 usertrap_amd64.go:212] [ 38768( 580): 38772( 581)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.566225 182129 usertrap_amd64.go:122] [ 38768( 580): 38772( 581)] Allocate a new trap: 0xc004db12c0 42 D0318 14:42:25.566343 182129 usertrap_amd64.go:225] [ 38768( 580): 38772( 581)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.570294 182129 usertrap_amd64.go:212] [ 38766( 498): 38766( 498)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:25.570371 182129 usertrap_amd64.go:122] [ 38766( 498): 38766( 498)] Allocate a new trap: 0xc004db1290 42 D0318 14:42:25.570526 182129 usertrap_amd64.go:225] [ 38766( 498): 38766( 498)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:25.573161 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:25.573281 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 40 D0318 14:42:25.573293 182129 usertrap_amd64.go:212] [ 38768( 580): 38768( 580)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.573364 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:25.573412 182129 usertrap_amd64.go:122] [ 38768( 580): 38768( 580)] Allocate a new trap: 0xc004db12c0 43 D0318 14:42:25.573580 182129 usertrap_amd64.go:225] [ 38768( 580): 38768( 580)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.575541 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.575689 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 41 D0318 14:42:25.575779 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.576102 182129 usertrap_amd64.go:212] [ 38769(1315): 38774(1316)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.576231 182129 usertrap_amd64.go:122] [ 38769(1315): 38774(1316)] Allocate a new trap: 0xc0014a4d80 42 D0318 14:42:25.576320 182129 usertrap_amd64.go:225] [ 38769(1315): 38774(1316)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.582029 182129 usertrap_amd64.go:212] [ 38769(1315): 38769(1315)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.582251 182129 usertrap_amd64.go:122] [ 38769(1315): 38769(1315)] Allocate a new trap: 0xc0014a4d80 43 D0318 14:42:25.582316 182129 task_exit.go:204] [ 38768( 580): 38768( 580)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.582613 182129 task_signals.go:204] [ 38768( 580): 38772( 581)] Signal 9, PID: 38768, TID: 38772, fault addr: 0x0: terminating thread group D0318 14:42:25.582406 182129 usertrap_amd64.go:225] [ 38769(1315): 38769(1315)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.583378 182129 task_exit.go:204] [ 38768( 580): 38772( 581)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.584088 182129 task_exit.go:204] [ 38768( 580): 38768( 580)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.590374 182129 task_exit.go:204] [ 38769(1315): 38769(1315)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.590612 182129 task_signals.go:204] [ 38769(1315): 38774(1316)] Signal 9, PID: 38769, TID: 38774, fault addr: 0x0: terminating thread group D0318 14:42:25.590840 182129 task_exit.go:204] [ 38769(1315): 38774(1316)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.592868 182129 task_exit.go:204] [ 38769(1315): 38774(1316)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.593023 182129 task_exit.go:204] [ 38769(1315): 38774(1316)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.598480 182129 task_exit.go:204] [ 38768( 580): 38772( 581)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.598599 182129 task_exit.go:204] [ 38768( 580): 38772( 581)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.599346 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.599572 182129 task_exit.go:204] [ 38768( 580): 38768( 580)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.601195 182129 task_exit.go:204] [ 38769(1315): 38769(1315)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.601628 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 14:42:25 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x4000004, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) name_to_handle_at(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@ceph_nfs_confh={0x10, 0x2, {0x2, 0xffff}}, &(0x7f0000000180), 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:25.601901 182129 task_exit.go:204] [ 38769(1315): 38769(1315)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.603039 182129 task_exit.go:204] [ 38766( 498): 38766( 498)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:25 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0xa390, 0x10e}) flistxattr(r0, &(0x7f0000000000)=""/79, 0x4f) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000600)={r1, 0xbaf9, 0x0, [0x7fff, 0xffffffff, 0x6, 0x2, 0x5], [0x1, 0x8, 0xe67, 0x5f, 0x5, 0x5, 0x800, 0xfffffffffffff000, 0x4, 0x1, 0xffffffff, 0x1, 0x3, 0x2, 0x7, 0x9, 0x9, 0x20, 0x0, 0x1000, 0x3aa, 0x1, 0x1, 0xff1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, 0x10000, 0x1ff, 0xcbdd, 0x2, 0x9, 0x8000000000000000, 0x6, 0x45b, 0x0, 0x0, 0x6, 0x8, 0x22e0, 0x6, 0xfffffffffffff800, 0x9, 0xac, 0x7, 0x4, 0x10001, 0x1, 0x8, 0xffffffff, 0x6, 0xd76, 0xffffffff, 0x9, 0xd1, 0xa2, 0x7, 0x8f06, 0x9, 0x2, 0x3, 0x3, 0x8, 0x3, 0x7, 0x101, 0x7, 0x3, 0x4, 0x3dd5, 0x391, 0xfffffffffffffffa, 0x20000, 0x10001, 0x0, 0x8000000000000000, 0x7fffffff, 0x6, 0x3, 0x8, 0x9, 0xffffffffffffffff, 0x5, 0x100, 0xff, 0xffffffffffff9072, 0x32, 0x3, 0x0, 0x1, 0x4, 0x1000, 0x6, 0x5, 0xfffffffffffffff7, 0x7, 0x7, 0x31c12c22, 0x6, 0x1, 0x465, 0x100, 0x4, 0x7, 0x100000000, 0xfffffffffffffe00, 0x8, 0x101, 0x318f, 0x1f, 0xffffffff7fffffff, 0x8, 0x7fff, 0x3, 0x7fffffffffffffff, 0x9, 0x4, 0x8000000000000000, 0xfffffffffffffffc]}) ftruncate(r0, 0x0) D0318 14:42:25.605653 182129 task_signals.go:204] [ 38766( 498): 38773( 501)] Signal 9, PID: 38766, TID: 38773, fault addr: 0x0: terminating thread group D0318 14:42:25.605734 182129 task_signals.go:204] [ 38766( 498): 38771( 500)] Signal 9, PID: 38766, TID: 38771, fault addr: 0x0: terminating thread group D0318 14:42:25.605809 182129 task_signals.go:204] [ 38766( 498): 38770( 499)] Signal 9, PID: 38766, TID: 38770, fault addr: 0x0: terminating thread group D0318 14:42:25.605950 182129 task_exit.go:204] [ 38766( 498): 38771( 500)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.606141 182129 task_exit.go:204] [ 38766( 498): 38766( 498)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.606313 182129 task_exit.go:204] [ 38766( 498): 38773( 501)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.607321 182129 task_exit.go:204] [ 38766( 498): 38773( 501)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.607436 182129 task_exit.go:204] [ 38766( 498): 38773( 501)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.607708 182129 task_exit.go:204] [ 38766( 498): 38770( 499)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.608956 182129 task_exit.go:204] [ 38766( 498): 38771( 500)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.609029 182129 task_exit.go:204] [ 38766( 498): 38771( 500)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.652257 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.652818 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 37 D0318 14:42:25.654622 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.660855 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.661034 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 38 D0318 14:42:25.661193 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.667990 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.668207 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 37 D0318 14:42:25.669535 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.675073 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.675170 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 38 D0318 14:42:25.675340 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.685044 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.685146 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 39 D0318 14:42:25.685311 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.698215 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.698323 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 39 D0318 14:42:25.698435 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.703144 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.703298 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 40 D0318 14:42:25.703471 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.705888 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.705967 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 41 D0318 14:42:25.706127 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.706528 182129 usertrap_amd64.go:212] [ 38775( 582): 38777( 583)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.706607 182129 usertrap_amd64.go:122] [ 38775( 582): 38777( 583)] Allocate a new trap: 0xc005d97830 42 D0318 14:42:25.706753 182129 usertrap_amd64.go:225] [ 38775( 582): 38777( 583)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.711115 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:25.711254 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 40 D0318 14:42:25.711380 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:25.713667 182129 usertrap_amd64.go:212] [ 38775( 582): 38775( 582)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.714035 182129 usertrap_amd64.go:122] [ 38775( 582): 38775( 582)] Allocate a new trap: 0xc005d97830 43 D0318 14:42:25.713885 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.714400 182129 usertrap_amd64.go:225] [ 38775( 582): 38775( 582)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.714412 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 41 D0318 14:42:25.714684 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.715875 182129 usertrap_amd64.go:212] [ 38776(1317): 38778(1318)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.716008 182129 usertrap_amd64.go:122] [ 38776(1317): 38778(1318)] Allocate a new trap: 0xc000881230 42 D0318 14:42:25.716151 182129 usertrap_amd64.go:225] [ 38776(1317): 38778(1318)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.721558 182129 usertrap_amd64.go:212] [ 38776(1317): 38776(1317)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.721656 182129 usertrap_amd64.go:122] [ 38776(1317): 38776(1317)] Allocate a new trap: 0xc000881230 43 D0318 14:42:25.721799 182129 usertrap_amd64.go:225] [ 38776(1317): 38776(1317)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.726537 182129 task_exit.go:204] [ 38775( 582): 38775( 582)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.726807 182129 task_signals.go:204] [ 38775( 582): 38777( 583)] Signal 9, PID: 38775, TID: 38777, fault addr: 0x0: terminating thread group D0318 14:42:25.728312 182129 task_exit.go:204] [ 38775( 582): 38777( 583)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.729956 182129 task_exit.go:204] [ 38775( 582): 38775( 582)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.738158 182129 task_exit.go:204] [ 38776(1317): 38776(1317)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.740072 182129 task_signals.go:204] [ 38776(1317): 38778(1318)] Signal 9, PID: 38776, TID: 38778, fault addr: 0x0: terminating thread group D0318 14:42:25.740388 182129 task_exit.go:204] [ 38776(1317): 38778(1318)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.740608 182129 task_exit.go:204] [ 38776(1317): 38776(1317)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.742626 182129 task_exit.go:204] [ 38775( 582): 38777( 583)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.742742 182129 task_exit.go:204] [ 38775( 582): 38777( 583)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.742915 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.743759 182129 task_exit.go:204] [ 38775( 582): 38775( 582)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0xd0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:25.754812 182129 task_exit.go:204] [ 38776(1317): 38778(1318)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.754973 182129 task_exit.go:204] [ 38776(1317): 38778(1318)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.755395 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:25.756143 182129 task_exit.go:204] [ 38776(1317): 38776(1317)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) (async, rerun: 64) sendto$unix(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x4000004, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) (rerun: 64) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x8000, 0x103) (async) name_to_handle_at(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@ceph_nfs_confh={0x10, 0x2, {0x2, 0xffff}}, &(0x7f0000000180), 0x0) (async, rerun: 64) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) (rerun: 64) D0318 14:42:25.763519 182129 task_exit.go:204] [ 38766( 498): 38770( 499)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.763682 182129 task_exit.go:204] [ 38766( 498): 38770( 499)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.763831 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:25.764031 182129 task_exit.go:204] [ 38766( 498): 38766( 498)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0xa390, 0x10e}) flistxattr(r0, &(0x7f0000000000)=""/79, 0x4f) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000600)={r1, 0xbaf9, 0x0, [0x7fff, 0xffffffff, 0x6, 0x2, 0x5], [0x1, 0x8, 0xe67, 0x5f, 0x5, 0x5, 0x800, 0xfffffffffffff000, 0x4, 0x1, 0xffffffff, 0x1, 0x3, 0x2, 0x7, 0x9, 0x9, 0x20, 0x0, 0x1000, 0x3aa, 0x1, 0x1, 0xff1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, 0x10000, 0x1ff, 0xcbdd, 0x2, 0x9, 0x8000000000000000, 0x6, 0x45b, 0x0, 0x0, 0x6, 0x8, 0x22e0, 0x6, 0xfffffffffffff800, 0x9, 0xac, 0x7, 0x4, 0x10001, 0x1, 0x8, 0xffffffff, 0x6, 0xd76, 0xffffffff, 0x9, 0xd1, 0xa2, 0x7, 0x8f06, 0x9, 0x2, 0x3, 0x3, 0x8, 0x3, 0x7, 0x101, 0x7, 0x3, 0x4, 0x3dd5, 0x391, 0xfffffffffffffffa, 0x20000, 0x10001, 0x0, 0x8000000000000000, 0x7fffffff, 0x6, 0x3, 0x8, 0x9, 0xffffffffffffffff, 0x5, 0x100, 0xff, 0xffffffffffff9072, 0x32, 0x3, 0x0, 0x1, 0x4, 0x1000, 0x6, 0x5, 0xfffffffffffffff7, 0x7, 0x7, 0x31c12c22, 0x6, 0x1, 0x465, 0x100, 0x4, 0x7, 0x100000000, 0xfffffffffffffe00, 0x8, 0x101, 0x318f, 0x1f, 0xffffffff7fffffff, 0x8, 0x7fff, 0x3, 0x7fffffffffffffff, 0x9, 0x4, 0x8000000000000000, 0xfffffffffffffffc]}) (async) ftruncate(r0, 0x0) D0318 14:42:25.811266 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.811541 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 37 D0318 14:42:25.813177 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.815647 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.815874 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 37 D0318 14:42:25.816930 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:25.817150 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 36 D0318 14:42:25.817257 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.818724 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:25.819056 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.819242 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 38 D0318 14:42:25.819404 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.823262 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.823395 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 38 D0318 14:42:25.823553 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.828818 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:25.829158 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 37 D0318 14:42:25.829367 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:25.843402 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.843559 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 39 D0318 14:42:25.843762 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.846165 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.846263 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 39 D0318 14:42:25.846400 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.850955 182129 task_signals.go:470] [ 38707( 540): 38711( 541)] Notified of signal 13 D0318 14:42:25.851304 182129 task_signals.go:204] [ 38707( 540): 38711( 541)] Signal 13, PID: 38707, TID: 38711, fault addr: 0x0: terminating thread group D0318 14:42:25.851340 182129 task_signals.go:470] [ 38707( 540): 38714( 542)] Notified of signal 13 D0318 14:42:25.851771 182129 task_signals.go:204] [ 38707( 540): 38714( 542)] Signal 13, PID: 38707, TID: 38714, fault addr: 0x0: terminating thread group D0318 14:42:25.851939 182129 task_exit.go:204] [ 38707( 540): 38714( 542)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.852274 182129 task_exit.go:204] [ 38707( 540): 38711( 541)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.852499 182129 task_signals.go:204] [ 38707( 540): 38717( 543)] Signal 9, PID: 38707, TID: 38717, fault addr: 0x0: terminating thread group D0318 14:42:25.852672 182129 task_signals.go:204] [ 38707( 540): 38707( 540)] Signal 9, PID: 38707, TID: 38707, fault addr: 0x0: terminating thread group D0318 14:42:25.853509 182129 task_signals.go:204] [ 38707( 540): 38721( 544)] Signal 9, PID: 38707, TID: 38721, fault addr: 0x0: terminating thread group D0318 14:42:25.853728 182129 task_exit.go:204] [ 38707( 540): 38721( 544)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.855634 182129 task_exit.go:204] [ 38707( 540): 38711( 541)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.855706 182129 task_exit.go:204] [ 38707( 540): 38711( 541)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.855799 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:25.855968 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 40 D0318 14:42:25.855950 182129 task_exit.go:204] [ 38707( 540): 38707( 540)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.856051 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:25.856065 182129 task_exit.go:204] [ 38707( 540): 38717( 543)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.856333 182129 task_exit.go:204] [ 38707( 540): 38714( 542)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.856397 182129 task_exit.go:204] [ 38707( 540): 38714( 542)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.857266 182129 task_exit.go:204] [ 38707( 540): 38707( 540)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.857780 182129 task_exit.go:204] [ 38707( 540): 38721( 544)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.857988 182129 task_exit.go:204] [ 38707( 540): 38721( 544)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.859902 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:25.859972 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 41 D0318 14:42:25.860401 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:25.860489 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 40 D0318 14:42:25.860575 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:25.860369 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:25.861505 182129 usertrap_amd64.go:212] [ 38780(1319): 38782(1320)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:25.861644 182129 usertrap_amd64.go:122] [ 38780(1319): 38782(1320)] Allocate a new trap: 0xc004db1320 42 D0318 14:42:25.861748 182129 usertrap_amd64.go:225] [ 38780(1319): 38782(1320)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:25.864948 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:25.865035 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 41 D0318 14:42:25.865135 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:25.865956 182129 usertrap_amd64.go:212] [ 38779( 584): 38783( 585)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:25.866039 182129 usertrap_amd64.go:122] [ 38779( 584): 38783( 585)] Allocate a new trap: 0xc003f5f980 42 D0318 14:42:25.866187 182129 usertrap_amd64.go:225] [ 38779( 584): 38783( 585)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:25.868870 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:25.868981 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 38 D0318 14:42:25.869060 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:25.869776 182129 usertrap_amd64.go:212] [ 38779( 584): 38779( 584)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:25.869850 182129 usertrap_amd64.go:122] [ 38779( 584): 38779( 584)] Allocate a new trap: 0xc003f5f980 43 D0318 14:42:25.869931 182129 usertrap_amd64.go:225] [ 38779( 584): 38779( 584)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:25.870417 182129 task_exit.go:204] [ 38707( 540): 38717( 543)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.870511 182129 task_exit.go:204] [ 38707( 540): 38717( 543)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.870717 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:25.870851 182129 task_exit.go:204] [ 38707( 540): 38707( 540)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 2: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x8) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x7, 0x0, 0x0, 0x4}, {0x7, 0x3, 0x0, 0x7ff}, {0x7fc7, 0x6, 0x8, 0x2}]}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000100)={{0x0, 0x7fff, 0x1, 0xdc8f, 0x2, 0x4, 0x0, 0x8b23, 0x7ac7, 0xffff, 0xfffffffa, 0xffffffffffffffff, 0xa579, 0x0, 0x2bc9}}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001640)={{r1, 0x100000001, 0x6, 0x100, 0x3f, 0x0, 0x0, 0x1, 0x4, 0x3, 0x5, 0x2, 0x40, 0x8001, 0x7fffffff}}) creat(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r2) D0318 14:42:25.883345 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:25.883457 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 39 D0318 14:42:25.883557 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:25.885827 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:25.885940 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 40 D0318 14:42:25.886045 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:25.886191 182129 task_exit.go:204] [ 38779( 584): 38779( 584)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.886266 182129 usertrap_amd64.go:212] [ 38781( 502): 38786( 503)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:25.886347 182129 usertrap_amd64.go:122] [ 38781( 502): 38786( 503)] Allocate a new trap: 0xc0043f0810 41 D0318 14:42:25.886500 182129 usertrap_amd64.go:225] [ 38781( 502): 38786( 503)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:25.887287 182129 task_signals.go:204] [ 38779( 584): 38783( 585)] Signal 9, PID: 38779, TID: 38783, fault addr: 0x0: terminating thread group D0318 14:42:25.887435 182129 task_exit.go:204] [ 38779( 584): 38779( 584)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.887716 182129 task_exit.go:204] [ 38779( 584): 38783( 585)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.893614 182129 usertrap_amd64.go:212] [ 38780(1319): 38780(1319)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:25.893688 182129 usertrap_amd64.go:122] [ 38780(1319): 38780(1319)] Allocate a new trap: 0xc004db1320 43 D0318 14:42:25.893807 182129 usertrap_amd64.go:225] [ 38780(1319): 38780(1319)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:25.896247 182129 usertrap_amd64.go:212] [ 38781( 502): 38781( 502)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:25.896416 182129 usertrap_amd64.go:122] [ 38781( 502): 38781( 502)] Allocate a new trap: 0xc0043f0810 42 D0318 14:42:25.896461 182129 task_exit.go:204] [ 38779( 584): 38783( 585)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.896598 182129 task_exit.go:204] [ 38779( 584): 38783( 585)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.896603 182129 usertrap_amd64.go:225] [ 38781( 502): 38781( 502)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:25.896732 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:25.897978 182129 task_exit.go:204] [ 38779( 584): 38779( 584)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1d, 0x0, 0x3}, {}, {0x9c}, {0x15}, {0x6}]}) D0318 14:42:25.904581 182129 task_exit.go:204] [ 38781( 502): 38781( 502)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.904897 182129 task_signals.go:204] [ 38781( 502): 38786( 503)] Signal 9, PID: 38781, TID: 38786, fault addr: 0x0: terminating thread group D0318 14:42:25.905917 182129 task_signals.go:204] [ 38781( 502): 38787( 504)] Signal 9, PID: 38781, TID: 38787, fault addr: 0x0: terminating thread group D0318 14:42:25.906110 182129 task_exit.go:204] [ 38781( 502): 38781( 502)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.906328 182129 task_exit.go:204] [ 38781( 502): 38786( 503)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.906662 182129 task_exit.go:204] [ 38781( 502): 38787( 504)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.907562 182129 task_exit.go:204] [ 38781( 502): 38786( 503)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.907680 182129 task_exit.go:204] [ 38781( 502): 38786( 503)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.916891 182129 task_exit.go:204] [ 38780(1319): 38780(1319)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.917952 182129 task_signals.go:204] [ 38780(1319): 38782(1320)] Signal 9, PID: 38780, TID: 38782, fault addr: 0x0: terminating thread group D0318 14:42:25.918060 182129 task_signals.go:204] [ 38780(1319): 38784(1321)] Signal 9, PID: 38780, TID: 38784, fault addr: 0x0: terminating thread group D0318 14:42:25.918081 182129 task_signals.go:204] [ 38780(1319): 38785(1322)] Signal 9, PID: 38780, TID: 38785, fault addr: 0x0: terminating thread group D0318 14:42:25.918216 182129 task_exit.go:204] [ 38780(1319): 38780(1319)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.919006 182129 task_exit.go:204] [ 38781( 502): 38787( 504)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.919222 182129 task_exit.go:204] [ 38781( 502): 38787( 504)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.919353 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:25.919463 182129 task_exit.go:204] [ 38780(1319): 38782(1320)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.919581 182129 task_exit.go:204] [ 38780(1319): 38784(1321)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.919809 182129 task_exit.go:204] [ 38780(1319): 38785(1322)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:25.919937 182129 task_exit.go:204] [ 38781( 502): 38781( 502)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.920969 182129 task_exit.go:204] [ 38780(1319): 38782(1320)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.921128 182129 task_exit.go:204] [ 38780(1319): 38782(1320)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) D0318 14:42:25.922133 182129 task_exit.go:204] [ 38780(1319): 38785(1322)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.922230 182129 task_exit.go:204] [ 38780(1319): 38785(1322)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.931264 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:25.931398 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 36 D0318 14:42:25.932530 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:25.933362 182129 task_exit.go:204] [ 38780(1319): 38784(1321)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:25.933524 182129 task_exit.go:204] [ 38780(1319): 38784(1321)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:25.933668 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:25.933822 182129 task_exit.go:204] [ 38780(1319): 38780(1319)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r1, 0xa, 0xffffffffffffffff, 0xc) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x24}, {0x6}]}) D0318 14:42:25.940751 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:25.940828 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 37 D0318 14:42:25.942290 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:25.952567 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:25.952973 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 37 D0318 14:42:25.954368 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:25.959100 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:25.959235 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 38 D0318 14:42:25.959335 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:25.963469 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:25.963729 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 36 D0318 14:42:25.964941 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:25.975215 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:25.975297 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 37 D0318 14:42:25.976167 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:25.980056 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:25.980167 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 38 D0318 14:42:25.980262 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:25.980250 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:25.980472 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 38 D0318 14:42:25.980616 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:25.984603 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:25.984706 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 37 D0318 14:42:25.984836 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:25.989072 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:25.989252 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 39 D0318 14:42:25.989441 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:25.991813 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:25.991884 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 40 D0318 14:42:25.991810 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:25.992040 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 39 D0318 14:42:25.992159 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:25.992199 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:25.992496 182129 usertrap_amd64.go:212] [ 38788( 545): 38792( 546)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:25.992644 182129 usertrap_amd64.go:122] [ 38788( 545): 38792( 546)] Allocate a new trap: 0xc000e686c0 41 D0318 14:42:25.992735 182129 usertrap_amd64.go:225] [ 38788( 545): 38792( 546)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:25.997698 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:25.997891 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 39 D0318 14:42:25.998202 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:25.998918 182129 usertrap_amd64.go:212] [ 38788( 545): 38788( 545)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:25.999041 182129 usertrap_amd64.go:122] [ 38788( 545): 38788( 545)] Allocate a new trap: 0xc000e686c0 42 D0318 14:42:25.999179 182129 usertrap_amd64.go:225] [ 38788( 545): 38788( 545)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.006546 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.006758 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 38 D0318 14:42:26.006939 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.010165 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:26.010314 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 40 D0318 14:42:26.010526 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:26.012715 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:26.012791 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 41 D0318 14:42:26.013044 182129 task_exit.go:204] [ 38788( 545): 38788( 545)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.013220 182129 task_signals.go:204] [ 38788( 545): 38792( 546)] Signal 9, PID: 38788, TID: 38792, fault addr: 0x0: terminating thread group D0318 14:42:26.013050 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:26.013620 182129 usertrap_amd64.go:212] [ 38791(1323): 38793(1324)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:26.013733 182129 usertrap_amd64.go:122] [ 38791(1323): 38793(1324)] Allocate a new trap: 0xc000681320 42 D0318 14:42:26.013867 182129 usertrap_amd64.go:225] [ 38791(1323): 38793(1324)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:26.014086 182129 task_exit.go:204] [ 38788( 545): 38792( 546)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.014489 182129 task_exit.go:204] [ 38788( 545): 38788( 545)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.020174 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:26.020293 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 40 D0318 14:42:26.020396 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:26.022585 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:26.022649 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 41 D0318 14:42:26.022830 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:26.023689 182129 task_exit.go:204] [ 38788( 545): 38792( 546)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.023817 182129 task_exit.go:204] [ 38788( 545): 38792( 546)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.024043 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.024563 182129 usertrap_amd64.go:212] [ 38789( 586): 38794( 587)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:26.024616 182129 usertrap_amd64.go:122] [ 38789( 586): 38794( 587)] Allocate a new trap: 0xc003f5fa10 42 D0318 14:42:26.024704 182129 usertrap_amd64.go:225] [ 38789( 586): 38794( 587)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:26.025639 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.025731 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 39 D0318 14:42:26.025793 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.025844 182129 usertrap_amd64.go:212] [ 38791(1323): 38791(1323)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:26.025907 182129 usertrap_amd64.go:122] [ 38791(1323): 38791(1323)] Allocate a new trap: 0xc000681320 43 D0318 14:42:26.026036 182129 usertrap_amd64.go:225] [ 38791(1323): 38791(1323)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:26.027702 182129 task_exit.go:204] [ 38788( 545): 38788( 545)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.027960 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.028180 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 40 D0318 14:42:26.028389 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.029528 182129 usertrap_amd64.go:212] [ 38790( 505): 38795( 506)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.030256 182129 usertrap_amd64.go:122] [ 38790( 505): 38795( 506)] Allocate a new trap: 0xc005d978c0 41 14:42:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) D0318 14:42:26.030568 182129 usertrap_amd64.go:225] [ 38790( 505): 38795( 506)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.032323 182129 usertrap_amd64.go:212] [ 38789( 586): 38789( 586)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:26.032374 182129 usertrap_amd64.go:122] [ 38789( 586): 38789( 586)] Allocate a new trap: 0xc003f5fa10 43 D0318 14:42:26.032537 182129 usertrap_amd64.go:225] [ 38789( 586): 38789( 586)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:26.034722 182129 usertrap_amd64.go:212] [ 38790( 505): 38790( 505)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.034808 182129 usertrap_amd64.go:122] [ 38790( 505): 38790( 505)] Allocate a new trap: 0xc005d978c0 42 D0318 14:42:26.034951 182129 usertrap_amd64.go:225] [ 38790( 505): 38790( 505)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.037231 182129 task_exit.go:204] [ 38791(1323): 38791(1323)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.038104 182129 task_signals.go:204] [ 38791(1323): 38793(1324)] Signal 9, PID: 38791, TID: 38793, fault addr: 0x0: terminating thread group D0318 14:42:26.038221 182129 task_exit.go:204] [ 38791(1323): 38791(1323)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.038605 182129 task_exit.go:204] [ 38791(1323): 38793(1324)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.040084 182129 task_exit.go:204] [ 38789( 586): 38789( 586)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.041039 182129 task_signals.go:204] [ 38789( 586): 38794( 587)] Signal 9, PID: 38789, TID: 38794, fault addr: 0x0: terminating thread group D0318 14:42:26.041222 182129 task_exit.go:204] [ 38789( 586): 38794( 587)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.041573 182129 task_exit.go:204] [ 38789( 586): 38789( 586)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.042951 182129 task_exit.go:204] [ 38790( 505): 38790( 505)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.044113 182129 task_exit.go:204] [ 38790( 505): 38790( 505)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.044475 182129 task_signals.go:204] [ 38790( 505): 38795( 506)] Signal 9, PID: 38790, TID: 38795, fault addr: 0x0: terminating thread group D0318 14:42:26.044745 182129 task_exit.go:204] [ 38790( 505): 38795( 506)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.047337 182129 task_exit.go:204] [ 38791(1323): 38793(1324)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.047445 182129 task_exit.go:204] [ 38791(1323): 38793(1324)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.047650 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:26.049678 182129 task_exit.go:204] [ 38791(1323): 38791(1323)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 1: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fecec0b314000000110880febb0007aafe80"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) D0318 14:42:26.054039 182129 task_exit.go:204] [ 38789( 586): 38794( 587)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.054221 182129 task_exit.go:204] [ 38789( 586): 38794( 587)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.054452 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:26.055673 182129 task_exit.go:204] [ 38789( 586): 38789( 586)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.057077 182129 task_exit.go:204] [ 38790( 505): 38795( 506)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.057176 182129 task_exit.go:204] [ 38790( 505): 38795( 506)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.057404 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.057639 182129 task_exit.go:204] [ 38790( 505): 38790( 505)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 3: ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xe2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_clone(0x84062421, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) 14:42:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'macvtap0\x00', 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYRES32=r1], 0xfffffdc8}, 0x0) ioctl$TUNSETNOCSUM(r3, 0x8914, 0x20000000) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000500)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) recvmsg$unix(r4, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES32=r4], 0x18}, 0x0) ioctl$TUNSETNOCSUM(r6, 0x8943, 0x20000000) D0318 14:42:26.075549 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.075703 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 36 D0318 14:42:26.076644 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.080987 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.081078 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 37 D0318 14:42:26.081224 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.086913 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:26.087011 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 37 D0318 14:42:26.088219 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:26.092452 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:26.092507 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 38 D0318 14:42:26.092637 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:26.097966 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:26.098211 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 37 D0318 14:42:26.099187 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:26.104120 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.104301 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 38 D0318 14:42:26.104496 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.105529 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:26.105605 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 38 D0318 14:42:26.105689 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:26.111755 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:26.111839 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 39 D0318 14:42:26.111959 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:26.115141 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.115208 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 39 D0318 14:42:26.115309 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.117499 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.117570 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 40 D0318 14:42:26.117632 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.117831 182129 usertrap_amd64.go:212] [ 38796( 547): 38800( 548)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.117890 182129 usertrap_amd64.go:122] [ 38796( 547): 38800( 548)] Allocate a new trap: 0xc000e68720 41 D0318 14:42:26.118009 182129 usertrap_amd64.go:225] [ 38796( 547): 38800( 548)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.122508 182129 usertrap_amd64.go:212] [ 38796( 547): 38796( 547)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.122584 182129 usertrap_amd64.go:122] [ 38796( 547): 38796( 547)] Allocate a new trap: 0xc000e68720 42 D0318 14:42:26.122637 182129 usertrap_amd64.go:225] [ 38796( 547): 38796( 547)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.128746 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.128873 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 36 D0318 14:42:26.130094 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.132197 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:26.132275 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 39 D0318 14:42:26.132383 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:26.134211 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:26.134340 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 40 D0318 14:42:26.134411 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:26.136308 182129 task_signals.go:204] [ 38796( 547): 38800( 548)] Signal 9, PID: 38796, TID: 38800, fault addr: 0x0: terminating thread group D0318 14:42:26.136897 182129 task_exit.go:204] [ 38796( 547): 38796( 547)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.137013 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:26.137081 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 41 D0318 14:42:26.137139 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:26.137244 182129 task_exit.go:204] [ 38796( 547): 38800( 548)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.137676 182129 usertrap_amd64.go:212] [ 38797(1325): 38801(1326)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:26.137817 182129 usertrap_amd64.go:122] [ 38797(1325): 38801(1326)] Allocate a new trap: 0xc005f00b10 42 D0318 14:42:26.137999 182129 usertrap_amd64.go:225] [ 38797(1325): 38801(1326)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:26.138305 182129 task_exit.go:204] [ 38796( 547): 38800( 548)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.138449 182129 task_exit.go:204] [ 38796( 547): 38800( 548)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.139208 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.139295 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 37 D0318 14:42:26.139352 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.144651 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:26.144754 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 40 D0318 14:42:26.144903 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:26.147508 182129 usertrap_amd64.go:212] [ 38797(1325): 38797(1325)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:26.147668 182129 usertrap_amd64.go:122] [ 38797(1325): 38797(1325)] Allocate a new trap: 0xc005f00b10 43 D0318 14:42:26.147842 182129 usertrap_amd64.go:225] [ 38797(1325): 38797(1325)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:26.148297 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:26.148400 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 41 D0318 14:42:26.148567 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:26.149278 182129 usertrap_amd64.go:212] [ 38798( 588): 38802( 589)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:26.149389 182129 task_exit.go:204] [ 38796( 547): 38796( 547)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.149526 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.149353 182129 usertrap_amd64.go:122] [ 38798( 588): 38802( 589)] Allocate a new trap: 0xc0014a4e10 42 D0318 14:42:26.149691 182129 usertrap_amd64.go:225] [ 38798( 588): 38802( 589)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:26.150021 182129 task_exit.go:204] [ 38796( 547): 38796( 547)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.153124 182129 task_exit.go:204] [ 38797(1325): 38797(1325)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x800454e0, &(0x7f0000000040)={0x0, 0x0}) D0318 14:42:26.154064 182129 task_exit.go:204] [ 38797(1325): 38797(1325)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.154294 182129 task_signals.go:204] [ 38797(1325): 38801(1326)] Signal 9, PID: 38797, TID: 38801, fault addr: 0x0: terminating thread group D0318 14:42:26.154426 182129 task_exit.go:204] [ 38797(1325): 38801(1326)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.164145 182129 task_exit.go:204] [ 38797(1325): 38801(1326)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.164223 182129 task_exit.go:204] [ 38797(1325): 38801(1326)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.164368 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:26.164660 182129 task_exit.go:204] [ 38797(1325): 38797(1325)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000040)) D0318 14:42:26.176636 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.176786 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 38 D0318 14:42:26.176896 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.181466 182129 usertrap_amd64.go:212] [ 38803( 590): 38803( 590)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:26.181596 182129 usertrap_amd64.go:122] [ 38803( 590): 38803( 590)] Allocate a new trap: 0xc0043f08d0 43 D0318 14:42:26.192193 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.192286 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 39 D0318 14:42:26.192372 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.194824 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.194976 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 40 D0318 14:42:26.195147 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.195195 182129 usertrap_amd64.go:225] [ 38803( 590): 38803( 590)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:26.195520 182129 usertrap_amd64.go:212] [ 38799( 507): 38805( 508)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.195651 182129 usertrap_amd64.go:122] [ 38799( 507): 38805( 508)] Allocate a new trap: 0xc000881380 41 D0318 14:42:26.195757 182129 usertrap_amd64.go:225] [ 38799( 507): 38805( 508)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.204012 182129 usertrap_amd64.go:212] [ 38799( 507): 38799( 507)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.204192 182129 usertrap_amd64.go:122] [ 38799( 507): 38799( 507)] Allocate a new trap: 0xc000881380 42 D0318 14:42:26.204334 182129 usertrap_amd64.go:225] [ 38799( 507): 38799( 507)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.207317 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.207445 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 36 D0318 14:42:26.208609 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.212415 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:26.212578 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 37 D0318 14:42:26.213067 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.213188 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 37 D0318 14:42:26.213286 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.213433 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:26.218004 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:26.218079 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 38 D0318 14:42:26.218174 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:26.225242 182129 task_exit.go:204] [ 38799( 507): 38799( 507)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.225582 182129 task_signals.go:204] [ 38799( 507): 38805( 508)] Signal 9, PID: 38799, TID: 38805, fault addr: 0x0: terminating thread group D0318 14:42:26.226254 182129 task_exit.go:204] [ 38799( 507): 38805( 508)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.226676 182129 task_exit.go:204] [ 38799( 507): 38799( 507)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.230134 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.230264 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 38 D0318 14:42:26.230369 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.233696 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:26.233768 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 39 D0318 14:42:26.233899 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:26.238693 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.238804 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 39 D0318 14:42:26.238926 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.241032 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.241294 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 40 D0318 14:42:26.241431 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.241677 182129 usertrap_amd64.go:212] [ 38804( 549): 38807( 550)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.241766 182129 usertrap_amd64.go:122] [ 38804( 549): 38807( 550)] Allocate a new trap: 0xc00e84e9f0 41 D0318 14:42:26.241855 182129 usertrap_amd64.go:225] [ 38804( 549): 38807( 550)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.244738 182129 task_exit.go:204] [ 38799( 507): 38805( 508)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.244808 182129 task_exit.go:204] [ 38799( 507): 38805( 508)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.244941 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.245143 182129 task_exit.go:204] [ 38799( 507): 38799( 507)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2040) D0318 14:42:26.247170 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:26.247246 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 40 D0318 14:42:26.247314 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:26.249147 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:26.249207 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 41 D0318 14:42:26.249262 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:26.249907 182129 usertrap_amd64.go:212] [ 38806(1327): 38808(1328)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:26.250011 182129 usertrap_amd64.go:122] [ 38806(1327): 38808(1328)] Allocate a new trap: 0xc0043f0900 42 D0318 14:42:26.250117 182129 usertrap_amd64.go:225] [ 38806(1327): 38808(1328)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:26.252315 182129 usertrap_amd64.go:212] [ 38804( 549): 38804( 549)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.252503 182129 usertrap_amd64.go:122] [ 38804( 549): 38804( 549)] Allocate a new trap: 0xc00e84e9f0 42 D0318 14:42:26.252714 182129 usertrap_amd64.go:225] [ 38804( 549): 38804( 549)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.253148 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:26.253340 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 43 D0318 14:42:26.253736 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:26.257666 182129 usertrap_amd64.go:212] [ 38806(1327): 38806(1327)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:26.257757 182129 usertrap_amd64.go:122] [ 38806(1327): 38806(1327)] Allocate a new trap: 0xc0043f0900 43 D0318 14:42:26.257829 182129 usertrap_amd64.go:225] [ 38806(1327): 38806(1327)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:26.264557 182129 task_exit.go:204] [ 38804( 549): 38804( 549)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.264860 182129 task_signals.go:204] [ 38804( 549): 38807( 550)] Signal 9, PID: 38804, TID: 38807, fault addr: 0x0: terminating thread group D0318 14:42:26.265713 182129 task_exit.go:204] [ 38804( 549): 38804( 549)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.265866 182129 task_exit.go:204] [ 38804( 549): 38807( 550)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.266334 182129 task_exit.go:204] [ 38806(1327): 38806(1327)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.266609 182129 task_signals.go:204] [ 38806(1327): 38808(1328)] Signal 9, PID: 38806, TID: 38808, fault addr: 0x0: terminating thread group D0318 14:42:26.267453 182129 task_exit.go:204] [ 38806(1327): 38806(1327)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.267792 182129 task_exit.go:204] [ 38806(1327): 38808(1328)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.275065 182129 task_exit.go:204] [ 38804( 549): 38807( 550)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.275189 182129 task_exit.go:204] [ 38804( 549): 38807( 550)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.275294 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.276139 182129 task_exit.go:204] [ 38806(1327): 38808(1328)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.276218 182129 task_exit.go:204] [ 38806(1327): 38808(1328)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.276372 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:26.279509 182129 task_exit.go:204] [ 38804( 549): 38804( 549)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.280134 182129 task_exit.go:204] [ 38806(1327): 38806(1327)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) 14:42:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001f00), 0x0, 0x0) r1 = epoll_create(0xd) epoll_pwait2(r1, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) D0318 14:42:26.286467 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.286648 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 36 D0318 14:42:26.287826 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.299145 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.299240 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 37 D0318 14:42:26.299342 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.317265 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.317384 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 38 D0318 14:42:26.317539 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.321466 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:26.321568 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 37 D0318 14:42:26.322591 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:26.329088 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:26.329173 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 38 D0318 14:42:26.329236 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:26.331517 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.331643 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 39 D0318 14:42:26.331770 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.333905 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.334065 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 40 D0318 14:42:26.334287 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.334986 182129 usertrap_amd64.go:212] [ 38809( 509): 38812( 510)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.335076 182129 usertrap_amd64.go:122] [ 38809( 509): 38812( 510)] Allocate a new trap: 0xc000881410 41 D0318 14:42:26.335220 182129 usertrap_amd64.go:225] [ 38809( 509): 38812( 510)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.338196 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.338267 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 36 D0318 14:42:26.339281 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.341754 182129 usertrap_amd64.go:212] [ 38809( 509): 38809( 509)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.341945 182129 usertrap_amd64.go:122] [ 38809( 509): 38809( 509)] Allocate a new trap: 0xc000881410 42 D0318 14:42:26.342148 182129 usertrap_amd64.go:225] [ 38809( 509): 38809( 509)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.344645 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.344726 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 37 D0318 14:42:26.344806 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.351282 182129 task_exit.go:204] [ 38803( 590): 38803( 590)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.352394 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:26.352520 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 39 D0318 14:42:26.352616 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:26.352944 182129 task_exit.go:204] [ 38809( 509): 38809( 509)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.353198 182129 task_signals.go:204] [ 38809( 509): 38812( 510)] Signal 9, PID: 38809, TID: 38812, fault addr: 0x0: terminating thread group D0318 14:42:26.354152 182129 task_exit.go:204] [ 38809( 509): 38809( 509)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.354458 182129 task_exit.go:204] [ 38809( 509): 38812( 510)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.364288 182129 task_exit.go:204] [ 38809( 509): 38812( 510)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.364424 182129 task_exit.go:204] [ 38809( 509): 38812( 510)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.364549 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.366678 182129 task_exit.go:204] [ 38809( 509): 38809( 509)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.367886 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.368073 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 38 D0318 14:42:26.368374 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) 14:42:26 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001a80)={0x77359400}) D0318 14:42:26.369558 182129 task_exit.go:204] [ 38803( 590): 38803( 590)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.369777 182129 task_signals.go:470] [ 38798( 588): 38798( 588)] Notified of signal 33 D0318 14:42:26.369990 182129 task_signals.go:176] [ 38798( 588): 38798( 588)] Not restarting syscall 230 after error interrupted by signal: interrupted by signal 33 D0318 14:42:26.370082 182129 task_signals.go:220] [ 38798( 588): 38798( 588)] Signal 33: delivering to handler D0318 14:42:26.371486 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:26.371679 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 40 D0318 14:42:26.371796 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:26.374188 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:26.374356 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 41 D0318 14:42:26.374476 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:26.374694 182129 usertrap_amd64.go:212] [ 38810(1329): 38813(1330)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:26.374765 182129 usertrap_amd64.go:122] [ 38810(1329): 38813(1330)] Allocate a new trap: 0xc003f5fad0 42 D0318 14:42:26.374855 182129 usertrap_amd64.go:225] [ 38810(1329): 38813(1330)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:26.392193 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.392299 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 39 D0318 14:42:26.392365 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.394563 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.394623 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 40 D0318 14:42:26.394712 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.395111 182129 usertrap_amd64.go:212] [ 38811( 551): 38814( 552)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.395261 182129 usertrap_amd64.go:122] [ 38811( 551): 38814( 552)] Allocate a new trap: 0xc005f00b70 41 D0318 14:42:26.395366 182129 usertrap_amd64.go:225] [ 38811( 551): 38814( 552)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.401379 182129 usertrap_amd64.go:212] [ 38811( 551): 38814( 552)] Found the pattern at ip 556d17c46999:sysno 257 D0318 14:42:26.401583 182129 usertrap_amd64.go:122] [ 38811( 551): 38814( 552)] Allocate a new trap: 0xc005f00b70 42 D0318 14:42:26.401766 182129 usertrap_amd64.go:225] [ 38811( 551): 38814( 552)] Apply the binary patch addr 556d17c46999 trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.407822 182129 usertrap_amd64.go:212] [ 38811( 551): 38811( 551)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.407975 182129 usertrap_amd64.go:122] [ 38811( 551): 38811( 551)] Allocate a new trap: 0xc005f00b70 43 D0318 14:42:26.408058 182129 usertrap_amd64.go:225] [ 38811( 551): 38811( 551)] Apply the binary patch addr 556d17c46c93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 14:42:26.410090 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.410734 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 36 D0318 14:42:26.412136 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.412428 182129 task_exit.go:204] [ 38811( 551): 38811( 551)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.413497 182129 task_exit.go:204] [ 38811( 551): 38811( 551)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.413927 182129 task_signals.go:204] [ 38811( 551): 38814( 552)] Signal 9, PID: 38811, TID: 38814, fault addr: 0x0: terminating thread group D0318 14:42:26.414712 182129 task_exit.go:204] [ 38811( 551): 38814( 552)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.422493 182129 task_exit.go:204] [ 38811( 551): 38814( 552)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.422630 182129 task_exit.go:204] [ 38811( 551): 38814( 552)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.422827 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.424218 182129 task_exit.go:204] [ 38811( 551): 38811( 551)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.424247 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.424362 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 37 D0318 14:42:26.424496 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 14:42:26 executing program 2: ppoll(0x0, 0x10, &(0x7f0000002100), 0x0, 0x53) D0318 14:42:26.434117 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d58640d1ae:sysno 230 D0318 14:42:26.434248 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 43 D0318 14:42:26.434379 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d58640d1ae trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:26.460929 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.461098 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 38 D0318 14:42:26.461237 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.464780 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.464885 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 36 D0318 14:42:26.466017 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.472452 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.472610 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 37 D0318 14:42:26.472705 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.477300 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.477417 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 39 D0318 14:42:26.477489 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.479201 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.479295 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 40 D0318 14:42:26.479394 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.480096 182129 usertrap_amd64.go:212] [ 38815( 511): 38818( 512)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.480374 182129 usertrap_amd64.go:122] [ 38815( 511): 38818( 512)] Allocate a new trap: 0xc005d97920 41 D0318 14:42:26.480845 182129 usertrap_amd64.go:225] [ 38815( 511): 38818( 512)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.482449 182129 usertrap_amd64.go:212] [ 38815( 511): 38815( 511)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.482544 182129 usertrap_amd64.go:122] [ 38815( 511): 38815( 511)] Allocate a new trap: 0xc005d97920 42 D0318 14:42:26.482660 182129 usertrap_amd64.go:225] [ 38815( 511): 38815( 511)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.491825 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.491970 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 38 D0318 14:42:26.492100 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.493036 182129 task_exit.go:204] [ 38815( 511): 38815( 511)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.494190 182129 task_signals.go:204] [ 38815( 511): 38818( 512)] Signal 9, PID: 38815, TID: 38818, fault addr: 0x0: terminating thread group D0318 14:42:26.494314 182129 task_exit.go:204] [ 38815( 511): 38815( 511)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.494623 182129 task_exit.go:204] [ 38815( 511): 38818( 512)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.504866 182129 task_exit.go:204] [ 38815( 511): 38818( 512)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.505082 182129 task_exit.go:204] [ 38815( 511): 38818( 512)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.505233 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.506650 182129 task_exit.go:204] [ 38815( 511): 38815( 511)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.506928 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.508048 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 39 D0318 14:42:26.508153 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) 14:42:26 executing program 0: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) D0318 14:42:26.510806 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.511085 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 40 D0318 14:42:26.511202 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.511477 182129 usertrap_amd64.go:212] [ 38817( 553): 38819( 554)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.511570 182129 usertrap_amd64.go:122] [ 38817( 553): 38819( 554)] Allocate a new trap: 0xc0008814d0 41 D0318 14:42:26.511683 182129 usertrap_amd64.go:225] [ 38817( 553): 38819( 554)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.514550 182129 usertrap_amd64.go:212] [ 38817( 553): 38817( 553)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.514623 182129 usertrap_amd64.go:122] [ 38817( 553): 38817( 553)] Allocate a new trap: 0xc0008814d0 42 D0318 14:42:26.514777 182129 usertrap_amd64.go:225] [ 38817( 553): 38817( 553)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.527375 182129 task_exit.go:204] [ 38817( 553): 38817( 553)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.528239 182129 task_signals.go:204] [ 38817( 553): 38819( 554)] Signal 9, PID: 38817, TID: 38819, fault addr: 0x0: terminating thread group D0318 14:42:26.528295 182129 task_exit.go:204] [ 38817( 553): 38817( 553)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.528404 182129 task_exit.go:204] [ 38817( 553): 38819( 554)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.537821 182129 task_exit.go:204] [ 38817( 553): 38819( 554)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.537962 182129 task_exit.go:204] [ 38817( 553): 38819( 554)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.538140 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.540149 182129 task_exit.go:204] [ 38817( 553): 38817( 553)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 2: r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/130, 0x82}], 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/30, 0x1e}, {0x0}], 0x2, 0x0) D0318 14:42:26.568705 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.568972 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 36 D0318 14:42:26.570133 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.587344 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.587462 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 36 D0318 14:42:26.588488 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.589532 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.589669 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 37 D0318 14:42:26.589911 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.595572 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.595760 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 37 D0318 14:42:26.595867 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.607414 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.607582 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 38 D0318 14:42:26.608076 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.614470 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.614545 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 38 D0318 14:42:26.614621 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.619564 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.619672 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 39 D0318 14:42:26.619802 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.621810 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.621905 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 40 D0318 14:42:26.621992 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.622288 182129 usertrap_amd64.go:212] [ 38820( 513): 38822( 514)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.622336 182129 usertrap_amd64.go:122] [ 38820( 513): 38822( 514)] Allocate a new trap: 0xc003f5fb00 41 D0318 14:42:26.622496 182129 usertrap_amd64.go:225] [ 38820( 513): 38822( 514)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.624187 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.624248 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 39 D0318 14:42:26.624349 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.626543 182129 usertrap_amd64.go:212] [ 38820( 513): 38820( 513)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.626602 182129 usertrap_amd64.go:122] [ 38820( 513): 38820( 513)] Allocate a new trap: 0xc003f5fb00 42 D0318 14:42:26.626692 182129 usertrap_amd64.go:225] [ 38820( 513): 38820( 513)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.627209 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.627299 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 40 D0318 14:42:26.627428 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.627941 182129 usertrap_amd64.go:212] [ 38821( 555): 38823( 556)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.628028 182129 usertrap_amd64.go:122] [ 38821( 555): 38823( 556)] Allocate a new trap: 0xc005f00ba0 41 D0318 14:42:26.628123 182129 usertrap_amd64.go:225] [ 38821( 555): 38823( 556)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.631903 182129 usertrap_amd64.go:212] [ 38821( 555): 38821( 555)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.631969 182129 usertrap_amd64.go:122] [ 38821( 555): 38821( 555)] Allocate a new trap: 0xc005f00ba0 42 D0318 14:42:26.632092 182129 usertrap_amd64.go:225] [ 38821( 555): 38821( 555)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.638201 182129 task_exit.go:204] [ 38820( 513): 38820( 513)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.638566 182129 task_signals.go:204] [ 38820( 513): 38822( 514)] Signal 9, PID: 38820, TID: 38822, fault addr: 0x0: terminating thread group D0318 14:42:26.639349 182129 task_exit.go:204] [ 38820( 513): 38822( 514)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.639779 182129 task_exit.go:204] [ 38820( 513): 38820( 513)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.641519 182129 task_exit.go:204] [ 38821( 555): 38821( 555)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.641852 182129 task_signals.go:204] [ 38821( 555): 38823( 556)] Signal 9, PID: 38821, TID: 38823, fault addr: 0x0: terminating thread group D0318 14:42:26.642558 182129 task_exit.go:204] [ 38821( 555): 38821( 555)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.642762 182129 task_exit.go:204] [ 38821( 555): 38823( 556)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.649418 182129 task_exit.go:204] [ 38820( 513): 38822( 514)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.649515 182129 task_exit.go:204] [ 38820( 513): 38822( 514)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.649689 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.649869 182129 task_exit.go:204] [ 38820( 513): 38820( 513)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.651764 182129 task_exit.go:204] [ 38821( 555): 38823( 556)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.651984 182129 task_exit.go:204] [ 38821( 555): 38823( 556)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.652156 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 14:42:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005880)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000d00)=@abs, 0x6e, 0x0}}], 0x2, 0x0) D0318 14:42:26.653319 182129 task_exit.go:204] [ 38821( 555): 38821( 555)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="d178d68a50475aa2b89a6ec1cb79e1d2571a56f8ea82c97aa86984339ebe07fb09", 0x21, r0) D0318 14:42:26.684318 182129 task_signals.go:470] [ 7: 34823] Notified of signal 23 D0318 14:42:26.684951 182129 task_signals.go:220] [ 7: 34823] Signal 23: delivering to handler D0318 14:42:26.695713 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.695870 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 36 D0318 14:42:26.696962 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.702329 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.702429 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 37 D0318 14:42:26.702687 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.705041 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.705216 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 36 D0318 14:42:26.706324 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.711784 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.712800 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 37 D0318 14:42:26.713020 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.722273 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.722805 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 38 D0318 14:42:26.722946 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.731319 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.731719 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 38 D0318 14:42:26.731831 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.740294 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.740365 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 39 D0318 14:42:26.740452 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.743159 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.743240 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 39 D0318 14:42:26.743309 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.744096 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.744165 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 40 D0318 14:42:26.744248 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.744856 182129 usertrap_amd64.go:212] [ 38824( 515): 38826( 516)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.744951 182129 usertrap_amd64.go:122] [ 38824( 515): 38826( 516)] Allocate a new trap: 0xc000428b40 41 D0318 14:42:26.745035 182129 usertrap_amd64.go:225] [ 38824( 515): 38826( 516)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.745776 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.745969 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 40 D0318 14:42:26.746102 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.746330 182129 usertrap_amd64.go:212] [ 38825( 557): 38827( 558)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.746399 182129 usertrap_amd64.go:122] [ 38825( 557): 38827( 558)] Allocate a new trap: 0xc005d97950 41 D0318 14:42:26.746495 182129 usertrap_amd64.go:225] [ 38825( 557): 38827( 558)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.749410 182129 usertrap_amd64.go:212] [ 38825( 557): 38825( 557)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.749509 182129 usertrap_amd64.go:122] [ 38825( 557): 38825( 557)] Allocate a new trap: 0xc005d97950 42 D0318 14:42:26.749604 182129 usertrap_amd64.go:225] [ 38825( 557): 38825( 557)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.753832 182129 usertrap_amd64.go:212] [ 38824( 515): 38824( 515)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.753894 182129 usertrap_amd64.go:122] [ 38824( 515): 38824( 515)] Allocate a new trap: 0xc000428b40 42 D0318 14:42:26.753959 182129 usertrap_amd64.go:225] [ 38824( 515): 38824( 515)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.754749 182129 task_exit.go:204] [ 38825( 557): 38825( 557)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.755450 182129 task_signals.go:204] [ 38825( 557): 38827( 558)] Signal 9, PID: 38825, TID: 38827, fault addr: 0x0: terminating thread group D0318 14:42:26.755559 182129 task_exit.go:204] [ 38825( 557): 38825( 557)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.755739 182129 task_exit.go:204] [ 38825( 557): 38827( 558)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.758629 182129 task_exit.go:204] [ 38824( 515): 38824( 515)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.759255 182129 task_exit.go:204] [ 38824( 515): 38824( 515)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.759587 182129 task_signals.go:204] [ 38824( 515): 38826( 516)] Signal 9, PID: 38824, TID: 38826, fault addr: 0x0: terminating thread group D0318 14:42:26.759837 182129 task_exit.go:204] [ 38824( 515): 38826( 516)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.762229 182129 task_exit.go:204] [ 38825( 557): 38827( 558)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.762285 182129 task_exit.go:204] [ 38825( 557): 38827( 558)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.762382 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.764698 182129 task_exit.go:204] [ 38825( 557): 38825( 557)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 2: r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/130, 0x82}], 0x1, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)=""/2, 0x2}], 0x2, 0x0) D0318 14:42:26.768268 182129 task_exit.go:204] [ 38824( 515): 38826( 516)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.768364 182129 task_exit.go:204] [ 38824( 515): 38826( 516)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.768491 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.768777 182129 task_exit.go:204] [ 38824( 515): 38824( 515)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 0: open$dir(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) D0318 14:42:26.810010 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.810204 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 36 D0318 14:42:26.811284 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.815064 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.815143 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 37 D0318 14:42:26.815213 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.822704 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.822855 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 36 D0318 14:42:26.823866 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.828407 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.828493 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 37 D0318 14:42:26.828663 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.831575 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.831735 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 38 D0318 14:42:26.831809 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.840130 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.840326 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 39 D0318 14:42:26.840395 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.842075 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.842171 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 40 D0318 14:42:26.842233 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.842562 182129 usertrap_amd64.go:212] [ 38828( 559): 38830( 560)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.842696 182129 usertrap_amd64.go:122] [ 38828( 559): 38830( 560)] Allocate a new trap: 0xc0043f0960 41 D0318 14:42:26.842802 182129 usertrap_amd64.go:225] [ 38828( 559): 38830( 560)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.845746 182129 usertrap_amd64.go:212] [ 38828( 559): 38828( 559)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.845878 182129 usertrap_amd64.go:122] [ 38828( 559): 38828( 559)] Allocate a new trap: 0xc0043f0960 42 D0318 14:42:26.846008 182129 usertrap_amd64.go:225] [ 38828( 559): 38828( 559)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.846463 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.846547 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 38 D0318 14:42:26.846625 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.850805 182129 task_exit.go:204] [ 38828( 559): 38828( 559)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.851017 182129 task_signals.go:204] [ 38828( 559): 38830( 560)] Signal 9, PID: 38828, TID: 38830, fault addr: 0x0: terminating thread group D0318 14:42:26.851806 182129 task_exit.go:204] [ 38828( 559): 38830( 560)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.852234 182129 task_exit.go:204] [ 38828( 559): 38828( 559)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.858397 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.858481 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 39 D0318 14:42:26.858614 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.859821 182129 task_exit.go:204] [ 38828( 559): 38830( 560)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.860137 182129 task_exit.go:204] [ 38828( 559): 38830( 560)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.860253 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.861939 182129 task_exit.go:204] [ 38828( 559): 38828( 559)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.862006 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.862297 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 40 D0318 14:42:26.862430 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.862731 182129 usertrap_amd64.go:212] [ 38829( 517): 38831( 518)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.863074 182129 usertrap_amd64.go:122] [ 38829( 517): 38831( 518)] Allocate a new trap: 0xc003f5fb60 41 D0318 14:42:26.863264 182129 usertrap_amd64.go:225] [ 38829( 517): 38831( 518)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) 14:42:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') read$FUSE(r0, &(0x7f00000043c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) D0318 14:42:26.868210 182129 usertrap_amd64.go:212] [ 38829( 517): 38829( 517)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.868281 182129 usertrap_amd64.go:122] [ 38829( 517): 38829( 517)] Allocate a new trap: 0xc003f5fb60 42 D0318 14:42:26.868391 182129 usertrap_amd64.go:225] [ 38829( 517): 38829( 517)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:26.876078 182129 task_exit.go:204] [ 38829( 517): 38829( 517)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.877069 182129 task_signals.go:204] [ 38829( 517): 38831( 518)] Signal 9, PID: 38829, TID: 38831, fault addr: 0x0: terminating thread group D0318 14:42:26.877183 182129 task_exit.go:204] [ 38829( 517): 38829( 517)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.877374 182129 task_exit.go:204] [ 38829( 517): 38831( 518)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.885385 182129 task_exit.go:204] [ 38829( 517): 38831( 518)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.885530 182129 task_exit.go:204] [ 38829( 517): 38831( 518)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.885646 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:26.886019 182129 task_exit.go:204] [ 38829( 517): 38829( 517)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:26 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x8000000000000003}) D0318 14:42:26.902294 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:26.902418 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 36 D0318 14:42:26.903362 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:26.907262 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:26.907329 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 37 D0318 14:42:26.907428 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:26.927385 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:26.927510 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 38 D0318 14:42:26.927479 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:26.927679 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:26.927739 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 36 D0318 14:42:26.928845 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:26.934155 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:26.934291 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 37 D0318 14:42:26.934376 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:26.935437 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:26.935585 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 39 D0318 14:42:26.935855 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:26.938291 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:26.938491 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 40 D0318 14:42:26.938780 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:26.939018 182129 usertrap_amd64.go:212] [ 38832( 561): 38834( 562)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:26.939227 182129 usertrap_amd64.go:122] [ 38832( 561): 38834( 562)] Allocate a new trap: 0xc000881590 41 D0318 14:42:26.939431 182129 usertrap_amd64.go:225] [ 38832( 561): 38834( 562)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:26.948301 182129 usertrap_amd64.go:212] [ 38832( 561): 38834( 562)] Found the pattern at ip 556d17c46999:sysno 257 D0318 14:42:26.948381 182129 usertrap_amd64.go:122] [ 38832( 561): 38834( 562)] Allocate a new trap: 0xc000881590 42 D0318 14:42:26.948469 182129 usertrap_amd64.go:225] [ 38832( 561): 38834( 562)] Apply the binary patch addr 556d17c46999 trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:26.956677 182129 usertrap_amd64.go:212] [ 38832( 561): 38832( 561)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:26.956763 182129 usertrap_amd64.go:122] [ 38832( 561): 38832( 561)] Allocate a new trap: 0xc000881590 43 D0318 14:42:26.956877 182129 usertrap_amd64.go:225] [ 38832( 561): 38832( 561)] Apply the binary patch addr 556d17c46c93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 14:42:26.957179 182129 usertrap_amd64.go:212] [ 38798( 588): 38798( 588)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:26.957406 182129 usertrap_amd64.go:122] [ 38798( 588): 38798( 588)] Allocate a new trap: 0xc0014a4e10 44 D0318 14:42:26.957773 182129 usertrap_amd64.go:225] [ 38798( 588): 38798( 588)] Apply the binary patch addr 55ff40476c93 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0318 14:42:26.961503 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:26.961590 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 38 D0318 14:42:26.961690 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:26.962667 182129 task_exit.go:204] [ 38832( 561): 38832( 561)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.962872 182129 task_signals.go:204] [ 38832( 561): 38834( 562)] Signal 9, PID: 38832, TID: 38834, fault addr: 0x0: terminating thread group D0318 14:42:26.963674 182129 task_exit.go:204] [ 38832( 561): 38832( 561)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.964505 182129 task_exit.go:204] [ 38832( 561): 38834( 562)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.968000 182129 task_exit.go:204] [ 38798( 588): 38798( 588)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.968354 182129 task_signals.go:204] [ 38798( 588): 38802( 589)] Signal 9, PID: 38798, TID: 38802, fault addr: 0x0: terminating thread group D0318 14:42:26.969344 182129 task_exit.go:204] [ 38798( 588): 38798( 588)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.969845 182129 task_exit.go:204] [ 38798( 588): 38802( 589)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.975360 182129 task_exit.go:204] [ 38832( 561): 38834( 562)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.975467 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:26.975810 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 39 D0318 14:42:26.976003 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:26.975678 182129 task_exit.go:204] [ 38832( 561): 38834( 562)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.976287 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:26.978647 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:26.978732 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 40 D0318 14:42:26.978826 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:26.979208 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:26.979349 182129 task_exit.go:204] [ 38798( 588): 38802( 589)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.979405 182129 usertrap_amd64.go:212] [ 38833( 519): 38835( 520)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:26.979518 182129 usertrap_amd64.go:122] [ 38833( 519): 38835( 520)] Allocate a new trap: 0xc000e687b0 41 D0318 14:42:26.979425 182129 task_exit.go:204] [ 38798( 588): 38802( 589)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.979717 182129 usertrap_amd64.go:225] [ 38833( 519): 38835( 520)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:26.979825 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:26.980041 182129 task_exit.go:204] [ 38832( 561): 38832( 561)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.980548 182129 task_exit.go:204] [ 38798( 588): 38798( 588)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.981715 182129 usertrap_amd64.go:212] [ 38833( 519): 38833( 519)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:26.981830 182129 usertrap_amd64.go:122] [ 38833( 519): 38833( 519)] Allocate a new trap: 0xc000e687b0 42 D0318 14:42:26.981951 182129 usertrap_amd64.go:225] [ 38833( 519): 38833( 519)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 14:42:26 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x6, 0x0, 0x0) 14:42:26 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) ftruncate(r0, 0x0) D0318 14:42:26.990514 182129 task_exit.go:204] [ 38833( 519): 38833( 519)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.991362 182129 task_signals.go:204] [ 38833( 519): 38835( 520)] Signal 9, PID: 38833, TID: 38835, fault addr: 0x0: terminating thread group D0318 14:42:26.991549 182129 task_exit.go:204] [ 38833( 519): 38835( 520)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:26.991670 182129 task_exit.go:204] [ 38833( 519): 38833( 519)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.999573 182129 task_exit.go:204] [ 38833( 519): 38835( 520)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:26.999747 182129 task_exit.go:204] [ 38833( 519): 38835( 520)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:26.999874 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.000032 182129 task_exit.go:204] [ 38833( 519): 38833( 519)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000100)="08001efbb07d586e", 0x8}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) D0318 14:42:27.012130 182129 task_exit.go:204] [ 38803( 590): 38803( 590)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.021381 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.021646 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 37 D0318 14:42:27.022736 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.035587 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.035711 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 38 D0318 14:42:27.035789 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.042457 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.042639 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 36 D0318 14:42:27.043808 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.046119 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.046331 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 36 D0318 14:42:27.047325 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.049625 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.049719 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 37 D0318 14:42:27.049821 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.058404 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.058482 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 37 D0318 14:42:27.058564 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.064018 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.064260 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 39 D0318 14:42:27.064418 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.066117 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.066183 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 38 D0318 14:42:27.066258 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.078568 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.078669 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 40 D0318 14:42:27.078771 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.079301 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.081481 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.083975 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 41 D0318 14:42:27.084184 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.083757 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 39 D0318 14:42:27.084490 182129 usertrap_amd64.go:212] [ 38836( 591): 38839( 592)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.082192 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.084635 182129 usertrap_amd64.go:122] [ 38836( 591): 38839( 592)] Allocate a new trap: 0xc003f5fb90 42 D0318 14:42:27.084670 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 38 D0318 14:42:27.084753 182129 usertrap_amd64.go:225] [ 38836( 591): 38839( 592)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.084835 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.084863 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.088278 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.088400 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 40 D0318 14:42:27.088484 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.088642 182129 usertrap_amd64.go:212] [ 38837( 563): 38840( 564)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.088740 182129 usertrap_amd64.go:122] [ 38837( 563): 38840( 564)] Allocate a new trap: 0xc00063e3f0 41 D0318 14:42:27.088809 182129 usertrap_amd64.go:225] [ 38837( 563): 38840( 564)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.088882 182129 usertrap_amd64.go:212] [ 38836( 591): 38836( 591)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.089000 182129 usertrap_amd64.go:122] [ 38836( 591): 38836( 591)] Allocate a new trap: 0xc003f5fb90 43 D0318 14:42:27.089117 182129 usertrap_amd64.go:225] [ 38836( 591): 38836( 591)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.091863 182129 usertrap_amd64.go:212] [ 38837( 563): 38837( 563)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.092049 182129 usertrap_amd64.go:122] [ 38837( 563): 38837( 563)] Allocate a new trap: 0xc00063e3f0 42 D0318 14:42:27.092253 182129 usertrap_amd64.go:225] [ 38837( 563): 38837( 563)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.099555 182129 task_exit.go:204] [ 38837( 563): 38837( 563)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.100507 182129 task_exit.go:204] [ 38837( 563): 38837( 563)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.100492 182129 task_signals.go:204] [ 38837( 563): 38840( 564)] Signal 9, PID: 38837, TID: 38840, fault addr: 0x0: terminating thread group D0318 14:42:27.100644 182129 task_exit.go:204] [ 38837( 563): 38840( 564)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.101186 182129 task_exit.go:204] [ 38836( 591): 38836( 591)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.102119 182129 task_signals.go:204] [ 38836( 591): 38839( 592)] Signal 9, PID: 38836, TID: 38839, fault addr: 0x0: terminating thread group D0318 14:42:27.102270 182129 task_exit.go:204] [ 38836( 591): 38836( 591)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.102495 182129 task_exit.go:204] [ 38836( 591): 38839( 592)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.105278 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.105385 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 39 D0318 14:42:27.105459 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.108017 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.108099 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 40 D0318 14:42:27.108226 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.109585 182129 task_exit.go:204] [ 38837( 563): 38840( 564)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.109641 182129 task_exit.go:204] [ 38837( 563): 38840( 564)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.109764 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.110130 182129 task_exit.go:204] [ 38837( 563): 38837( 563)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.111581 182129 task_exit.go:204] [ 38836( 591): 38839( 592)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.111678 182129 task_exit.go:204] [ 38836( 591): 38839( 592)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.111805 182129 usertrap_amd64.go:212] [ 38838( 521): 38841( 522)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.111856 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.111914 182129 usertrap_amd64.go:122] [ 38838( 521): 38841( 522)] Allocate a new trap: 0xc003f5fbc0 41 D0318 14:42:27.111978 182129 usertrap_amd64.go:225] [ 38838( 521): 38841( 522)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.111972 182129 task_exit.go:204] [ 38836( 591): 38836( 591)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005040), 0x0, 0x0) read(r0, &(0x7f0000005080)=""/4096, 0x1000) 14:42:27 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)) D0318 14:42:27.121125 182129 usertrap_amd64.go:212] [ 38838( 521): 38838( 521)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.121220 182129 usertrap_amd64.go:122] [ 38838( 521): 38838( 521)] Allocate a new trap: 0xc003f5fbc0 42 D0318 14:42:27.121305 182129 usertrap_amd64.go:225] [ 38838( 521): 38838( 521)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.124774 182129 task_exit.go:204] [ 38838( 521): 38838( 521)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.124891 182129 task_signals.go:204] [ 38838( 521): 38841( 522)] Signal 9, PID: 38838, TID: 38841, fault addr: 0x0: terminating thread group D0318 14:42:27.125567 182129 task_exit.go:204] [ 38838( 521): 38838( 521)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.125717 182129 task_exit.go:204] [ 38838( 521): 38841( 522)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.132957 182129 task_exit.go:204] [ 38838( 521): 38841( 522)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.133045 182129 task_exit.go:204] [ 38838( 521): 38841( 522)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.133157 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.133482 182129 task_exit.go:204] [ 38838( 521): 38838( 521)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 0: r0 = semget(0x3, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x9, &(0x7f00000000c0)) D0318 14:42:27.158190 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.158286 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 36 D0318 14:42:27.159118 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.159287 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 37 D0318 14:42:27.159259 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.160721 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.164455 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.164546 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 37 D0318 14:42:27.164601 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.165438 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.165500 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 38 D0318 14:42:27.165605 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.180234 182129 usertrap_amd64.go:212] [ 38810(1329): 38810(1329)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.180324 182129 usertrap_amd64.go:122] [ 38810(1329): 38810(1329)] Allocate a new trap: 0xc003f5fad0 44 D0318 14:42:27.180548 182129 usertrap_amd64.go:225] [ 38810(1329): 38810(1329)] Apply the binary patch addr 55d5863e0c93 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0318 14:42:27.184703 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.184856 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 38 D0318 14:42:27.185003 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.189931 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.190029 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 36 D0318 14:42:27.190466 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.190556 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 39 D0318 14:42:27.190627 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.191188 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.193510 182129 task_exit.go:204] [ 38810(1329): 38810(1329)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.193909 182129 task_signals.go:204] [ 38810(1329): 38813(1330)] Signal 9, PID: 38810, TID: 38813, fault addr: 0x0: terminating thread group D0318 14:42:27.194695 182129 task_signals.go:204] [ 38810(1329): 38816(1331)] Signal 9, PID: 38810, TID: 38816, fault addr: 0x0: terminating thread group D0318 14:42:27.194830 182129 task_exit.go:204] [ 38810(1329): 38816(1331)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.194920 182129 task_exit.go:204] [ 38810(1329): 38813(1330)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.195335 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.195388 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 39 D0318 14:42:27.195459 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.195763 182129 task_exit.go:204] [ 38810(1329): 38813(1330)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.195825 182129 task_exit.go:204] [ 38810(1329): 38813(1330)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.195975 182129 task_exit.go:204] [ 38810(1329): 38810(1329)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.198860 182129 usertrap_amd64.go:212] [ 38843( 565): 38845( 566)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.198979 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.199038 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 37 D0318 14:42:27.199109 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.199012 182129 usertrap_amd64.go:122] [ 38843( 565): 38845( 566)] Allocate a new trap: 0xc005d979e0 40 D0318 14:42:27.199355 182129 usertrap_amd64.go:225] [ 38843( 565): 38845( 566)] Apply the binary patch addr 556d17c1c320 trap addr 60c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.199598 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.199914 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 41 D0318 14:42:27.200150 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c1cc10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.205706 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.205768 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 40 D0318 14:42:27.205830 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.206552 182129 task_exit.go:204] [ 38810(1329): 38816(1331)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.206680 182129 task_exit.go:204] [ 38810(1329): 38816(1331)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.206841 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.207188 182129 task_exit.go:204] [ 38810(1329): 38810(1329)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.209590 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.209655 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 41 14:42:27 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000300)={@random="a71917d8b202", @local, @val, {@ipv6}}, 0x0) D0318 14:42:27.209732 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.210677 182129 usertrap_amd64.go:212] [ 38842( 593): 38846( 594)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.210770 182129 usertrap_amd64.go:122] [ 38842( 593): 38846( 594)] Allocate a new trap: 0xc0014a4f90 42 D0318 14:42:27.210850 182129 usertrap_amd64.go:225] [ 38842( 593): 38846( 594)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.211478 182129 usertrap_amd64.go:212] [ 38843( 565): 38843( 565)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.211554 182129 usertrap_amd64.go:122] [ 38843( 565): 38843( 565)] Allocate a new trap: 0xc005d979e0 42 D0318 14:42:27.211649 182129 usertrap_amd64.go:225] [ 38843( 565): 38843( 565)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.213975 182129 usertrap_amd64.go:212] [ 38842( 593): 38842( 593)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.214063 182129 usertrap_amd64.go:122] [ 38842( 593): 38842( 593)] Allocate a new trap: 0xc0014a4f90 43 D0318 14:42:27.214193 182129 usertrap_amd64.go:225] [ 38842( 593): 38842( 593)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.221030 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.221210 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 38 D0318 14:42:27.221441 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.226828 182129 task_exit.go:204] [ 38843( 565): 38843( 565)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.226988 182129 task_signals.go:204] [ 38843( 565): 38845( 566)] Signal 9, PID: 38843, TID: 38845, fault addr: 0x0: terminating thread group D0318 14:42:27.227669 182129 task_exit.go:204] [ 38843( 565): 38845( 566)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.228137 182129 task_signals.go:204] [ 38842( 593): 38846( 594)] Signal 9, PID: 38842, TID: 38846, fault addr: 0x0: terminating thread group D0318 14:42:27.228196 182129 task_exit.go:204] [ 38842( 593): 38842( 593)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.229247 182129 task_exit.go:204] [ 38842( 593): 38842( 593)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.229405 182129 task_exit.go:204] [ 38842( 593): 38846( 594)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.230088 182129 task_exit.go:204] [ 38843( 565): 38843( 565)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.235481 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.235517 182129 task_exit.go:204] [ 38843( 565): 38845( 566)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.235566 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 39 D0318 14:42:27.235575 182129 task_exit.go:204] [ 38843( 565): 38845( 566)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.235676 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.235775 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.238416 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.238501 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 40 D0318 14:42:27.238559 182129 task_exit.go:204] [ 38843( 565): 38843( 565)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.238581 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) 14:42:27 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001140), 0x10, 0x0) D0318 14:42:27.241747 182129 usertrap_amd64.go:212] [ 38844( 523): 38847( 524)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.241868 182129 usertrap_amd64.go:122] [ 38844( 523): 38847( 524)] Allocate a new trap: 0xc005d97a10 41 D0318 14:42:27.241972 182129 usertrap_amd64.go:225] [ 38844( 523): 38847( 524)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.245114 182129 usertrap_amd64.go:212] [ 38844( 523): 38844( 523)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.245448 182129 usertrap_amd64.go:122] [ 38844( 523): 38844( 523)] Allocate a new trap: 0xc005d97a10 42 D0318 14:42:27.245638 182129 usertrap_amd64.go:225] [ 38844( 523): 38844( 523)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.246475 182129 task_exit.go:204] [ 38842( 593): 38846( 594)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.246547 182129 task_exit.go:204] [ 38842( 593): 38846( 594)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.246638 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.249027 182129 task_exit.go:204] [ 38842( 593): 38842( 593)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) D0318 14:42:27.253766 182129 task_exit.go:204] [ 38844( 523): 38844( 523)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.253904 182129 task_signals.go:204] [ 38844( 523): 38847( 524)] Signal 9, PID: 38844, TID: 38847, fault addr: 0x0: terminating thread group D0318 14:42:27.254712 182129 task_exit.go:204] [ 38844( 523): 38844( 523)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.254863 182129 task_exit.go:204] [ 38844( 523): 38847( 524)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.263410 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.263559 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 37 D0318 14:42:27.265524 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.269500 182129 task_exit.go:204] [ 38844( 523): 38847( 524)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.269596 182129 task_exit.go:204] [ 38844( 523): 38847( 524)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.269689 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.270622 182129 task_exit.go:204] [ 38844( 523): 38844( 523)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff}) D0318 14:42:27.285277 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.285338 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 38 D0318 14:42:27.285487 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.291978 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.292310 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 36 D0318 14:42:27.293815 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.300006 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.300157 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 37 D0318 14:42:27.300253 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.301425 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.301605 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 37 D0318 14:42:27.302409 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.305916 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.306005 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 38 D0318 14:42:27.306060 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.312599 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.312831 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 39 D0318 14:42:27.313061 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:27.318642 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.318824 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 36 D0318 14:42:27.320246 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.324634 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.324774 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 39 D0318 14:42:27.324886 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.325738 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.325829 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 40 D0318 14:42:27.325969 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.328622 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.328728 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 41 D0318 14:42:27.328823 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.329213 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.329296 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 37 D0318 14:42:27.329267 182129 usertrap_amd64.go:212] [ 38848(1332): 38852(1333)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.329427 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.329486 182129 usertrap_amd64.go:122] [ 38848(1332): 38852(1333)] Allocate a new trap: 0xc005f00cc0 42 D0318 14:42:27.329899 182129 usertrap_amd64.go:225] [ 38848(1332): 38852(1333)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:27.331165 182129 usertrap_amd64.go:212] [ 38848(1332): 38852(1333)] Found the pattern at ip 55d5863e0ae8:sysno 1 D0318 14:42:27.331241 182129 usertrap_amd64.go:122] [ 38848(1332): 38852(1333)] Allocate a new trap: 0xc005f00cc0 43 D0318 14:42:27.331425 182129 usertrap_amd64.go:225] [ 38848(1332): 38852(1333)] Apply the binary patch addr 55d5863e0ae8 trap addr 67d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:27.333886 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.334060 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 38 D0318 14:42:27.334253 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.335100 182129 usertrap_amd64.go:212] [ 38848(1332): 38848(1332)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.335251 182129 usertrap_amd64.go:122] [ 38848(1332): 38848(1332)] Allocate a new trap: 0xc005f00cc0 44 D0318 14:42:27.335348 182129 usertrap_amd64.go:225] [ 38848(1332): 38848(1332)] Apply the binary patch addr 55d5863e0c93 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0318 14:42:27.336460 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.336513 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 40 D0318 14:42:27.336597 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.339400 182129 task_exit.go:204] [ 38848(1332): 38848(1332)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.339592 182129 task_signals.go:204] [ 38848(1332): 38852(1333)] Signal 9, PID: 38848, TID: 38852, fault addr: 0x0: terminating thread group D0318 14:42:27.339735 182129 task_exit.go:204] [ 38848(1332): 38852(1333)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.340410 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.340472 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 41 D0318 14:42:27.340564 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.341178 182129 task_exit.go:204] [ 38848(1332): 38852(1333)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.341257 182129 task_exit.go:204] [ 38848(1332): 38852(1333)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.341115 182129 usertrap_amd64.go:212] [ 38850( 595): 38853( 596)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.341914 182129 usertrap_amd64.go:122] [ 38850( 595): 38853( 596)] Allocate a new trap: 0xc000706480 42 D0318 14:42:27.342053 182129 usertrap_amd64.go:225] [ 38850( 595): 38853( 596)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.348064 182129 task_exit.go:204] [ 38848(1332): 38848(1332)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.348227 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.348400 182129 task_exit.go:204] [ 38848(1332): 38848(1332)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) D0318 14:42:27.354165 182129 usertrap_amd64.go:212] [ 38850( 595): 38850( 595)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.354242 182129 usertrap_amd64.go:122] [ 38850( 595): 38850( 595)] Allocate a new trap: 0xc000706480 43 D0318 14:42:27.354318 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.354430 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 39 D0318 14:42:27.354495 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.354330 182129 usertrap_amd64.go:225] [ 38850( 595): 38850( 595)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.356917 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.357000 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.357061 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 40 D0318 14:42:27.357168 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.357109 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 38 D0318 14:42:27.357362 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.357821 182129 usertrap_amd64.go:212] [ 38849( 567): 38854( 568)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.357926 182129 usertrap_amd64.go:122] [ 38849( 567): 38854( 568)] Allocate a new trap: 0xc005d97a40 41 D0318 14:42:27.357994 182129 usertrap_amd64.go:225] [ 38849( 567): 38854( 568)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.362799 182129 task_exit.go:204] [ 38850( 595): 38850( 595)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.363576 182129 task_signals.go:204] [ 38850( 595): 38853( 596)] Signal 9, PID: 38850, TID: 38853, fault addr: 0x0: terminating thread group D0318 14:42:27.363564 182129 task_exit.go:204] [ 38850( 595): 38850( 595)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.363877 182129 task_exit.go:204] [ 38850( 595): 38853( 596)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.364177 182129 usertrap_amd64.go:212] [ 38849( 567): 38849( 567)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.364247 182129 usertrap_amd64.go:122] [ 38849( 567): 38849( 567)] Allocate a new trap: 0xc005d97a40 42 D0318 14:42:27.364355 182129 usertrap_amd64.go:225] [ 38849( 567): 38849( 567)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.372364 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.372446 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 39 D0318 14:42:27.372534 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.374767 182129 task_exit.go:204] [ 38850( 595): 38853( 596)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.374863 182129 task_exit.go:204] [ 38850( 595): 38853( 596)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.374945 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.374998 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 40 D0318 14:42:27.374988 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.375101 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.375745 182129 usertrap_amd64.go:212] [ 38851( 525): 38855( 526)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.375893 182129 usertrap_amd64.go:122] [ 38851( 525): 38855( 526)] Allocate a new trap: 0xc003f5fc50 41 D0318 14:42:27.375930 182129 task_exit.go:204] [ 38850( 595): 38850( 595)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.375977 182129 usertrap_amd64.go:225] [ 38851( 525): 38855( 526)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) 14:42:27 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$lock(r0, 0x5, 0x0) D0318 14:42:27.381181 182129 usertrap_amd64.go:212] [ 38851( 525): 38851( 525)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.381271 182129 usertrap_amd64.go:122] [ 38851( 525): 38851( 525)] Allocate a new trap: 0xc003f5fc50 42 D0318 14:42:27.381481 182129 task_signals.go:204] [ 38849( 567): 38854( 568)] Signal 9, PID: 38849, TID: 38854, fault addr: 0x0: terminating thread group D0318 14:42:27.381522 182129 usertrap_amd64.go:225] [ 38851( 525): 38851( 525)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.381600 182129 task_exit.go:204] [ 38849( 567): 38854( 568)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.382693 182129 task_exit.go:204] [ 38849( 567): 38849( 567)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.382900 182129 task_exit.go:204] [ 38849( 567): 38854( 568)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.383026 182129 task_exit.go:204] [ 38849( 567): 38854( 568)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.391264 182129 task_exit.go:204] [ 38849( 567): 38849( 567)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.391380 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.391655 182129 task_exit.go:204] [ 38849( 567): 38849( 567)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) writev(r0, &(0x7f0000000300)=[{0x0}], 0x1) D0318 14:42:27.403715 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.403864 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 37 D0318 14:42:27.405421 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.412145 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.412348 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 38 D0318 14:42:27.412518 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.418132 182129 task_exit.go:204] [ 38851( 525): 38851( 525)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.418472 182129 task_signals.go:204] [ 38851( 525): 38855( 526)] Signal 9, PID: 38851, TID: 38855, fault addr: 0x0: terminating thread group D0318 14:42:27.419345 182129 task_exit.go:204] [ 38851( 525): 38851( 525)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.419563 182129 task_exit.go:204] [ 38851( 525): 38855( 526)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.419913 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.420127 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 37 D0318 14:42:27.424108 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.430264 182129 task_exit.go:204] [ 38851( 525): 38855( 526)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.430426 182129 task_exit.go:204] [ 38851( 525): 38855( 526)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.430775 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.431444 182129 task_exit.go:204] [ 38851( 525): 38851( 525)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x1000008}}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x105a81, 0x0) syz_fuse_handle_req(r0, &(0x7f0000006380)="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", 0x2000, &(0x7f0000008380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)={0x18, 0x0, 0x0, {0x693}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x2}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000008400)="1a115e5dd0d80d8cc92aabd22c475485c07264308917aba216990c4087eb64f80160f0d078a1061782919b31cc54e26952a5a7fc39f42c476df9ca9253de3b31777a0d8697b81fcd9ddeafb27481ea06bc6e0749767db8326f12853b3e4424641efcc1deeeb2744038302237f039f1f635693bbdd8326d15a668f04019932cfd4b5117a79760b3f1dc4d376020dbaeded3cfa13077780b3306442ffc2ae7ba6ee1844f107913ba7424ebdf1fca7bfe3b30368e3300eede66d17eed35b01851421e5ee97c3c71caf12140f36a52b994d3f2278d27efcfcde18aec745ee5e6350083c4fb5bde697f1271534f39b4df2e79a5321304030259386325b31a9ac2423a7b4d7f9516646da97ec22f1c45a51a072110881753404a23b43abe9d119ca6908d5d0a61a4dff81c940196d9da6c870c7fd5483ab109c6acde5bfab4f539c49c0ecbfeb66b4e17f1ff8609ab74770d03cdd23b07ecf30517f3a69860487667a74587baa10644accb8b635fe9532a98c1d5406119f6877c7f48b438dbdf390493bbf5471c5ffe53a1e5def84bea097929b1e3937dbb823efe0816c668f681ebfb8469804c22d45c48cd065de5357b0726aa5f0226fd15506864fa0bd577f63572fc5dea85218ffbf46ec9e13cedebd11b614c55a7dab422b4ee9845c429b78ce2985351c7beab5f7b0e3b06eca8debb312a1d66519235eb2d13a02e77d77bde4946f94cf9c77394c025a3ef8491534fab51fd972d0896183b389c762e87bde37ca83e97ec751663a1eced7f7cda656ee120577c63710794156d949141b8b1ae5fe891dae4b3d52944b3db0ac5404ffff03c52f47f91775ece7756fb0d637dd828142c300bdffa7fce419e78c4a79cfc281aa9b843b9b1e6c36597a4e6d4b7229a22c610dabbfd9fff11e4e6042fc2a2573963f180118b46c09baf714b2a253bf0a4bf6a2b36db50dbddb7c83beae187a8698bb2f7cada06cb5a53429c295adf26226b3df0d9715588998632fb0f69ed6bdc371ac3b78fa4a15c5e0afbcf1ae91c6d79f3ec088da5fe0226f866a0d89660b23984c940c9de66c03e3831d3624c9cb67a2edf644daa0f18f2bff8f2d5b60f80d52c4ce7a6d9653f13d8a09de3966e0a3a7ad49fd3883a7b2c06c9e71c90d5a3366586bb42f8ed8d614b65620f66f1a51cb25accf01a0569bdce4520e62b5492fb96dee60d0d8c6967f5a487828a7a3ebbe80be4ff21dd91a67240b37e85fa399d43844b2a1d3409003b89614e2d8986240b5c23b1ce7bc4fc707e525cc4a2706b00c2e382aa7d5a0b98db3ef45eb02238195dcf287d4647a55ae6c2372909c3dfc6571e3bf24381751710b25289cc2f242cb83b77a6922fb93c95c6c21bb4668385347855f19e3dd162123514fca86023537ac10b31898055aaf40549449a0000f6af6f468cad14c98fefe78cd31ac93286a69d9c11ac6d1d236dacda88f6fbb9a12bf5b5b50e0924c837ef2848b26c6b5b4edbe29b472f2150c58b6efef7ba5fe25588c18777d2c1f1308173ff2929f5fd23321bbe0629934df4431d41910f0c6d4490b71e2ea69735a5c0ff30724ddef45e517bcd322f58ec87f8d72edb78d5e9f1a1fd3a5a7907d5f9fe96fa2d38d089b99bafcb0a22897c16efcf304ee002877c64b7c63c0f553d293001bbad344a4fb4970cc65e5864d0d92b3ee49b0317b8abd52df7f59c42b3be639b603e36f4eba6519d0933e1fa3abfadae7ba376e767e66a213a0b2ad3a0114de95d3e7b775d40311755028224d691d4d76b360c52a4640507cccd39f2a0d41a413ae8596a2b2c8abf226a65dd047ad06e343da67c295180a4676cffafba4dc78c00ab6239aa7a9d4b3d4e943c1fd8a0dc9324e9862e13de7f84f8a63a1c1fdf758b6c70ae4cebe22ec08a9dcb27910817d4b162adbf3ded11827f4461c5205690baf80b3debd2923ac73721668f287b760eb048792adc052be10c4607f8896a8e453816f2a989c42937b68680d1bc168f6c9e639e5744fc939c586b6eefde2555c1d66a935d546d7fbd30f9dd9b5e105c554da8ca2835c1a4982fc54e09585bb6b92257eb229caaf60a899b0e83663ce89599db7a7837d06ed213331d849b0eda3701c781448b97389cfe079b52f36d118bcda97c3941c2dc94af0e1b00158633888d6e25af738d834d137393d8630b444bfec820c149677d03a4e07deeb6cc593a6462d23564c8273697263c458110e341672fe76e22d08ee97b20f64e54ec9d85f4483c00ef1f0f09044d502f2269240f8b6c675dbb326fdcd4532cba0f1ddc329de4e9545cd9febeef9c68cf72fbdf87b6b1ad69e1874749d05bea9d7e50c4297b1ca3c706bea072102d96cd84f869850098f947324b4ba00a7777b1523015b9959360c28960bb99c6ecb86232fc67e6d0e2d8d8ed0b8bad63c72f835b5d40cea32c9d297ab08fd7c888b2d5012f8a9231f740dcc399e5508491700882fc3716ce69653313e69c78f49cb033736b3e2818044efea9425e74ab5444c483f529bec018f830d04e883aed14def42b536ace8ba526d184a08578ea5626523cfe6b8281f2b4c712e771b0e49e1a3d9b6547fcb14ccab9a0860232616ac64d926a6e22bcde8d279f3925906c9ff688232c57d39146eca106f7ebdd42f7ed244963a30c69f59894e87b54d941b258a68b7d521ad81a0e3ad501416abd9f57b697fefb8be9ef5c27062cc596de0d7ac23d5be4e912014ab7a5864298184a4ab6adfa83d5f6aee4e42a600bd53ed59f09b96a04c71c43529eaf9be23ade27b1d8b9c3b65ff20eceab6a28d2c2cec95758ffd26cf1171c56792ea5929b1dcf813b3f8f75c3a823a1caa0edd09bd705622d1e1269d5796dc1aa30a783f4e4638b8f58c92c1493ab61a26b29008e6e89efa3d4df4b77678b412ef174e6b8ff3b1d3750e20c8c2577c7c27b7bab0f14f8da8c8f2494055dfc6aeb9781ba84e40122b64b769c49c432915551d9230139fcbcbabba4f63ccb3817ceea7cced59e879f0b0e56b5e541b6f55f2f8a45ff50d6cf50308dafa1d589b7e2fc657ef9babfa00e73e5b8b67cab507302fc38d890fae5d8c67b3f63bad15e7ef8941641b7d55bcfaedae0d8314f023ad6b59047e569796d1fd10a0f415e0ca0169a3ce0296b90ae27969ca2ac0597af77ad59d2d747f723d3984b6c119f77af33b272a31db866d6a9c3fce70dbae45d38cf18a2c9b39d0634a815755ba26bd415ec8edb134fb6b45d34cbff69da2f4b0aeb4149e09cc5be8bc0b0fdf76c834faef7d663569e0c4b0015aeeea305b4bbdf804baf40b1101f67da743d8466548b5b60cc2fa085015d89c63a636ec2307ed234faaf20943496218a9eb44d12303a98af4ecf557ec140afe463b754c368e71c73b6bce97d7bcb5f7925408b68877a00b5022f5676290c4f9c0f31948951caca6d166397d4fd3b73bbe269024664f0fa052e994257477843349dfb4147f9fdb81e2582e0ad5d7efc06ad711e1df10932c292d33ed38ec3d0c3de7305daf2f51b6b737e9281121c2b79b175bcbb3f6db0b81817712efd8e22cf24355c6dc77edbf84850b0987ba4318dad0ee9587289e37b6730ed146a4a00b87d0c244086953420c2ccb0b259701e62fce742bc79dee6ec25207192757e82421fa30bc517ed7881baa52dadf60c1e6d07c50afa7fe361711c697ec1ed50aedc9e1d612630f4792cfca33402b2206ff29cb4d0306d60265528de12ac248d604e9e3260afb59c64983ebd584521961ffa5ccb4296f25a5c032bb5f707b4cbae6b064bb8522a03f5acc417273003b830e3a16d2dff74e94b84f2fa65ba8b48b11005a79b939cb5c91d066895ff11021c3a7068345816e37a87f3c30980b96cd5b1ecef28147d209377c1e3a90e23be518064b3fdbcbcee5a9a642d3d32908502e4302e200c2f4269e890a9115706c4096132de06baebc013f13900250c682a7e1165de5eeb93483e74c34d9a6781891c0ac7bf6a30e09d2f7100ec3841608006bb04a8edda6bf08c40befc6768b64817cdaf304283754a9fea24d85e93839fd01a541480ee58b8b27914e61d1bc722f8c451f9c0cdfa45e107070ff3ebb710543bf1058fff7b774b679f097ad76aaf4d104b969ee3ff63933afb955b659122abcde800d0f651d1daa8b26c6708261ba623a98bb20cde8664c1dc649c298e8c7f6b4710305e7d461d4533138f9951add350c553b9ccce346517ec5be7573fc0e780f1c52c9c4033573043dc41854c19e5faf27757af8e7ed696a6175ad31a725b61b1f93d4e86865b71fdfc023b6e0441e54d337585fd29479882d30059cf4af9a65d732600b8a4de38741aae838a65302c8284fc4ff5c50ad1470220282b524cfa7dcc995c25fb09a3ef936d4a5e8cfab830c1632d471ca8a457302a65f6d8183b020b9d0a025043e83ad571da38b42c7d293d6df2783c331aaa01fa8766c8da76d0753947622f66a4d4b8c14c5bd673502234c108de61647087109bf056edf26db4575bb6d177e54ee028425171af8fb292f3fa50dab342f711312e5558d5f744410bb1e20057b3606511674f49fd7f1b2017409dbea39c452446bfb327b1fb718225026f6832cca4d445a108ed5fbb444b335b1ef79d3683e53be3f651fa84ec46aac982b3842a9aadce485d8b4b56fccedef8b137d20b4e6b62b68e832014468ce9c7113bc6464e0118d3115ceb846a0f91cc3de3322bd1fc7d9b67ef60161c1caa987970883cccb4f11043e77cd2b1ae7b89564a80966dd12dc6fdd061702be651ce936fb105394d6987312a003a4a1a09c689ca15427de960e1d904b6c6925b8729003ab7b0f76744697c1182d2a1353aa619e492a067900cfa21cd619177f9100e2df96aa1226def7852386dbaa19df6dad101716209263fbcc6f141cae4c712e153088c2c56dd2f4df5775199493e01d8ac28e25ebb7059fc1e5f9e397120b017bb15090b3b4e9f1d2a6375c24608210902d3fc6dc83930aa322b992ca4441c2aadefd246e9ef4d430a11f71d2e77f8b6a808174606fe4af7d7ea0ab79d0dff3c75f854183e61fbfc083b5671d99a46b69545a1de33aae86f12d2446b752f3b2e0d703b626eae3d03e780d55b0994735a27f7461fe2e40fc42bb642de83aaebca10dca6f1936ad46834011146be5e5bd6cbbcb74a870d4ec2577b23a798be41097f2da94db69797e36c3e34e3481757d61ec54588f7f9876d95cf5d7d506ecf96cc15ed368ffafd5759aec819c2395d3d564aa20ff95397546f2b51a9bdad3b01dc22455a9ddf9719f47b1ebff32135055a8f3ca7d658d8b6b4be51c769be77483adb8f86337431a557f4d3ef5ca5e2b9f51d797a924cea8f741756e2769d64d8db7ab84a4ef07c821ce2bb4bbf973f6c046032c9581b1da29cdf093c5e3929dbb7ffbc78ab17669941d46926d7b54e9cfb19959a3c8520af24b936c8f4ff9cb51ec81245b3784bf15c718e88b7a98b5a25aba6be48aa923355e105c1a1b35ef50eab22e0ccb12d6c50760d3fad62a29d01e2e7f45df62062ec551658d3a7256d129203054b9fe0601f42008eb6298b7eedb1597a493432ffd2cd5551fff3b0d147a702113de809cb5412a10f2bcbf825e14cab5b08bcc0fb27ba1ef3001307f0ad084fdb5d62dbc97e6f659cc4c774c5cbf264c243fdc1711dab41b01a7b4b353f113f330e1bc255c73690f3fda364912ccd7bf617406e5373b8864ae86cb410b260bf9ce781c53cc8e2d2f7806d7835d94ddcc2718ead42735eac9f13d2799274918d88a787681319ee78527a5f11d5039a5d77e8041384f9df0ddb4788cd0ab20525d1e9dca24b13997c7dd015099f881b36da7fe4237e1cf59e32ccd3d3394af7f190ad95ee9c454dff3339996906fe26f228df17a904565b2eab4cac9f189556fa265559f2299e43c6f0f2195dbbb2b37136af340ff23263ae76bef25899ee2914c82987381a80a8285ee5734ed7c98dc6e5f54cac358196f025ba16950802873e3fc5dd25f5fd3900dc525cead3ad6453d7e8ab253245a217fd5b06d1f3f2753f1b59dae02eb0528f8ac872526afb849a372c9588572425b4e062cc3a30a71a040bf11597c8013cd2488446a90b5a546fb8f07fd63467198c8fa5bb6e55571ea77aa109a7a2bd911da0c148d7d321b13864e1803d1cd16ab5e111f2a84cb1932091eb1aaa6a79ccce6a802941c3272b80b71dd46b1762697bf31b34eee519416685cbfb664060d8415ec90b3fd89a7cc149abcb388a7b4f895e6d62742105ba9e9d4045b0ead8c08105609a499b322bf137ab760917e3d40bbaf08fcf7c84c5f925affb256b64c0eb651f494d7e4495e75d72bbbb8dfc856ac91244695c83ec6e939622b9fdab8ed69d885db397ebea7c9b36e640114a1391d38477c9fc66b06a9f77c80b44754630cd27e684bfa54cf089508cd9b3fb06a48f7d78449911fd95d71f3660dd69c635dfac5af21b7d53750dc8b210be82202fd35b8c365614a930cc1bcb4955a4cdb5505719803a47bce1eb77637ac54dff42381b0c7e17e461e5477fa3d50553625eb3857684d4192d8938d15a6e1d23ff17b6d63539f323e7c86739e21033f93461fb60946ac832f603d813783dd99e0c775531429eb469270568d014de5178f4a104be7e3778bb633187a254caaac9e69bc88e2ea5fba057fcda134ec11cb05f51dcd0f92e5798bb9f7809d379426103f3b839f2839775352595f3605800dafbb9a4627c4a678275144daa3f261058d93a224a287549eee610d1f5290fde54110384ede2337cb0d7e71ad386bb3ea824bceec0808073e8ba14191088a6595c23648a02cb500d26d7e38b24cc6be2735aebeff54262f4a3bb933beaeda80ef783fd812f455fe3bb6781187741fd8ff7bbcb1056280d73af87d73ac658912b17dd890aaa6d76799c7e9811dc08fbfa2b0743c080bfa72cef1e387b4d68227059f6479bfc80409348929fb8e70f17784d85c407b7cfe9c1e7da70a5e1bb1bfb6bbcad399d0916bf65a28be7e90e30b0bc2ed5b3f666cae90bdcf41da24cbe437697501cf2cff1cc27200f19ae7f6524862c536d11bede4899fe406a746f13d91ba362bcc478ca1d14377ed1602bebd44f645a2606d79d4f21211355935a29ffd1d9df9bbd93c3a874e01dbc48fe40f2b260cbf414bc5eb741aafd9715f9f220ff948adb380dfec408cf1786d5cb16a2dfc7ed77ce6b28d3f9946b79aedec9177149f7744ca9da4dde1f57c9212afff321895781f9f842c5942506f8e1838573d52889f3f7dbe7b2bfa01028c7a00c8d31bb6c0783ee0788773256b7483de565c060e7ef1a72db257f652b012e5e26a49089c9a32733d6543d785fbb833164bc4603d61b20380a317dc8c5e8085c8068fbadf4c9461b21fb204be90b8bbf1384121ae25b297b3be4169514c577106ae2438e4e27512cc314b3ef8848fcbfb35f59e828b4017b86113e9cd654e3b249b2e692f894ff622d34441a9f4fe53f7d64c8f16818a43e4f58b253a8b5a95e05f3e66ca26ec9628f64ff70ba310b091bf052043c9bed4314f772e023066a8f3c5424f24dc3cdbba574fa2e640ae72eccf09e996b50f318d2aa490ee215b9d4ee21f1ab6c429dc2f2c934eff14df231085304250d44632c75f39d7b40da7e9dc12e9791174a73774fcf6cd4b920b16dfa68b196456ed3d3fc2d605abd7b84b41f59bfac50dc327d677ee013a015efd66c1d288d0bf8e9871792bcbe91d7fc81c05c7811132d442dacbab855038c409a87984685b89f37bc95bd7ab85cc61386b93f8c55db621ad1a72a024f11612e9a80c4d88b2a4ba791c00ca753a77058143800e51defdf84ea3d6debaf41b80ffeaeb46e94cc969d162293d7d001885d16ef39939ea55f7e6f275b35a7714a0268a17b8a3789943dba2fb7850f8a69b1712ea21ca6724e59cc8badf6b34b97767e6957f786af113c98d8b9ab79ffc536d2021c54f8bf71279068f4cb5d647670e3d4bffbd1462ad6616a66a952ac394b3224bbb4cf192200c2e4b69d9a1256d471bdc0c2216c4f57713c589f845b8fecc710d92f9e0d14dafba7f6c2cbd46b594dcb90a3b7219c850ccb459e38dcc240eec98ea77f0f05f12c4dabb8c2b7725a82f4958502050b092be06c5ac97eca2c4c27b853b28c3b8e3e450defd170a504f8eb7aa07345f5d4f6f627902e503fc0543f114ea22e527e7ee6fd84070e2ba1bdd17f03bb3910188e1cbb35b1974a149067a962635d12b2be1143dec1db8d47719a015475f9cedaba533ef0496de95b6c4ae509d95edac001cfe3a60e57872964d0878a445a73cae0ddca4acd082f49bf304feaf01aaf7469cd1dd44ac8e504b337cb0ebd1164b077e91b4874120dd475d6ba2c9d3f0f8d65c56ad76483b743672377c0f16a076515b95697c1a17de510c5e1b30fe43a0bfde53686038e42bdb9b8ae729aee002cada6f005a5e18d40486fbd3c0ff9be5f78d6ff358f85cff34842cdb4b5c37231661feb27f89d360f1cb08c269c4c788258fb4d4014ea2f3726b5d84e9921600e8b6ca568ac4cf4592351ab26f05077723c75d73a31443f152c72679e599b18d99610a2bc15de0bad621a4a9117e97d3ec449d511383dd8e49b28ad2e1b0294cf477b8bfc3b88ef1301b027572fd714a082e5568d02ab9b83db3123703424066c800d77364e7eb09c6265b5a57a24de5e074dc9798b85172ef8749fe4b686b8c596fca4edd6d325fbf3edca69b31c8fd4d7d21ec2babf157676f161f1b5317ccabc1d4a7962ce342871093f1d323fc4d4f1c2af0ae35818fc4e67bd68622120d2e4b791af86c8c415c0d50da7320c169195a2714e6a1c517014076a8e823acf1fcadf7f51e1c9d1021704f69cced7c435151dbd86394e71a7cddd73ad93eca4e9bfb09ad19ba3d6f74800e4775baefb5bb5822e713c18a64225b4f462488dd6843d81131017f3842edfbb19e6ad5f8c442741c9657388398da1f79f4c9622f2a81e31a39e8f0369240b537c60bb5690d214556b5c6ce08ce7ff7b519a9c25ac0a96a97584dd416befc2ec7fc59f86a384527e927e4579206d6ee16871de8a3c6c7ac3837a11d699a895a1d60241c83877d6d9db66c9631b9796f4423f6382f74a2716c3682fa31a81c05cfb3a5090f17e999fc358d1eaf799f9f8948477a50aa4b2bc0c7c1212a2d72d9e51ad8211958a9f018bdc776bcc774c8be3cbb897bc8d7bb0eae66077f0c647ce3408cd92c735e534b6e3d5990c38258fc4e807d63ddaee6cb47e28b734826cae908392cdf7a1cff5379d5fde6090b0f6737f665cdaa801a687d452c958eeb2e2f0045b06ec4e5a3db7a395e6e7cd70ac6fceaa2091f3641268c102aa98553d2e1e3b990ea54aa36b72b788bf3b90dae4a116811b651b3fbabd18a9613ab039aba241eb1397e87f6de4a6c81d5798622a8bd961b75f3995f53aa85d50268287b873805a5bc801b64fd4bcb7e9ba34d043d0f205d69780f362d516eeb8771d48bd4c711777227a2f7ea3c513ca26f6b3e4cc2f5f56fc728c11d612d781865afeaf9d0ea9560311f27b3698022a409b4ccc8207333bd72c8744ef61af9d66c06517f496e7486b94609a72a4a576ed67b8a8c0e9394a5c845230ae19b10ac27d4265acf727ccaa2f9c9e7697d740b382e92917f3a5b2a0dc5960a5bd6624f42065be9ea68c7ced704a73f4f1f0a43a6df61d70733e2b26b62dda8e996c67e8ffd167493ea66e55a7102299a21074516533b1dbb1283ef865fa3e3c0d5a5fb78390be5bfcc47c771b9e6e2bf93050a460642e0debcfc198d56a937dfb9a4d4b36537b103938edfc877b5e5aae3096ddc879270509a34c04e73259ee64bf210ec6884da38b4896a9abd55ebf42f77a9f77999958e897c482b824a50281077fbae9e332aa6bb503da4ff01e8f1b8cf7eff53c66217c99e5c27ed476f6486f9bd2d63c23cfc4cf6cb2ad0662aab8c5cb34fcb5a7575819df9293aa2302a148bff8aec3b3e3107a2bc8f62316897f03a9a3bb76d7ea239c31715ceba91b89aa7a18e0213bd799053a3d40dde53c1c29339c40ac4989563d480a6920355a5569e16b813b2b253e0506610bebe4be633278a00d8e964f5114e3484413c5a0c15a44f6be14c3356d7f20e0c85a31db9cecbbef687a033ec2599f2479c225427ec3893f5643553369f1bb0ff313223613e2811abce3c34aba59c9e1609ae31f5d58c9ec1bf698639f184997a852a4117723fab1e8ab2a6325a6aeb2e866937669a3322ad9223bda43fc2fad0126084ccb9e5e171c136e0b0b23153c6f442bc6ec6cb37977adafe77bd762e779cea932ad3129d0a3190c15d59a67eca510dc7998703ce97cba01196fcf3b59c2114ee8166c6fb6ab9390e24266769e5408fa2860018a03a16b13e69379a04364d822421db3ea1564ada3420ad5dc67c484cc46ecba90f30158a1e0719ea9dd6a0392daffcc5749232afb155f88628ab33b99fd6f6ef5f6e3733a8d771ebf12e5e28a5c78010ec7e0e82bb7da201ffc392900ef42c0e0dc552618a9ca3e470f6fecb7173322fef63573b3c9729518723dcda1bba27bca81eb232d02f129ae70f182338630d2aa2f1fcdd24a8bdd10ae91e68fb26cd6db7d41a7072727a11eca5056928da7b948928f073026a90594051895a404e618ea956b9824a744f91f9cb8ce9ed9f7834a7cf39eb3b98ac8dc491ad2bc0df2cf40f059f0bd985e6b4313c203d01e701310b3821512e9b03351f47d6714cff095265899dd3dfc974641c58e739716b458f17f40088c8f7f783c1e18dace6ab1b886c152877d681276878a6d262f850cb8ef8da8a8aff9f951313d888d063422bfc4060dd60d0c8f8a5059aecac419001911b06cba5d5e2aa98f1bfe8ffd1406f319efe81bbfc5bc155e60da1e661d18755d21889eb06fe71348b02fa4460d81158d80326199f2cf78f6235e218b05ee1b1bd80f81737f16d472f284b623f4e075c96843e30240c9abbed908c3c22c9f27c643f845e5c980c6c6978c7698105131f89ed5e53b9918651488183acbb7e66833a6782fe3de000eda80369cedfb32c16f65738c0253d1d35f859bbfe33331ec81299b8353e23f0d1d2b79567a39c2a33ee9d6bdf056e5dfe1531b86b4e06e4ead426c07e9481fac83b10ab93a848268d2682defef0867e160b5edc10c7c9cdb8929db5f9d520279632d9a49a0c8f548a16b47a9c11ec935abf34fd6761ca091756f999db950730529a561a8f2251b8b1db21c80a0f0d8caecf4f321d21ac7f1097d9c8c5ec99a987c22e5a66552d7a8685e79297f220d91f0b3b4c17e46d9d95eb1aa2e76f87a3202a95ff81efb73e311fe4c4a0fea9dd5e757d50f139cf6ef3ca9506f9adc61e9a8f70208b204ed7f041b6a10eeb008c7d53584438dcc334f272e1289aead2f30d85155b9f66e32b1e91fcaa631d408af7ecc036a221ecedcf08f3345d68d31e282f16c2b724f0a0c6ac2d0a2aa7b845dd76d810be322f20a36cef106e49a5b7ae4fae8bf8a9af958e318da90af2e413f493b7fa89332", 0x2000, &(0x7f0000000cc0)={&(0x7f00000000c0)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) D0318 14:42:27.437326 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.437427 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 38 D0318 14:42:27.437502 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.453406 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.453495 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 39 D0318 14:42:27.453616 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:27.466107 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.466249 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 39 D0318 14:42:27.466328 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.479454 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.479665 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 36 D0318 14:42:27.481028 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.484203 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.484316 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 36 D0318 14:42:27.485447 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.486202 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.486629 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.486657 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 40 D0318 14:42:27.486719 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 37 D0318 14:42:27.486780 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.486809 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.489196 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.489300 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 40 D0318 14:42:27.489405 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.489705 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.489774 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 41 D0318 14:42:27.489852 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.490328 182129 usertrap_amd64.go:212] [ 38856(1334): 38860(1335)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.490703 182129 usertrap_amd64.go:122] [ 38856(1334): 38860(1335)] Allocate a new trap: 0xc000428ba0 42 D0318 14:42:27.490872 182129 usertrap_amd64.go:225] [ 38856(1334): 38860(1335)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:27.492637 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.492806 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 41 D0318 14:42:27.493040 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.494221 182129 usertrap_amd64.go:212] [ 38856(1334): 38856(1334)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.494291 182129 usertrap_amd64.go:122] [ 38856(1334): 38856(1334)] Allocate a new trap: 0xc000428ba0 43 D0318 14:42:27.494365 182129 usertrap_amd64.go:225] [ 38856(1334): 38856(1334)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:27.498315 182129 task_exit.go:204] [ 38856(1334): 38856(1334)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.499253 182129 task_signals.go:204] [ 38856(1334): 38860(1335)] Signal 9, PID: 38856, TID: 38860, fault addr: 0x0: terminating thread group D0318 14:42:27.499361 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.499480 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 37 D0318 14:42:27.499580 182129 task_exit.go:204] [ 38856(1334): 38856(1334)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.499664 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.499915 182129 task_exit.go:204] [ 38856(1334): 38860(1335)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.505064 182129 usertrap_amd64.go:212] [ 38857( 597): 38861( 598)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.505163 182129 usertrap_amd64.go:122] [ 38857( 597): 38861( 598)] Allocate a new trap: 0xc000881620 42 D0318 14:42:27.505687 182129 usertrap_amd64.go:225] [ 38857( 597): 38861( 598)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.508878 182129 task_exit.go:204] [ 38856(1334): 38860(1335)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.509024 182129 task_exit.go:204] [ 38856(1334): 38860(1335)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.509201 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.509707 182129 usertrap_amd64.go:212] [ 38857( 597): 38857( 597)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.509792 182129 usertrap_amd64.go:122] [ 38857( 597): 38857( 597)] Allocate a new trap: 0xc000881620 43 D0318 14:42:27.509889 182129 usertrap_amd64.go:225] [ 38857( 597): 38857( 597)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.512138 182129 task_exit.go:204] [ 38856(1334): 38856(1334)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.512411 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.512479 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 38 D0318 14:42:27.512593 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) 14:42:27 executing program 1: socketpair$unix(0xa, 0x1, 0x0, &(0x7f00000010c0)) D0318 14:42:27.519445 182129 task_exit.go:204] [ 38857( 597): 38857( 597)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.519784 182129 task_signals.go:204] [ 38857( 597): 38861( 598)] Signal 9, PID: 38857, TID: 38861, fault addr: 0x0: terminating thread group D0318 14:42:27.520462 182129 task_exit.go:204] [ 38857( 597): 38857( 597)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.520723 182129 task_exit.go:204] [ 38857( 597): 38861( 598)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.526081 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.526183 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 39 D0318 14:42:27.526443 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.530477 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.530648 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 40 D0318 14:42:27.530759 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.530926 182129 task_exit.go:204] [ 38857( 597): 38861( 598)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.531005 182129 task_exit.go:204] [ 38857( 597): 38861( 598)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.531057 182129 usertrap_amd64.go:212] [ 38859( 527): 38862( 528)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.531162 182129 usertrap_amd64.go:122] [ 38859( 527): 38862( 528)] Allocate a new trap: 0xc0008816b0 41 D0318 14:42:27.531177 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.531228 182129 usertrap_amd64.go:225] [ 38859( 527): 38862( 528)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.531277 182129 task_exit.go:204] [ 38857( 597): 38857( 597)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nicvf0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) D0318 14:42:27.536761 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.536902 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 38 D0318 14:42:27.537049 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.540129 182129 usertrap_amd64.go:212] [ 38859( 527): 38859( 527)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.540246 182129 usertrap_amd64.go:122] [ 38859( 527): 38859( 527)] Allocate a new trap: 0xc0008816b0 42 D0318 14:42:27.540324 182129 usertrap_amd64.go:225] [ 38859( 527): 38859( 527)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.546553 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.546676 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 39 D0318 14:42:27.546782 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.548868 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.548952 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 40 D0318 14:42:27.549066 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.551929 182129 task_exit.go:204] [ 38859( 527): 38859( 527)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.552552 182129 usertrap_amd64.go:212] [ 38858( 569): 38864( 570)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.552699 182129 usertrap_amd64.go:122] [ 38858( 569): 38864( 570)] Allocate a new trap: 0xc000706540 41 D0318 14:42:27.552857 182129 usertrap_amd64.go:225] [ 38858( 569): 38864( 570)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.552992 182129 task_signals.go:204] [ 38859( 527): 38862( 528)] Signal 9, PID: 38859, TID: 38862, fault addr: 0x0: terminating thread group D0318 14:42:27.553104 182129 task_exit.go:204] [ 38859( 527): 38859( 527)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.553235 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.553351 182129 task_exit.go:204] [ 38859( 527): 38862( 528)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.553492 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 37 D0318 14:42:27.554566 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.560180 182129 usertrap_amd64.go:212] [ 38858( 569): 38858( 569)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.560253 182129 usertrap_amd64.go:122] [ 38858( 569): 38858( 569)] Allocate a new trap: 0xc000706540 42 D0318 14:42:27.560321 182129 usertrap_amd64.go:225] [ 38858( 569): 38858( 569)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.562242 182129 task_exit.go:204] [ 38859( 527): 38862( 528)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.562395 182129 task_exit.go:204] [ 38859( 527): 38862( 528)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.562620 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.562792 182129 task_exit.go:204] [ 38859( 527): 38859( 527)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.562960 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.563030 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 38 D0318 14:42:27.563124 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.566433 182129 task_exit.go:204] [ 38858( 569): 38858( 569)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.566644 182129 task_signals.go:204] [ 38858( 569): 38864( 570)] Signal 9, PID: 38858, TID: 38864, fault addr: 0x0: terminating thread group 14:42:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_type(r1, &(0x7f00000004c0), 0x9) D0318 14:42:27.567184 182129 task_exit.go:204] [ 38858( 569): 38858( 569)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.567328 182129 task_exit.go:204] [ 38858( 569): 38864( 570)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.575192 182129 task_exit.go:204] [ 38858( 569): 38864( 570)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.575329 182129 task_exit.go:204] [ 38858( 569): 38864( 570)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.575510 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.575707 182129 task_exit.go:204] [ 38858( 569): 38858( 569)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}], 0x20}, 0x0) D0318 14:42:27.586243 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.586821 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 37 D0318 14:42:27.587501 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.587825 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 39 D0318 14:42:27.588136 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.588413 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:27.598195 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.598346 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 38 D0318 14:42:27.598470 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.601640 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.601830 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 40 D0318 14:42:27.601931 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.605147 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.605228 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 41 D0318 14:42:27.605406 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.606258 182129 usertrap_amd64.go:212] [ 38863(1336): 38868(1337)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.606347 182129 usertrap_amd64.go:122] [ 38863(1336): 38868(1337)] Allocate a new trap: 0xc0043f0a20 42 D0318 14:42:27.606566 182129 usertrap_amd64.go:225] [ 38863(1336): 38868(1337)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:27.608993 182129 usertrap_amd64.go:212] [ 38863(1336): 38863(1336)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.609178 182129 usertrap_amd64.go:122] [ 38863(1336): 38863(1336)] Allocate a new trap: 0xc0043f0a20 43 D0318 14:42:27.609331 182129 usertrap_amd64.go:225] [ 38863(1336): 38863(1336)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:27.617972 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.618271 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 36 D0318 14:42:27.619013 182129 task_exit.go:204] [ 38863(1336): 38863(1336)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.619890 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.620200 182129 task_signals.go:204] [ 38863(1336): 38868(1337)] Signal 9, PID: 38863, TID: 38868, fault addr: 0x0: terminating thread group D0318 14:42:27.620351 182129 task_exit.go:204] [ 38863(1336): 38863(1336)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.621188 182129 task_exit.go:204] [ 38863(1336): 38868(1337)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.622281 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.622423 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 39 D0318 14:42:27.622674 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.624790 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.624854 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 37 D0318 14:42:27.624978 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.628941 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.629083 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 36 D0318 14:42:27.630364 182129 task_exit.go:204] [ 38863(1336): 38868(1337)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.630480 182129 task_exit.go:204] [ 38863(1336): 38868(1337)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.630609 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.631231 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.632050 182129 task_exit.go:204] [ 38863(1336): 38863(1336)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nicvf0\x00', 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000580)) D0318 14:42:27.635948 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.636101 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 40 D0318 14:42:27.636352 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.638394 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.638456 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 41 D0318 14:42:27.638534 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.639320 182129 usertrap_amd64.go:212] [ 38865( 599): 38869( 600)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.639456 182129 usertrap_amd64.go:122] [ 38865( 599): 38869( 600)] Allocate a new trap: 0xc005f00cf0 42 D0318 14:42:27.639531 182129 usertrap_amd64.go:225] [ 38865( 599): 38869( 600)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.653469 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.653588 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 37 D0318 14:42:27.653758 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.654673 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.655361 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 38 D0318 14:42:27.655519 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.656379 182129 usertrap_amd64.go:212] [ 38865( 599): 38865( 599)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.656533 182129 usertrap_amd64.go:122] [ 38865( 599): 38865( 599)] Allocate a new trap: 0xc005f00cf0 43 D0318 14:42:27.656666 182129 usertrap_amd64.go:225] [ 38865( 599): 38865( 599)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.667346 182129 task_exit.go:204] [ 38865( 599): 38865( 599)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.667773 182129 task_signals.go:204] [ 38865( 599): 38869( 600)] Signal 9, PID: 38865, TID: 38869, fault addr: 0x0: terminating thread group D0318 14:42:27.668645 182129 task_exit.go:204] [ 38865( 599): 38865( 599)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.668887 182129 task_exit.go:204] [ 38865( 599): 38869( 600)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.670237 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.670399 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 39 D0318 14:42:27.670522 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.673340 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.673433 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 40 D0318 14:42:27.673542 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.674234 182129 usertrap_amd64.go:212] [ 38867( 571): 38870( 572)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.674379 182129 usertrap_amd64.go:122] [ 38867( 571): 38870( 572)] Allocate a new trap: 0xc0006813e0 41 D0318 14:42:27.674458 182129 usertrap_amd64.go:225] [ 38867( 571): 38870( 572)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.678087 182129 task_exit.go:204] [ 38865( 599): 38869( 600)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.678199 182129 task_exit.go:204] [ 38865( 599): 38869( 600)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.678318 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.679473 182129 task_exit.go:204] [ 38865( 599): 38865( 599)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x10}, {0x10, 0x1, 0x1}], 0x20}, 0x0) D0318 14:42:27.683907 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.684071 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 38 D0318 14:42:27.684181 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.685326 182129 usertrap_amd64.go:212] [ 38867( 571): 38867( 571)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.685482 182129 usertrap_amd64.go:122] [ 38867( 571): 38867( 571)] Allocate a new trap: 0xc0006813e0 42 D0318 14:42:27.685572 182129 usertrap_amd64.go:225] [ 38867( 571): 38867( 571)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.691336 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.691493 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 37 D0318 14:42:27.693133 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.696284 182129 task_exit.go:204] [ 38867( 571): 38867( 571)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.696504 182129 task_signals.go:204] [ 38867( 571): 38870( 572)] Signal 9, PID: 38867, TID: 38870, fault addr: 0x0: terminating thread group D0318 14:42:27.697298 182129 task_exit.go:204] [ 38867( 571): 38867( 571)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.697373 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.697465 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 39 D0318 14:42:27.697473 182129 task_exit.go:204] [ 38867( 571): 38870( 572)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.697532 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.697778 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.697889 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 38 D0318 14:42:27.697999 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.699836 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.699893 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 40 D0318 14:42:27.699990 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.708183 182129 usertrap_amd64.go:212] [ 38866( 529): 38872( 530)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.708257 182129 usertrap_amd64.go:122] [ 38866( 529): 38872( 530)] Allocate a new trap: 0xc00e84eb10 41 D0318 14:42:27.708412 182129 usertrap_amd64.go:225] [ 38866( 529): 38872( 530)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.708620 182129 task_exit.go:204] [ 38867( 571): 38870( 572)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.708700 182129 task_exit.go:204] [ 38867( 571): 38870( 572)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.708851 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.709005 182129 task_exit.go:204] [ 38867( 571): 38867( 571)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() sendmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000055c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r0, r1]}}], 0x38}, 0x0) recvmsg$unix(r2, &(0x7f0000006900)={0x0, 0x0, 0x0}, 0x0) D0318 14:42:27.712685 182129 usertrap_amd64.go:212] [ 38866( 529): 38866( 529)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.712788 182129 usertrap_amd64.go:122] [ 38866( 529): 38866( 529)] Allocate a new trap: 0xc00e84eb10 42 D0318 14:42:27.712929 182129 usertrap_amd64.go:225] [ 38866( 529): 38866( 529)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.722367 182129 task_exit.go:204] [ 38866( 529): 38866( 529)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.723324 182129 task_signals.go:204] [ 38866( 529): 38872( 530)] Signal 9, PID: 38866, TID: 38872, fault addr: 0x0: terminating thread group D0318 14:42:27.723506 182129 task_exit.go:204] [ 38866( 529): 38872( 530)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.723910 182129 task_exit.go:204] [ 38866( 529): 38866( 529)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.725047 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.725131 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 39 D0318 14:42:27.725199 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:27.738014 182129 task_exit.go:204] [ 38866( 529): 38872( 530)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.738103 182129 task_exit.go:204] [ 38866( 529): 38872( 530)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.738276 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.738528 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.738590 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 40 D0318 14:42:27.738671 182129 task_exit.go:204] [ 38866( 529): 38866( 529)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.738703 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.739756 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.740162 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 37 14:42:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x10}, {0x10, 0x1}], 0x20}, 0x0) D0318 14:42:27.741522 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.742169 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.742303 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 41 D0318 14:42:27.742388 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.743461 182129 usertrap_amd64.go:212] [ 38871(1338): 38875(1339)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.743518 182129 usertrap_amd64.go:122] [ 38871(1338): 38875(1339)] Allocate a new trap: 0xc0043f0a50 42 D0318 14:42:27.743659 182129 usertrap_amd64.go:225] [ 38871(1338): 38875(1339)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:27.746054 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.746161 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 38 D0318 14:42:27.746299 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.748481 182129 usertrap_amd64.go:212] [ 38871(1338): 38871(1338)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.748538 182129 usertrap_amd64.go:122] [ 38871(1338): 38871(1338)] Allocate a new trap: 0xc0043f0a50 43 D0318 14:42:27.748673 182129 usertrap_amd64.go:225] [ 38871(1338): 38871(1338)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:27.755482 182129 task_exit.go:204] [ 38871(1338): 38871(1338)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.756551 182129 task_exit.go:204] [ 38871(1338): 38871(1338)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.756528 182129 task_signals.go:204] [ 38871(1338): 38875(1339)] Signal 9, PID: 38871, TID: 38875, fault addr: 0x0: terminating thread group D0318 14:42:27.756929 182129 task_exit.go:204] [ 38871(1338): 38875(1339)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.763598 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.763775 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 39 D0318 14:42:27.763933 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.765352 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.765580 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 36 D0318 14:42:27.766752 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.768679 182129 task_exit.go:204] [ 38871(1338): 38875(1339)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.768838 182129 task_exit.go:204] [ 38871(1338): 38875(1339)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.769009 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.769214 182129 task_exit.go:204] [ 38871(1338): 38871(1338)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[@rights={{0x10}}], 0x10}, 0x0) D0318 14:42:27.772577 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.772634 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 37 D0318 14:42:27.772725 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.775540 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.775728 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 40 D0318 14:42:27.775852 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.778324 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.778481 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 41 D0318 14:42:27.778684 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.779087 182129 usertrap_amd64.go:212] [ 38873( 601): 38877( 602)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.779199 182129 usertrap_amd64.go:122] [ 38873( 601): 38877( 602)] Allocate a new trap: 0xc000706660 42 D0318 14:42:27.779293 182129 usertrap_amd64.go:225] [ 38873( 601): 38877( 602)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.781806 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.781933 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 36 D0318 14:42:27.783154 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.784401 182129 usertrap_amd64.go:212] [ 38873( 601): 38873( 601)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.784485 182129 usertrap_amd64.go:122] [ 38873( 601): 38873( 601)] Allocate a new trap: 0xc000706660 43 D0318 14:42:27.784691 182129 usertrap_amd64.go:225] [ 38873( 601): 38873( 601)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.788409 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.788583 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 37 D0318 14:42:27.788723 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.792035 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.792116 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 38 D0318 14:42:27.792218 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.798944 182129 task_signals.go:204] [ 38873( 601): 38877( 602)] Signal 9, PID: 38873, TID: 38877, fault addr: 0x0: terminating thread group D0318 14:42:27.799111 182129 task_exit.go:204] [ 38873( 601): 38877( 602)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.800164 182129 task_exit.go:204] [ 38873( 601): 38877( 602)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.800248 182129 task_exit.go:204] [ 38873( 601): 38877( 602)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.800521 182129 task_exit.go:204] [ 38873( 601): 38873( 601)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.808418 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.808521 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 38 D0318 14:42:27.808610 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.808837 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.808904 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 39 D0318 14:42:27.809057 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.811041 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.811110 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 40 D0318 14:42:27.811181 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.812433 182129 task_exit.go:204] [ 38873( 601): 38873( 601)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.812548 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.814658 182129 task_exit.go:204] [ 38873( 601): 38873( 601)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.816338 182129 usertrap_amd64.go:212] [ 38874( 573): 38879( 574)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.816444 182129 usertrap_amd64.go:122] [ 38874( 573): 38879( 574)] Allocate a new trap: 0xc000881740 41 D0318 14:42:27.816542 182129 usertrap_amd64.go:225] [ 38874( 573): 38879( 574)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) 14:42:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pimreg1\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'netpci0\x00', 0x400}) D0318 14:42:27.823086 182129 usertrap_amd64.go:212] [ 38874( 573): 38874( 573)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.823184 182129 usertrap_amd64.go:122] [ 38874( 573): 38874( 573)] Allocate a new trap: 0xc000881740 42 D0318 14:42:27.823314 182129 usertrap_amd64.go:225] [ 38874( 573): 38874( 573)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.825022 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.825179 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 37 D0318 14:42:27.826291 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.828632 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.828751 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 39 D0318 14:42:27.828840 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:27.829928 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.830009 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 38 D0318 14:42:27.830163 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.831184 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.831299 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 40 D0318 14:42:27.831491 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.831859 182129 usertrap_amd64.go:212] [ 38876( 531): 38880( 532)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.831955 182129 usertrap_amd64.go:122] [ 38876( 531): 38880( 532)] Allocate a new trap: 0xc000681440 41 D0318 14:42:27.832075 182129 usertrap_amd64.go:225] [ 38876( 531): 38880( 532)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.833412 182129 task_exit.go:204] [ 38874( 573): 38874( 573)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.833611 182129 task_signals.go:204] [ 38874( 573): 38879( 574)] Signal 9, PID: 38874, TID: 38879, fault addr: 0x0: terminating thread group D0318 14:42:27.833774 182129 task_exit.go:204] [ 38874( 573): 38879( 574)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.834890 182129 task_exit.go:204] [ 38874( 573): 38874( 573)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.837544 182129 usertrap_amd64.go:212] [ 38876( 531): 38876( 531)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.837604 182129 usertrap_amd64.go:122] [ 38876( 531): 38876( 531)] Allocate a new trap: 0xc000681440 42 D0318 14:42:27.837740 182129 usertrap_amd64.go:225] [ 38876( 531): 38876( 531)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.844589 182129 task_exit.go:204] [ 38874( 573): 38879( 574)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.844662 182129 task_exit.go:204] [ 38874( 573): 38879( 574)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.844803 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.845004 182129 task_exit.go:204] [ 38876( 531): 38876( 531)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.845136 182129 task_exit.go:204] [ 38874( 573): 38874( 573)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.845358 182129 task_signals.go:204] [ 38876( 531): 38880( 532)] Signal 9, PID: 38876, TID: 38880, fault addr: 0x0: terminating thread group D0318 14:42:27.845474 182129 task_exit.go:204] [ 38876( 531): 38880( 532)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:27 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80006000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) D0318 14:42:27.846752 182129 task_exit.go:204] [ 38876( 531): 38880( 532)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.847020 182129 task_exit.go:204] [ 38876( 531): 38880( 532)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.847553 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.847720 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 39 D0318 14:42:27.847920 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:27.855586 182129 task_exit.go:204] [ 38876( 531): 38876( 531)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.855769 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.855999 182129 task_exit.go:204] [ 38876( 531): 38876( 531)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) D0318 14:42:27.860290 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.860367 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 40 D0318 14:42:27.860479 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.864489 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.864571 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 41 D0318 14:42:27.864715 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.864972 182129 usertrap_amd64.go:212] [ 38878(1340): 38882(1341)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.865042 182129 usertrap_amd64.go:122] [ 38878(1340): 38882(1341)] Allocate a new trap: 0xc004db1410 42 D0318 14:42:27.865111 182129 usertrap_amd64.go:225] [ 38878(1340): 38882(1341)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:27.868428 182129 usertrap_amd64.go:212] [ 38878(1340): 38878(1340)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.868469 182129 usertrap_amd64.go:122] [ 38878(1340): 38878(1340)] Allocate a new trap: 0xc004db1410 43 D0318 14:42:27.868572 182129 usertrap_amd64.go:225] [ 38878(1340): 38878(1340)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:27.874346 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.874625 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 37 D0318 14:42:27.875977 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.877296 182129 task_exit.go:204] [ 38878(1340): 38878(1340)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.877522 182129 task_signals.go:204] [ 38878(1340): 38882(1341)] Signal 9, PID: 38878, TID: 38882, fault addr: 0x0: terminating thread group D0318 14:42:27.877665 182129 task_exit.go:204] [ 38878(1340): 38882(1341)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.879117 182129 task_exit.go:204] [ 38878(1340): 38878(1340)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.881844 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:27.882000 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 38 D0318 14:42:27.882184 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:27.889469 182129 task_exit.go:204] [ 38878(1340): 38882(1341)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.889536 182129 task_exit.go:204] [ 38878(1340): 38882(1341)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.889654 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:27.889860 182129 task_exit.go:204] [ 38878(1340): 38878(1340)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1e0306003c5c9801288763"], 0xffdd) D0318 14:42:27.898142 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:27.898258 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 36 D0318 14:42:27.898159 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:27.898406 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 36 D0318 14:42:27.899274 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:27.899953 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:27.902042 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:27.902120 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 39 D0318 14:42:27.902214 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:27.903214 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:27.903306 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 37 D0318 14:42:27.903429 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:27.903997 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:27.904089 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 37 D0318 14:42:27.904210 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:27.913672 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:27.913748 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 40 D0318 14:42:27.913843 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:27.916146 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:27.916214 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 41 D0318 14:42:27.916284 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:27.916776 182129 usertrap_amd64.go:212] [ 38881( 603): 38885( 604)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:27.916863 182129 usertrap_amd64.go:122] [ 38881( 603): 38885( 604)] Allocate a new trap: 0xc003f5fc80 42 D0318 14:42:27.916962 182129 usertrap_amd64.go:225] [ 38881( 603): 38885( 604)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:27.920126 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:27.920196 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 38 D0318 14:42:27.920272 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:27.921291 182129 usertrap_amd64.go:212] [ 38881( 603): 38881( 603)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:27.921353 182129 usertrap_amd64.go:122] [ 38881( 603): 38881( 603)] Allocate a new trap: 0xc003f5fc80 43 D0318 14:42:27.921454 182129 usertrap_amd64.go:225] [ 38881( 603): 38881( 603)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:27.922650 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:27.922783 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 38 D0318 14:42:27.922890 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:27.927678 182129 task_exit.go:204] [ 38881( 603): 38881( 603)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.928020 182129 task_signals.go:204] [ 38881( 603): 38885( 604)] Signal 9, PID: 38881, TID: 38885, fault addr: 0x0: terminating thread group D0318 14:42:27.928626 182129 task_exit.go:204] [ 38881( 603): 38881( 603)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.928721 182129 task_exit.go:204] [ 38881( 603): 38885( 604)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.937809 182129 task_exit.go:204] [ 38881( 603): 38885( 604)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.937893 182129 task_exit.go:204] [ 38881( 603): 38885( 604)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.938142 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:27.938426 182129 task_exit.go:204] [ 38881( 603): 38881( 603)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.940115 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:27.940183 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 39 D0318 14:42:27.940258 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) 14:42:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000005240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d40)=[{0xb8, 0x0, 0x0, "0f681c9b9a599499da2f89126eb3edc3c199be9c87397b6dac93ce57a958fda811ed8204baa6934d108d079138f225c6fc31fad567a077d47cdeb618bd893e1af006b69e52d97027b517f331509b5343e852d9d89a3a29cccec008399abfc7c04c5e14693fdc5fec34bb811418b82733a3e63f0ab3a3a93e623dec585dca84fea241d409182a5d59c1dee98e83b87f63790387ef6366a39b3a77e50205741366b3"}, {0xf0, 0x0, 0x0, "2c4acd202e16fc5e3738d872d3fbda185298f808926ba40fddc7c1a4c397dfdfcfc436ad87cb181e9ba1b05084ac4bca202fd40f5bec9913bbf16d4d9d435699e1730446457bc5768f90fb2ff3b767a555984d83020cb9c1d5d9af5b64473f30178366720bcbc37746e2c25a6dcf3823319bb577ca1f582ccd0132b32486e71f09c9dc6d36304f9eb43ca59ab833db855b7ac7a6c341b221252f6d3eef285745a4609aadd6ca1d162c9630139e776ac987e0c648b392096242bcb9cb71075b78a793d01be5fad1a18cd28481260b079d5e65e9cda35c56e128"}, {0xe8, 0x0, 0x0, "0fbae58a2a10625afe7590f46f6cf24daee11e9aefacb73774c43dc9c7a0b80a800e55848b7a357b54f1253038938bfe6c759c0f06f282a9ca74f544f55e21c534fefee9597a037cf5ef324e78260ea0ed932668ead78c3077e147f7e7375acf160b0c219d14c76c6efb6dedf1e56331d05085bc85c8ebeccc1255aaf5f1dc378c1293eea6ec85920b3b08532c2cf8a04d0eb3ac40f24074d20b289410908d56ae8d497574a462e59338cb9aa7de5543ae85b343843a01dc5bf177331369d5feca41cbbf98fe94d258e6fe9174e03fba2e"}, {0x58, 0x1, 0x0, "b56025d8baec14b77482f4de7d613a6468f687d933c4c4aa48233c0272c50660a21f3b0cfae500f8c2dfe76d6d0fb348366ffd7e5b60fead425ee2ce47062d767a"}, {0xb0, 0x0, 0x0, "de31e0946a6c421106a092eda287940c6f42462ea7abd8dafb5e4f4c2ec8173718fe774b238ebfddd2e8fdbbfc586836d5688a744389cd9d4eecdc0143de951215ae260666bece282ab39e397add09461a3bb2845fe64de3f4bda05dc0c8ed6dfc8deae4c9f8b6a3cb6dae2955a31be723f163a6281927d248e1a290f97e56f3b53f659cb19b265d316512af82d68f657b1ae29b882a4a2ad2"}, {0x1010, 0x0, 0x0, "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"}, {0xb0, 0x0, 0x0, "47c958f9fc66a585730910b933743fba2b496188bc0ba6a725a8c46c03a6e022698a7ba3f2a77daddc8994e76d6c903a8639c2ccb3a2b87af9a0d9ced009a064d77fbfc92c1684d26adacc33d6d8ea12495123b06ced93bd7ad29a6b8d1bf329e6b40e9b48a9e1b6a1dae3be3715ea2186c14f167b0eb4b880936a7cc6d78e7696ad262feb54fe849e08541554c1dd56e57265863f5958c6f0"}, {0x70, 0x0, 0x0, "5a4cd5e462180c510b6ec8ea2589b62dbd7815a6f3f4ffb733669c9b3f0af6f6183e34e8796599a428ee986e78b5cd375d2fb1d522062ab77d3927e12cbd3466f1faf2082e0cd54a25a84b7bb656c9fb45c2f968d9c5018bfa"}, {0xb40, 0x0, 0x0, "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"}], 0x2008}, 0x0) D0318 14:42:27.942249 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:27.942333 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 37 D0318 14:42:27.942705 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:27.942799 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 40 D0318 14:42:27.942917 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:27.943163 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:27.943237 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 39 D0318 14:42:27.943312 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:27.943739 182129 usertrap_amd64.go:212] [ 38883( 533): 38887( 534)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:27.943701 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:27.943849 182129 usertrap_amd64.go:122] [ 38883( 533): 38887( 534)] Allocate a new trap: 0xc00e84eb40 41 D0318 14:42:27.943977 182129 usertrap_amd64.go:225] [ 38883( 533): 38887( 534)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:27.945891 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:27.946073 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 40 D0318 14:42:27.946218 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:27.946685 182129 usertrap_amd64.go:212] [ 38884( 575): 38888( 576)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:27.946750 182129 usertrap_amd64.go:122] [ 38884( 575): 38888( 576)] Allocate a new trap: 0xc005d97aa0 41 D0318 14:42:27.946820 182129 usertrap_amd64.go:225] [ 38884( 575): 38888( 576)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:27.948647 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:27.948723 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 38 D0318 14:42:27.948835 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:27.951057 182129 usertrap_amd64.go:212] [ 38884( 575): 38884( 575)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:27.951200 182129 usertrap_amd64.go:122] [ 38884( 575): 38884( 575)] Allocate a new trap: 0xc005d97aa0 42 D0318 14:42:27.951346 182129 usertrap_amd64.go:225] [ 38884( 575): 38884( 575)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:27.954795 182129 usertrap_amd64.go:212] [ 38883( 533): 38883( 533)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:27.954873 182129 usertrap_amd64.go:122] [ 38883( 533): 38883( 533)] Allocate a new trap: 0xc00e84eb40 42 D0318 14:42:27.955039 182129 usertrap_amd64.go:225] [ 38883( 533): 38883( 533)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:27.957035 182129 task_exit.go:204] [ 38884( 575): 38884( 575)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.957842 182129 task_signals.go:204] [ 38884( 575): 38888( 576)] Signal 9, PID: 38884, TID: 38888, fault addr: 0x0: terminating thread group D0318 14:42:27.957903 182129 task_exit.go:204] [ 38884( 575): 38884( 575)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.958048 182129 task_exit.go:204] [ 38884( 575): 38888( 576)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.966106 182129 task_exit.go:204] [ 38884( 575): 38888( 576)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.966209 182129 task_exit.go:204] [ 38884( 575): 38888( 576)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.966395 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:27.970444 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:27.970672 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 39 D0318 14:42:27.970500 182129 task_exit.go:204] [ 38884( 575): 38884( 575)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.970885 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) 14:42:27 executing program 2: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RSETATTR(r0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) timerfd_create(0x0, 0x0) D0318 14:42:27.978324 182129 task_signals.go:204] [ 38883( 533): 38887( 534)] Signal 9, PID: 38883, TID: 38887, fault addr: 0x0: terminating thread group D0318 14:42:27.978460 182129 task_exit.go:204] [ 38883( 533): 38887( 534)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.978825 182129 task_exit.go:204] [ 38883( 533): 38883( 533)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:27.979989 182129 task_exit.go:204] [ 38883( 533): 38887( 534)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.980054 182129 task_exit.go:204] [ 38883( 533): 38887( 534)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.983107 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:27.983200 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 40 D0318 14:42:27.983272 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:27.986645 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:27.986753 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 41 D0318 14:42:27.986926 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:27.986994 182129 task_exit.go:204] [ 38883( 533): 38883( 533)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:27.987285 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:27.987676 182129 task_exit.go:204] [ 38883( 533): 38883( 533)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:27.988402 182129 usertrap_amd64.go:212] [ 38886(1342): 38890(1343)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:27.988644 182129 usertrap_amd64.go:122] [ 38886(1342): 38890(1343)] Allocate a new trap: 0xc003f5fcb0 42 D0318 14:42:27.988801 182129 usertrap_amd64.go:225] [ 38886(1342): 38890(1343)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) 14:42:27 executing program 0: setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:27.993206 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:27.993410 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 37 D0318 14:42:27.994476 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:27.995712 182129 usertrap_amd64.go:212] [ 38886(1342): 38886(1342)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:27.995789 182129 usertrap_amd64.go:122] [ 38886(1342): 38886(1342)] Allocate a new trap: 0xc003f5fcb0 43 D0318 14:42:27.995881 182129 usertrap_amd64.go:225] [ 38886(1342): 38886(1342)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.000369 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.000441 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 38 D0318 14:42:28.000666 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.003296 182129 task_exit.go:204] [ 38886(1342): 38886(1342)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.004165 182129 task_signals.go:204] [ 38886(1342): 38890(1343)] Signal 9, PID: 38886, TID: 38890, fault addr: 0x0: terminating thread group D0318 14:42:28.004365 182129 task_exit.go:204] [ 38886(1342): 38886(1342)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.004659 182129 task_exit.go:204] [ 38886(1342): 38890(1343)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.013628 182129 task_exit.go:204] [ 38886(1342): 38890(1343)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.013734 182129 task_exit.go:204] [ 38886(1342): 38890(1343)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.013847 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.014086 182129 task_exit.go:204] [ 38886(1342): 38886(1342)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x43, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) ftruncate(r0, 0x0) D0318 14:42:28.019132 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:28.019246 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 36 D0318 14:42:28.024004 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:28.029142 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.029259 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 39 D0318 14:42:28.029343 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.032736 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:28.032817 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 37 D0318 14:42:28.033119 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:28.040876 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.040992 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 40 D0318 14:42:28.041151 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.041788 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:28.041895 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 36 D0318 14:42:28.043039 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:28.043342 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.043433 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 41 D0318 14:42:28.043552 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.043932 182129 usertrap_amd64.go:212] [ 38889( 605): 38893( 606)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.043996 182129 usertrap_amd64.go:122] [ 38889( 605): 38893( 606)] Allocate a new trap: 0xc00e84eb70 42 D0318 14:42:28.044149 182129 usertrap_amd64.go:225] [ 38889( 605): 38893( 606)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.047635 182129 usertrap_amd64.go:212] [ 38889( 605): 38889( 605)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.047715 182129 usertrap_amd64.go:122] [ 38889( 605): 38889( 605)] Allocate a new trap: 0xc00e84eb70 43 D0318 14:42:28.047832 182129 usertrap_amd64.go:225] [ 38889( 605): 38889( 605)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.050807 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:28.051017 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 38 D0318 14:42:28.051123 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:28.056705 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:28.056844 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 37 D0318 14:42:28.057008 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:28.059653 182129 task_exit.go:204] [ 38889( 605): 38889( 605)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.060721 182129 task_signals.go:204] [ 38889( 605): 38893( 606)] Signal 9, PID: 38889, TID: 38893, fault addr: 0x0: terminating thread group D0318 14:42:28.060889 182129 task_exit.go:204] [ 38889( 605): 38889( 605)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.061279 182129 task_exit.go:204] [ 38889( 605): 38893( 606)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.064500 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:28.064711 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 39 D0318 14:42:28.064894 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:28.068243 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:28.068646 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 40 D0318 14:42:28.068890 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:28.070325 182129 usertrap_amd64.go:212] [ 38891( 577): 38895( 578)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:28.070438 182129 usertrap_amd64.go:122] [ 38891( 577): 38895( 578)] Allocate a new trap: 0xc005d97ad0 41 D0318 14:42:28.070575 182129 usertrap_amd64.go:225] [ 38891( 577): 38895( 578)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:28.071882 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.072062 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 37 D0318 14:42:28.073481 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.073558 182129 task_exit.go:204] [ 38889( 605): 38893( 606)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.073795 182129 task_exit.go:204] [ 38889( 605): 38893( 606)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.073985 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.074163 182129 task_exit.go:204] [ 38889( 605): 38889( 605)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x103) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:28.079192 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:28.079271 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 38 D0318 14:42:28.079422 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:28.081768 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.081862 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 38 D0318 14:42:28.082007 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.096442 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.096546 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 39 D0318 14:42:28.096650 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.108208 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:28.108310 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 39 D0318 14:42:28.108450 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:28.110280 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.110426 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 40 D0318 14:42:28.110537 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.110884 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:28.110944 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 40 D0318 14:42:28.111033 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:28.111755 182129 usertrap_amd64.go:212] [ 38892( 535): 38897( 536)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:28.111874 182129 usertrap_amd64.go:122] [ 38892( 535): 38897( 536)] Allocate a new trap: 0xc005d97b00 41 D0318 14:42:28.111968 182129 usertrap_amd64.go:225] [ 38892( 535): 38897( 536)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:28.112730 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.112883 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 41 D0318 14:42:28.112992 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.113781 182129 usertrap_amd64.go:212] [ 38892( 535): 38892( 535)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:28.113847 182129 usertrap_amd64.go:122] [ 38892( 535): 38892( 535)] Allocate a new trap: 0xc005d97b00 42 D0318 14:42:28.113974 182129 usertrap_amd64.go:225] [ 38892( 535): 38892( 535)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:28.114546 182129 usertrap_amd64.go:212] [ 38894(1344): 38898(1345)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.114725 182129 usertrap_amd64.go:122] [ 38894(1344): 38898(1345)] Allocate a new trap: 0xc0006814a0 42 D0318 14:42:28.114881 182129 usertrap_amd64.go:225] [ 38894(1344): 38898(1345)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.122020 182129 usertrap_amd64.go:212] [ 38894(1344): 38894(1344)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.122143 182129 usertrap_amd64.go:122] [ 38894(1344): 38894(1344)] Allocate a new trap: 0xc0006814a0 43 D0318 14:42:28.122239 182129 usertrap_amd64.go:225] [ 38894(1344): 38894(1344)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.131671 182129 task_exit.go:204] [ 38894(1344): 38894(1344)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.132561 182129 task_signals.go:204] [ 38894(1344): 38898(1345)] Signal 9, PID: 38894, TID: 38898, fault addr: 0x0: terminating thread group D0318 14:42:28.132744 182129 task_exit.go:204] [ 38894(1344): 38894(1344)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.133219 182129 task_exit.go:204] [ 38894(1344): 38898(1345)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.139167 182129 task_exit.go:204] [ 38892( 535): 38892( 535)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.140411 182129 task_signals.go:204] [ 38892( 535): 38897( 536)] Signal 9, PID: 38892, TID: 38897, fault addr: 0x0: terminating thread group D0318 14:42:28.140557 182129 task_exit.go:204] [ 38892( 535): 38897( 536)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.140923 182129 task_exit.go:204] [ 38892( 535): 38892( 535)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.141832 182129 task_exit.go:204] [ 38894(1344): 38898(1345)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.141912 182129 task_exit.go:204] [ 38894(1344): 38898(1345)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.142013 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.142627 182129 task_exit.go:204] [ 38894(1344): 38894(1344)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x7, 0x0, 0x0, 0x4}, {0x7, 0x3, 0x0, 0x7ff}, {0x7fc7, 0x6, 0x8, 0x2}]}) (async) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x7, 0x0, 0x0, 0x4}, {0x7, 0x3, 0x0, 0x7ff}, {0x7fc7, 0x6, 0x8, 0x2}]}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000100)={{0x0, 0x7fff, 0x1, 0xdc8f, 0x2, 0x4, 0x0, 0x8b23, 0x7ac7, 0xffff, 0xfffffffa, 0xffffffffffffffff, 0xa579, 0x0, 0x2bc9}}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001640)={{r1, 0x100000001, 0x6, 0x100, 0x3f, 0x0, 0x0, 0x1, 0x4, 0x3, 0x5, 0x2, 0x40, 0x8001, 0x7fffffff}}) creat(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) (async) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r2) D0318 14:42:28.145569 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.145880 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 37 D0318 14:42:28.147064 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.149922 182129 task_exit.go:204] [ 38892( 535): 38897( 536)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.150021 182129 task_exit.go:204] [ 38892( 535): 38897( 536)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.150158 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:28.150443 182129 task_exit.go:204] [ 38892( 535): 38892( 535)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x43, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) ftruncate(r0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) (async) socket$inet6_icmp(0xa, 0x2, 0x3a) (async) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x43, 0x0, &(0x7f0000000040)) (async) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) (async) ftruncate(r0, 0x0) (async) D0318 14:42:28.161856 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.161991 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 38 D0318 14:42:28.162077 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.178476 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.178595 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 39 D0318 14:42:28.178750 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.183504 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.183597 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 37 D0318 14:42:28.187992 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.191890 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.192185 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 40 D0318 14:42:28.192474 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.193235 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.193324 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 38 D0318 14:42:28.193408 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.195382 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.195717 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 41 D0318 14:42:28.195935 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.196453 182129 usertrap_amd64.go:212] [ 38896( 607): 38903( 608)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.196649 182129 usertrap_amd64.go:122] [ 38896( 607): 38903( 608)] Allocate a new trap: 0xc005d97b30 42 D0318 14:42:28.196861 182129 usertrap_amd64.go:225] [ 38896( 607): 38903( 608)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.202448 182129 usertrap_amd64.go:212] [ 38896( 607): 38896( 607)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.202564 182129 usertrap_amd64.go:122] [ 38896( 607): 38896( 607)] Allocate a new trap: 0xc005d97b30 43 D0318 14:42:28.202652 182129 usertrap_amd64.go:225] [ 38896( 607): 38896( 607)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.207363 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:28.207495 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 36 D0318 14:42:28.208690 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:28.215721 182129 task_exit.go:204] [ 38896( 607): 38896( 607)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.216137 182129 task_signals.go:204] [ 38896( 607): 38903( 608)] Signal 9, PID: 38896, TID: 38903, fault addr: 0x0: terminating thread group D0318 14:42:28.216222 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:28.216299 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 37 D0318 14:42:28.216434 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:28.216900 182129 task_exit.go:204] [ 38896( 607): 38896( 607)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.217333 182129 task_exit.go:204] [ 38896( 607): 38903( 608)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.223055 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.223121 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 39 D0318 14:42:28.223279 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.226519 182129 task_exit.go:204] [ 38896( 607): 38903( 608)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.226650 182129 task_exit.go:204] [ 38896( 607): 38903( 608)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.226792 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.226984 182129 task_exit.go:204] [ 38896( 607): 38896( 607)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: setxattr$trusted_overlay_origin(0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:28.233556 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.233689 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 40 D0318 14:42:28.233787 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.239731 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.239796 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 41 D0318 14:42:28.239918 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.240211 182129 usertrap_amd64.go:212] [ 38900(1346): 38904(1347)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.240313 182129 usertrap_amd64.go:122] [ 38900(1346): 38904(1347)] Allocate a new trap: 0xc0043f0ae0 42 D0318 14:42:28.240493 182129 usertrap_amd64.go:225] [ 38900(1346): 38904(1347)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.242259 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:28.242436 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 38 D0318 14:42:28.242621 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:28.254115 182129 usertrap_amd64.go:212] [ 38900(1346): 38900(1346)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.254184 182129 usertrap_amd64.go:122] [ 38900(1346): 38900(1346)] Allocate a new trap: 0xc0043f0ae0 43 D0318 14:42:28.254289 182129 usertrap_amd64.go:225] [ 38900(1346): 38900(1346)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.257089 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:28.257183 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 39 D0318 14:42:28.257367 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:28.260121 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:28.260219 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 40 D0318 14:42:28.260383 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:28.260902 182129 usertrap_amd64.go:212] [ 38901( 537): 38907( 538)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:28.261133 182129 usertrap_amd64.go:122] [ 38901( 537): 38907( 538)] Allocate a new trap: 0xc000e68840 41 D0318 14:42:28.261285 182129 usertrap_amd64.go:225] [ 38901( 537): 38907( 538)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:28.262185 182129 task_signals.go:204] [ 38900(1346): 38906(1348)] Signal 9, PID: 38900, TID: 38906, fault addr: 0x0: terminating thread group D0318 14:42:28.262492 182129 task_signals.go:204] [ 38900(1346): 38904(1347)] Signal 9, PID: 38900, TID: 38904, fault addr: 0x0: terminating thread group D0318 14:42:28.262662 182129 task_exit.go:204] [ 38900(1346): 38906(1348)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.262795 182129 task_exit.go:204] [ 38900(1346): 38900(1346)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.263542 182129 task_exit.go:204] [ 38900(1346): 38904(1347)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.264920 182129 task_exit.go:204] [ 38900(1346): 38904(1347)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.265068 182129 task_exit.go:204] [ 38900(1346): 38904(1347)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.266236 182129 task_exit.go:204] [ 38900(1346): 38906(1348)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.266444 182129 task_exit.go:204] [ 38900(1346): 38906(1348)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.276531 182129 task_exit.go:204] [ 38900(1346): 38900(1346)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.276822 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.277144 182129 task_exit.go:204] [ 38900(1346): 38900(1346)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x103) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:28.288237 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68d3d1ae:sysno 230 D0318 14:42:28.288522 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 42 D0318 14:42:28.288653 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68d3d1ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:28.291999 182129 usertrap_amd64.go:212] [ 38901( 537): 38901( 537)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:28.292348 182129 usertrap_amd64.go:122] [ 38901( 537): 38901( 537)] Allocate a new trap: 0xc000e68840 43 D0318 14:42:28.292545 182129 usertrap_amd64.go:225] [ 38901( 537): 38901( 537)] Apply the binary patch addr 560b68d10c93 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0318 14:42:28.294628 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.294897 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 37 D0318 14:42:28.295599 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c731ae:sysno 230 D0318 14:42:28.295953 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 42 D0318 14:42:28.296177 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.296262 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c731ae trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:28.301893 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.301989 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 38 D0318 14:42:28.302092 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.303441 182129 task_exit.go:204] [ 38901( 537): 38901( 537)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.303692 182129 task_signals.go:204] [ 38901( 537): 38907( 538)] Signal 9, PID: 38901, TID: 38907, fault addr: 0x0: terminating thread group D0318 14:42:28.303773 182129 task_signals.go:204] [ 38901( 537): 38909( 539)] Signal 9, PID: 38901, TID: 38909, fault addr: 0x0: terminating thread group D0318 14:42:28.303928 182129 task_exit.go:204] [ 38901( 537): 38907( 538)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.304153 182129 task_signals.go:204] [ 38901( 537): 38910( 540)] Signal 9, PID: 38901, TID: 38910, fault addr: 0x0: terminating thread group D0318 14:42:28.304199 182129 task_exit.go:204] [ 38901( 537): 38909( 539)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.306129 182129 task_exit.go:204] [ 38901( 537): 38907( 538)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.306310 182129 task_exit.go:204] [ 38901( 537): 38907( 538)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.306493 182129 task_exit.go:204] [ 38901( 537): 38910( 540)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.307789 182129 task_exit.go:204] [ 38901( 537): 38901( 537)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.308160 182129 task_exit.go:204] [ 38901( 537): 38909( 539)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.308257 182129 task_exit.go:204] [ 38901( 537): 38909( 539)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.320154 182129 task_exit.go:204] [ 38901( 537): 38910( 540)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.320257 182129 task_exit.go:204] [ 38901( 537): 38910( 540)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.320476 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:28.320689 182129 task_exit.go:204] [ 38901( 537): 38901( 537)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private2}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001400)='./file0\x00', 0x0, r3) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@multicast1, 0x4e24, 0x0, 0x4e24, 0x0, 0xa, 0xa0, 0x20, 0x33, r1, r2}, {0x9, 0xffffffffffffeba1, 0x1, 0x6, 0xa1c8, 0x8000000000000000, 0x7fffffff, 0x140000000}, {0x4, 0xfffffffffffff801, 0x10000, 0x7fff}, 0x1, 0x6e6bbf, 0x0, 0x0, 0x1, 0x3}, {{@in=@local, 0x4d2, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, '\x00', 0x12}, 0x3503, 0x2, 0x2, 0x1, 0x3, 0x5, 0x10001}}, 0xe8) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x200, 0xfffffffffffffffc}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pressure(r4, &(0x7f0000000080)={'full'}, 0xfffffee6) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000340)=0x3) D0318 14:42:28.324300 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.324416 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 39 D0318 14:42:28.324568 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.329943 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.330076 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 37 D0318 14:42:28.331284 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.337428 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.337558 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 38 D0318 14:42:28.337661 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.350249 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.350339 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 40 D0318 14:42:28.350453 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.354216 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.354328 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 41 D0318 14:42:28.354423 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.355662 182129 usertrap_amd64.go:212] [ 38908( 609): 38912( 610)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.356159 182129 usertrap_amd64.go:122] [ 38908( 609): 38912( 610)] Allocate a new trap: 0xc000428c90 42 D0318 14:42:28.356285 182129 usertrap_amd64.go:225] [ 38908( 609): 38912( 610)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.359877 182129 usertrap_amd64.go:212] [ 38908( 609): 38908( 609)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.360081 182129 usertrap_amd64.go:122] [ 38908( 609): 38908( 609)] Allocate a new trap: 0xc000428c90 43 D0318 14:42:28.360200 182129 usertrap_amd64.go:225] [ 38908( 609): 38908( 609)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.364347 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.364487 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 39 D0318 14:42:28.364635 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.373348 182129 task_exit.go:204] [ 38908( 609): 38908( 609)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.374807 182129 task_signals.go:204] [ 38908( 609): 38912( 610)] Signal 9, PID: 38908, TID: 38912, fault addr: 0x0: terminating thread group D0318 14:42:28.374808 182129 task_exit.go:204] [ 38908( 609): 38908( 609)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.375218 182129 task_exit.go:204] [ 38908( 609): 38912( 610)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.386080 182129 task_exit.go:204] [ 38908( 609): 38912( 610)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.386260 182129 task_exit.go:204] [ 38908( 609): 38912( 610)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.386450 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.386742 182129 task_exit.go:204] [ 38908( 609): 38908( 609)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) dup3(r1, r0, 0x0) ftruncate(r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a31baf4ff6edd9859ac7952b6b29c3d1d495de10b2ed5718e7a075dd7fc22464651671e712fb75763e5d83bbc7e1c3cb00ac9a9da3a33820dbb411039aa6ae4edd89b7736f6774459649ce4e22b88838f47e688125a57da12606ec904bf06f768d6d5610cf3d879f77b7660c1d4d362c44dd34097fd1fd433ae152006f368157df4928532f0eeff239bca9d85a77139d1bab8defec7be0ee62e0944a64f7a5fb6f1077b278db67e3c5d5dbdcbfac6502b6a04e2108cea2d72095bea82a3a7b29440a8383fe003fd2ce3611d1d7aeecb0fa6bfa2bd9e484ffbbbc82ec92eee2db8"], 0xe3) D0318 14:42:28.393809 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:28.393982 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 36 D0318 14:42:28.395022 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.395095 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:28.395143 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 40 D0318 14:42:28.395234 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.397740 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.397892 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 41 D0318 14:42:28.398037 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.398512 182129 usertrap_amd64.go:212] [ 38911(1349): 38914(1350)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.398614 182129 usertrap_amd64.go:122] [ 38911(1349): 38914(1350)] Allocate a new trap: 0xc005d97b90 42 D0318 14:42:28.398730 182129 usertrap_amd64.go:225] [ 38911(1349): 38914(1350)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.407770 182129 usertrap_amd64.go:212] [ 38911(1349): 38911(1349)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.407841 182129 usertrap_amd64.go:122] [ 38911(1349): 38911(1349)] Allocate a new trap: 0xc005d97b90 43 D0318 14:42:28.408041 182129 usertrap_amd64.go:225] [ 38911(1349): 38911(1349)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.409882 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:28.409986 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 37 D0318 14:42:28.410176 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:28.413771 182129 task_exit.go:204] [ 38911(1349): 38911(1349)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.414002 182129 task_signals.go:204] [ 38911(1349): 38915(1351)] Signal 9, PID: 38911, TID: 38915, fault addr: 0x0: terminating thread group D0318 14:42:28.414871 182129 task_signals.go:204] [ 38911(1349): 38914(1350)] Signal 9, PID: 38911, TID: 38914, fault addr: 0x0: terminating thread group D0318 14:42:28.414986 182129 task_exit.go:204] [ 38911(1349): 38911(1349)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.415186 182129 task_exit.go:204] [ 38911(1349): 38915(1351)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.416298 182129 task_exit.go:204] [ 38911(1349): 38915(1351)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.416449 182129 task_exit.go:204] [ 38911(1349): 38915(1351)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.416735 182129 task_exit.go:204] [ 38911(1349): 38914(1350)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.428435 182129 task_exit.go:204] [ 38911(1349): 38914(1350)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.428592 182129 task_exit.go:204] [ 38911(1349): 38914(1350)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.428789 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.431023 182129 task_exit.go:204] [ 38911(1349): 38911(1349)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: setxattr$trusted_overlay_origin(0x0, 0x0, &(0x7f00000000c0), 0x2, 0xf320424091cfa842) D0318 14:42:28.433987 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:28.434283 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 38 D0318 14:42:28.434826 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:28.450449 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:28.450735 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 39 D0318 14:42:28.450851 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:28.454760 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:28.454885 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 40 D0318 14:42:28.454982 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:28.455354 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.455309 182129 usertrap_amd64.go:212] [ 38913( 541): 38917( 542)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:28.455483 182129 usertrap_amd64.go:122] [ 38913( 541): 38917( 542)] Allocate a new trap: 0xc0008817a0 41 D0318 14:42:28.455571 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 37 D0318 14:42:28.455640 182129 usertrap_amd64.go:225] [ 38913( 541): 38917( 542)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:28.456709 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.464304 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.464511 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 38 D0318 14:42:28.464705 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.493577 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.493766 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 39 D0318 14:42:28.494275 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.498292 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.498547 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 37 D0318 14:42:28.499861 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.517226 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.517368 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 40 D0318 14:42:28.517520 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.520273 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.520402 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 38 D0318 14:42:28.520536 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.521613 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68d3d1ae:sysno 230 D0318 14:42:28.521769 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 42 D0318 14:42:28.521894 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68d3d1ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:28.523729 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.523848 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 41 D0318 14:42:28.524043 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.524275 182129 usertrap_amd64.go:212] [ 38916( 611): 38920( 612)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.524340 182129 usertrap_amd64.go:122] [ 38916( 611): 38920( 612)] Allocate a new trap: 0xc005f00de0 42 D0318 14:42:28.524482 182129 usertrap_amd64.go:225] [ 38916( 611): 38920( 612)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.540589 182129 usertrap_amd64.go:212] [ 38916( 611): 38916( 611)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.540691 182129 usertrap_amd64.go:122] [ 38916( 611): 38916( 611)] Allocate a new trap: 0xc005f00de0 43 D0318 14:42:28.540769 182129 usertrap_amd64.go:225] [ 38916( 611): 38916( 611)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.548099 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.548220 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 39 D0318 14:42:28.548317 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.561075 182129 task_exit.go:204] [ 38916( 611): 38916( 611)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.561710 182129 task_signals.go:204] [ 38916( 611): 38920( 612)] Signal 9, PID: 38916, TID: 38920, fault addr: 0x0: terminating thread group D0318 14:42:28.562700 182129 task_exit.go:204] [ 38916( 611): 38916( 611)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.562947 182129 task_exit.go:204] [ 38916( 611): 38920( 612)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.565247 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.565328 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 40 D0318 14:42:28.565496 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.568771 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.568856 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 41 D0318 14:42:28.569001 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.569689 182129 usertrap_amd64.go:212] [ 38918(1352): 38921(1353)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.569804 182129 usertrap_amd64.go:122] [ 38918(1352): 38921(1353)] Allocate a new trap: 0xc0014a5290 42 D0318 14:42:28.570070 182129 usertrap_amd64.go:225] [ 38918(1352): 38921(1353)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.572450 182129 usertrap_amd64.go:212] [ 38918(1352): 38918(1352)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.572617 182129 usertrap_amd64.go:122] [ 38918(1352): 38918(1352)] Allocate a new trap: 0xc0014a5290 43 D0318 14:42:28.572717 182129 usertrap_amd64.go:225] [ 38918(1352): 38918(1352)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.574824 182129 task_exit.go:204] [ 38916( 611): 38920( 612)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.574955 182129 task_exit.go:204] [ 38916( 611): 38920( 612)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.575155 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.575691 182129 task_exit.go:204] [ 38916( 611): 38916( 611)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x410, 0x103) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, 0x0, 0xfb887be8a6a88b35) D0318 14:42:28.594325 182129 task_exit.go:204] [ 38918(1352): 38918(1352)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.595661 182129 task_exit.go:204] [ 38918(1352): 38918(1352)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.595643 182129 task_signals.go:204] [ 38918(1352): 38921(1353)] Signal 9, PID: 38918, TID: 38921, fault addr: 0x0: terminating thread group D0318 14:42:28.595909 182129 task_exit.go:204] [ 38918(1352): 38921(1353)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.606848 182129 task_exit.go:204] [ 38918(1352): 38921(1353)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.606939 182129 task_exit.go:204] [ 38918(1352): 38921(1353)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.607144 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.607944 182129 task_exit.go:204] [ 38918(1352): 38918(1352)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) dup3(r1, r0, 0x0) (async) ftruncate(r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a31baf4ff6edd9859ac7952b6b29c3d1d495de10b2ed5718e7a075dd7fc22464651671e712fb75763e5d83bbc7e1c3cb00ac9a9da3a33820dbb411039aa6ae4edd89b7736f6774459649ce4e22b88838f47e688125a57da12606ec904bf06f768d6d5610cf3d879f77b7660c1d4d362c44dd34097fd1fd433ae152006f368157df4928532f0eeff239bca9d85a77139d1bab8defec7be0ee62e0944a64f7a5fb6f1077b278db67e3c5d5dbdcbfac6502b6a04e2108cea2d72095bea82a3a7b29440a8383fe003fd2ce3611d1d7aeecb0fa6bfa2bd9e484ffbbbc82ec92eee2db8"], 0xe3) D0318 14:42:28.644868 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.645129 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 37 D0318 14:42:28.646967 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.654730 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.654875 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 38 D0318 14:42:28.655000 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.661391 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.661599 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 37 D0318 14:42:28.662780 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.671002 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.671228 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 38 D0318 14:42:28.671345 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.678988 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.679117 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 39 D0318 14:42:28.679253 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.696745 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.696878 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 39 D0318 14:42:28.697186 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.706241 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.706406 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 40 D0318 14:42:28.706514 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.707338 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.707452 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 40 D0318 14:42:28.707562 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.709233 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.709319 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 41 D0318 14:42:28.709434 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.709905 182129 usertrap_amd64.go:212] [ 38922( 613): 38924( 614)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.709989 182129 usertrap_amd64.go:122] [ 38922( 613): 38924( 614)] Allocate a new trap: 0xc000706690 42 D0318 14:42:28.710081 182129 usertrap_amd64.go:225] [ 38922( 613): 38924( 614)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.712561 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.712636 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 41 D0318 14:42:28.712715 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.713847 182129 usertrap_amd64.go:212] [ 38923(1354): 38925(1355)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.714058 182129 usertrap_amd64.go:122] [ 38923(1354): 38925(1355)] Allocate a new trap: 0xc000681560 42 D0318 14:42:28.714423 182129 usertrap_amd64.go:225] [ 38923(1354): 38925(1355)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.717393 182129 usertrap_amd64.go:212] [ 38922( 613): 38922( 613)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.717667 182129 usertrap_amd64.go:122] [ 38922( 613): 38922( 613)] Allocate a new trap: 0xc000706690 43 D0318 14:42:28.717879 182129 usertrap_amd64.go:225] [ 38922( 613): 38922( 613)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.725424 182129 usertrap_amd64.go:212] [ 38923(1354): 38923(1354)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.725557 182129 usertrap_amd64.go:122] [ 38923(1354): 38923(1354)] Allocate a new trap: 0xc000681560 43 D0318 14:42:28.725706 182129 usertrap_amd64.go:225] [ 38923(1354): 38923(1354)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.735454 182129 task_exit.go:204] [ 38922( 613): 38922( 613)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.736581 182129 task_signals.go:204] [ 38922( 613): 38924( 614)] Signal 9, PID: 38922, TID: 38924, fault addr: 0x0: terminating thread group D0318 14:42:28.736626 182129 task_exit.go:204] [ 38922( 613): 38922( 613)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.736732 182129 task_exit.go:204] [ 38922( 613): 38924( 614)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.743968 182129 task_exit.go:204] [ 38923(1354): 38923(1354)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.744505 182129 task_signals.go:204] [ 38923(1354): 38926(1356)] Signal 9, PID: 38923, TID: 38926, fault addr: 0x0: terminating thread group D0318 14:42:28.744612 182129 task_signals.go:204] [ 38923(1354): 38925(1355)] Signal 9, PID: 38923, TID: 38925, fault addr: 0x0: terminating thread group D0318 14:42:28.745808 182129 task_exit.go:204] [ 38923(1354): 38923(1354)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.746115 182129 task_exit.go:204] [ 38923(1354): 38926(1356)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.747134 182129 task_exit.go:204] [ 38923(1354): 38925(1355)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.747559 182129 task_exit.go:204] [ 38923(1354): 38926(1356)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.747801 182129 task_exit.go:204] [ 38923(1354): 38926(1356)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.749400 182129 task_exit.go:204] [ 38922( 613): 38924( 614)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.749490 182129 task_exit.go:204] [ 38922( 613): 38924( 614)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.749847 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.750085 182129 task_exit.go:204] [ 38922( 613): 38922( 613)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0xf320424091cfa842) D0318 14:42:28.758897 182129 task_exit.go:204] [ 38923(1354): 38925(1355)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.758974 182129 task_exit.go:204] [ 38923(1354): 38925(1355)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.759153 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.759710 182129 task_exit.go:204] [ 38923(1354): 38923(1354)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x410, 0x103) (async) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, 0x0, 0xfb887be8a6a88b35) D0318 14:42:28.820832 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.820976 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 37 D0318 14:42:28.822313 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.827758 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.827842 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 38 D0318 14:42:28.827942 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.836395 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.836752 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 37 D0318 14:42:28.838505 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.844632 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.844783 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 38 D0318 14:42:28.844878 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.845862 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.845987 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 39 D0318 14:42:28.846176 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:28.859654 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:28.859798 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 40 D0318 14:42:28.860072 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:28.862666 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:28.862791 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 39 D0318 14:42:28.862821 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:28.862945 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 41 D0318 14:42:28.862988 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:28.863079 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:28.863596 182129 usertrap_amd64.go:212] [ 38927(1357): 38929(1358)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:28.863825 182129 usertrap_amd64.go:122] [ 38927(1357): 38929(1358)] Allocate a new trap: 0xc0014a52c0 42 D0318 14:42:28.863943 182129 usertrap_amd64.go:225] [ 38927(1357): 38929(1358)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:28.872416 182129 usertrap_amd64.go:212] [ 38927(1357): 38927(1357)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:28.872579 182129 usertrap_amd64.go:122] [ 38927(1357): 38927(1357)] Allocate a new trap: 0xc0014a52c0 43 D0318 14:42:28.872852 182129 usertrap_amd64.go:225] [ 38927(1357): 38927(1357)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:28.877201 182129 usertrap_amd64.go:212] [ 38891( 577): 38891( 577)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:28.877328 182129 usertrap_amd64.go:122] [ 38891( 577): 38891( 577)] Allocate a new trap: 0xc005d97ad0 43 D0318 14:42:28.877599 182129 usertrap_amd64.go:225] [ 38891( 577): 38891( 577)] Apply the binary patch addr 556d17c46c93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 14:42:28.878064 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:28.878191 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 40 D0318 14:42:28.878314 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:28.880576 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:28.880697 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 41 D0318 14:42:28.880843 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:28.881223 182129 usertrap_amd64.go:212] [ 38928( 615): 38931( 616)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:28.881293 182129 usertrap_amd64.go:122] [ 38928( 615): 38931( 616)] Allocate a new trap: 0xc0006815f0 42 D0318 14:42:28.881375 182129 usertrap_amd64.go:225] [ 38928( 615): 38931( 616)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:28.882646 182129 task_exit.go:204] [ 38927(1357): 38927(1357)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.882844 182129 task_signals.go:204] [ 38927(1357): 38930(1359)] Signal 9, PID: 38927, TID: 38930, fault addr: 0x0: terminating thread group D0318 14:42:28.883004 182129 task_signals.go:204] [ 38927(1357): 38929(1358)] Signal 9, PID: 38927, TID: 38929, fault addr: 0x0: terminating thread group D0318 14:42:28.883000 182129 usertrap_amd64.go:212] [ 38928( 615): 38928( 615)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:28.883112 182129 usertrap_amd64.go:122] [ 38928( 615): 38928( 615)] Allocate a new trap: 0xc0006815f0 43 D0318 14:42:28.883057 182129 task_exit.go:204] [ 38927(1357): 38930(1359)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.883247 182129 usertrap_amd64.go:225] [ 38928( 615): 38928( 615)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:28.884122 182129 task_exit.go:204] [ 38927(1357): 38929(1358)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.884859 182129 task_exit.go:204] [ 38927(1357): 38930(1359)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.884983 182129 task_exit.go:204] [ 38927(1357): 38930(1359)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.885156 182129 task_exit.go:204] [ 38927(1357): 38927(1357)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.890986 182129 task_exit.go:204] [ 38928( 615): 38928( 615)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.892199 182129 task_signals.go:204] [ 38928( 615): 38931( 616)] Signal 9, PID: 38928, TID: 38931, fault addr: 0x0: terminating thread group D0318 14:42:28.892230 182129 task_exit.go:204] [ 38928( 615): 38928( 615)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.892598 182129 task_exit.go:204] [ 38928( 615): 38931( 616)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:28.895549 182129 task_exit.go:204] [ 38927(1357): 38929(1358)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.895659 182129 task_exit.go:204] [ 38927(1357): 38929(1358)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.895773 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:28.895926 182129 task_exit.go:204] [ 38927(1357): 38927(1357)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ftruncate(r0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000000)) D0318 14:42:28.902739 182129 task_exit.go:204] [ 38928( 615): 38931( 616)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:28.902825 182129 task_exit.go:204] [ 38928( 615): 38931( 616)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:28.903007 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:28.903233 182129 task_exit.go:204] [ 38928( 615): 38928( 615)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:28 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f0000000100)={0x0, 0xfb, 0xfb, 0x0, 0x9, "169101f540b9fe2b6bca64330bcc89e7", "1aeb7362427a5d3d56ee6ec2f64f686d6a8394c50db73bfd60cf86e665aabc0d7b55c070f9d46d814c54c6464dee93fc1fe66a5710a00d160638c0135cab04c51888c3c3eeeaa65387f86e1f078336bdc135866f953c891d6d13b5c3b0faad7248af12a81b8bedeb03ffbb85f841fde5a15e2b474d3e0fe8dd7fc9bc1bd55475366785a40f3791c8fce6082f39c69e0bd65495c307883c7fb026d87c24485e97f04c07c72dae9f85b254786a0d56c49a56d56a94c54847ddbfb9529be70967faa96770d4c4482eea093bae255e6dc76cac16bc5013504734be476a8b1966332639b8e26f69a0"}, 0xfb, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) D0318 14:42:28.958420 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:28.958615 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 37 D0318 14:42:28.959888 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:28.963115 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:28.963432 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 37 D0318 14:42:28.964739 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:28.964847 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 38 D0318 14:42:28.965094 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:28.967017 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:28.973589 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:28.973698 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 38 D0318 14:42:28.973841 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:28.985306 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:28.985446 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 39 D0318 14:42:28.985601 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:29.001441 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:29.001601 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 40 D0318 14:42:29.001708 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:29.003679 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:29.003889 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 41 D0318 14:42:29.004064 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:29.004331 182129 usertrap_amd64.go:212] [ 38932(1360): 38934(1361)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:29.004454 182129 usertrap_amd64.go:122] [ 38932(1360): 38934(1361)] Allocate a new trap: 0xc000e688d0 42 D0318 14:42:29.004535 182129 usertrap_amd64.go:225] [ 38932(1360): 38934(1361)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:29.005890 182129 task_signals.go:470] [ 38891( 577): 38895( 578)] Notified of signal 13 D0318 14:42:29.006214 182129 task_signals.go:470] [ 38891( 577): 38899( 579)] Notified of signal 13 D0318 14:42:29.006624 182129 task_signals.go:204] [ 38891( 577): 38899( 579)] Signal 13, PID: 38891, TID: 38899, fault addr: 0x0: terminating thread group D0318 14:42:29.006816 182129 task_exit.go:204] [ 38891( 577): 38899( 579)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.006609 182129 task_signals.go:204] [ 38891( 577): 38895( 578)] Signal 13, PID: 38891, TID: 38895, fault addr: 0x0: terminating thread group D0318 14:42:29.007980 182129 task_signals.go:204] [ 38891( 577): 38905( 581)] Signal 9, PID: 38891, TID: 38905, fault addr: 0x0: terminating thread group D0318 14:42:29.008065 182129 task_signals.go:204] [ 38891( 577): 38902( 580)] Signal 9, PID: 38891, TID: 38902, fault addr: 0x0: terminating thread group D0318 14:42:29.008156 182129 task_signals.go:204] [ 38891( 577): 38891( 577)] Signal 9, PID: 38891, TID: 38891, fault addr: 0x0: terminating thread group D0318 14:42:29.008287 182129 task_exit.go:204] [ 38891( 577): 38899( 579)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.008415 182129 task_exit.go:204] [ 38891( 577): 38899( 579)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.008689 182129 task_exit.go:204] [ 38891( 577): 38895( 578)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.008803 182129 task_exit.go:204] [ 38891( 577): 38905( 581)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.009130 182129 usertrap_amd64.go:212] [ 38932(1360): 38932(1360)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:29.009328 182129 usertrap_amd64.go:122] [ 38932(1360): 38932(1360)] Allocate a new trap: 0xc000e688d0 43 D0318 14:42:29.009541 182129 usertrap_amd64.go:225] [ 38932(1360): 38932(1360)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:29.009529 182129 task_exit.go:204] [ 38891( 577): 38902( 580)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.010670 182129 task_exit.go:204] [ 38891( 577): 38891( 577)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.011554 182129 task_exit.go:204] [ 38891( 577): 38905( 581)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.011656 182129 task_exit.go:204] [ 38891( 577): 38905( 581)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.011973 182129 task_exit.go:204] [ 38891( 577): 38902( 580)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.012060 182129 task_exit.go:204] [ 38891( 577): 38902( 580)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.013244 182129 task_exit.go:204] [ 38891( 577): 38895( 578)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.013580 182129 task_exit.go:204] [ 38891( 577): 38895( 578)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.019493 182129 task_exit.go:204] [ 38932(1360): 38932(1360)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.020540 182129 task_signals.go:204] [ 38932(1360): 38934(1361)] Signal 9, PID: 38932, TID: 38934, fault addr: 0x0: terminating thread group D0318 14:42:29.020624 182129 task_exit.go:204] [ 38932(1360): 38932(1360)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.021668 182129 task_exit.go:204] [ 38891( 577): 38891( 577)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.021781 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.022116 182129 task_exit.go:204] [ 38932(1360): 38934(1361)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.022556 182129 task_exit.go:204] [ 38891( 577): 38891( 577)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.022992 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:29.023093 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 39 D0318 14:42:29.023208 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) 14:42:29 executing program 2: setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) D0318 14:42:29.029590 182129 task_exit.go:204] [ 38932(1360): 38934(1361)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.029677 182129 task_exit.go:204] [ 38932(1360): 38934(1361)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.029759 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:29.030767 182129 task_exit.go:204] [ 38932(1360): 38932(1360)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 1: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RSETATTR(r0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) timerfd_create(0x0, 0x0) D0318 14:42:29.048468 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:29.048667 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 40 D0318 14:42:29.048795 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:29.051184 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:29.051242 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 41 D0318 14:42:29.051303 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:29.052085 182129 usertrap_amd64.go:212] [ 38933( 617): 38935( 618)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:29.052245 182129 usertrap_amd64.go:122] [ 38933( 617): 38935( 618)] Allocate a new trap: 0xc005d97bf0 42 D0318 14:42:29.052341 182129 usertrap_amd64.go:225] [ 38933( 617): 38935( 618)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:29.057503 182129 usertrap_amd64.go:212] [ 38933( 617): 38933( 617)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:29.057574 182129 usertrap_amd64.go:122] [ 38933( 617): 38933( 617)] Allocate a new trap: 0xc005d97bf0 43 D0318 14:42:29.057646 182129 usertrap_amd64.go:225] [ 38933( 617): 38933( 617)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:29.067700 182129 task_exit.go:204] [ 38933( 617): 38933( 617)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.068558 182129 task_signals.go:204] [ 38933( 617): 38935( 618)] Signal 9, PID: 38933, TID: 38935, fault addr: 0x0: terminating thread group D0318 14:42:29.068724 182129 task_exit.go:204] [ 38933( 617): 38933( 617)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.068800 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:29.068984 182129 task_exit.go:204] [ 38933( 617): 38935( 618)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.068987 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 37 D0318 14:42:29.070047 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:29.073306 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:29.073446 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 36 D0318 14:42:29.074275 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:29.074344 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 38 D0318 14:42:29.074466 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:29.074706 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:29.077064 182129 task_exit.go:204] [ 38933( 617): 38935( 618)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.077261 182129 task_exit.go:204] [ 38933( 617): 38935( 618)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.077461 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:29.077741 182129 task_exit.go:204] [ 38933( 617): 38933( 617)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 3: prctl$PR_MCE_KILL_GET(0x1e) D0318 14:42:29.083170 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:29.083258 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 37 D0318 14:42:29.083423 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:29.088925 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:29.088988 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 39 D0318 14:42:29.089049 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:29.100040 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:29.100149 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 38 D0318 14:42:29.100263 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:29.103044 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:29.103173 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 40 D0318 14:42:29.103262 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:29.105989 182129 usertrap_amd64.go:212] [ 38937(1362): 38938(1363)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:29.106140 182129 usertrap_amd64.go:122] [ 38937(1362): 38938(1363)] Allocate a new trap: 0xc0014a5320 41 D0318 14:42:29.106220 182129 usertrap_amd64.go:225] [ 38937(1362): 38938(1363)] Apply the binary patch addr 55d5863b6320 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:29.107684 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:29.107789 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 42 D0318 14:42:29.107864 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d5863b6c10 trap addr 67d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:29.109559 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:29.109633 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 39 D0318 14:42:29.109705 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:29.111801 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:29.111862 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 40 D0318 14:42:29.111948 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:29.112481 182129 usertrap_amd64.go:212] [ 38936( 582): 38939( 583)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:29.112563 182129 usertrap_amd64.go:122] [ 38936( 582): 38939( 583)] Allocate a new trap: 0xc0043f0c00 41 D0318 14:42:29.112665 182129 usertrap_amd64.go:225] [ 38936( 582): 38939( 583)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:29.114373 182129 usertrap_amd64.go:212] [ 38936( 582): 38936( 582)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:29.114467 182129 usertrap_amd64.go:122] [ 38936( 582): 38936( 582)] Allocate a new trap: 0xc0043f0c00 42 D0318 14:42:29.114602 182129 usertrap_amd64.go:225] [ 38936( 582): 38936( 582)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:29.121063 182129 task_exit.go:204] [ 38936( 582): 38936( 582)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.121320 182129 task_signals.go:204] [ 38936( 582): 38939( 583)] Signal 9, PID: 38936, TID: 38939, fault addr: 0x0: terminating thread group D0318 14:42:29.121911 182129 task_exit.go:204] [ 38936( 582): 38936( 582)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.122092 182129 task_exit.go:204] [ 38936( 582): 38939( 583)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.126039 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:29.126226 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 37 D0318 14:42:29.127276 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:29.129532 182129 task_exit.go:204] [ 38936( 582): 38939( 583)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.129613 182129 task_exit.go:204] [ 38936( 582): 38939( 583)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.129714 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.131114 182129 task_exit.go:204] [ 38936( 582): 38936( 582)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.132563 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:29.132779 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 38 14:42:29 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000480)={&(0x7f0000001080)=""/216, 0xd8}) D0318 14:42:29.133075 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:29.152605 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:29.152787 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 39 D0318 14:42:29.152883 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:29.170748 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:29.170962 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 40 D0318 14:42:29.171074 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:29.173673 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:29.173801 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 41 D0318 14:42:29.174032 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:29.174334 182129 usertrap_amd64.go:212] [ 38940( 619): 38943( 620)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:29.174623 182129 usertrap_amd64.go:122] [ 38940( 619): 38943( 620)] Allocate a new trap: 0xc005d97c50 42 D0318 14:42:29.174891 182129 usertrap_amd64.go:225] [ 38940( 619): 38943( 620)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:29.175680 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:29.177079 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 36 D0318 14:42:29.178459 182129 usertrap_amd64.go:212] [ 38940( 619): 38940( 619)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:29.178519 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:29.178554 182129 usertrap_amd64.go:122] [ 38940( 619): 38940( 619)] Allocate a new trap: 0xc005d97c50 43 D0318 14:42:29.178650 182129 usertrap_amd64.go:225] [ 38940( 619): 38940( 619)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:29.188400 182129 task_exit.go:204] [ 38940( 619): 38940( 619)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.188495 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:29.188584 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 37 D0318 14:42:29.188675 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:29.188685 182129 task_signals.go:204] [ 38940( 619): 38943( 620)] Signal 9, PID: 38940, TID: 38943, fault addr: 0x0: terminating thread group D0318 14:42:29.189439 182129 task_exit.go:204] [ 38940( 619): 38940( 619)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.189917 182129 task_exit.go:204] [ 38940( 619): 38943( 620)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.197969 182129 task_exit.go:204] [ 38940( 619): 38943( 620)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.198109 182129 task_exit.go:204] [ 38940( 619): 38943( 620)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.198296 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:29.200217 182129 task_exit.go:204] [ 38940( 619): 38940( 619)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000f80)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}, {0x0}], 0x2}}], 0x1, 0x0) D0318 14:42:29.212755 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:29.212911 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 38 D0318 14:42:29.213012 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:29.272952 182129 usertrap_amd64.go:212] [ 38913( 541): 38913( 541)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:29.273291 182129 usertrap_amd64.go:122] [ 38913( 541): 38913( 541)] Allocate a new trap: 0xc0008817a0 43 D0318 14:42:29.273607 182129 usertrap_amd64.go:225] [ 38913( 541): 38913( 541)] Apply the binary patch addr 560b68d10c93 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0318 14:42:29.273929 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:29.274084 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 39 D0318 14:42:29.274179 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:29.276858 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:29.277081 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 40 D0318 14:42:29.277256 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:29.277615 182129 usertrap_amd64.go:212] [ 38941( 584): 38945( 585)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:29.277805 182129 usertrap_amd64.go:122] [ 38941( 584): 38945( 585)] Allocate a new trap: 0xc003f5fe00 41 D0318 14:42:29.277909 182129 usertrap_amd64.go:225] [ 38941( 584): 38945( 585)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:29.296419 182129 task_signals.go:470] [ 38913( 541): 38917( 542)] Notified of signal 13 D0318 14:42:29.297020 182129 task_signals.go:204] [ 38913( 541): 38917( 542)] Signal 13, PID: 38913, TID: 38917, fault addr: 0x0: terminating thread group D0318 14:42:29.297416 182129 task_exit.go:204] [ 38913( 541): 38917( 542)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.298449 182129 task_signals.go:204] [ 38913( 541): 38919( 543)] Signal 9, PID: 38913, TID: 38919, fault addr: 0x0: terminating thread group D0318 14:42:29.298643 182129 task_signals.go:204] [ 38913( 541): 38913( 541)] Signal 9, PID: 38913, TID: 38913, fault addr: 0x0: terminating thread group D0318 14:42:29.298752 182129 task_exit.go:204] [ 38913( 541): 38917( 542)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.298856 182129 task_exit.go:204] [ 38913( 541): 38917( 542)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.299119 182129 task_exit.go:204] [ 38913( 541): 38919( 543)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.300327 182129 task_exit.go:204] [ 38913( 541): 38913( 541)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.300595 182129 task_exit.go:204] [ 38913( 541): 38919( 543)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.300662 182129 task_exit.go:204] [ 38913( 541): 38919( 543)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.316080 182129 task_exit.go:204] [ 38913( 541): 38913( 541)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.316524 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:29.316738 182129 task_exit.go:204] [ 38913( 541): 38913( 541)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.317799 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:29.318139 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 37 14:42:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RFLUSH(r2, &(0x7f0000000200)={0x7}, 0x7) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) D0318 14:42:29.328099 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:29.334280 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:29.334473 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 38 D0318 14:42:29.334583 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:29.334816 182129 task_signals.go:470] [ 38947( 586): 38947( 586)] Notified of signal 19 D0318 14:42:29.335051 182129 ptrace.go:668] [ 38947( 586): 38947( 586)] Entering signal-delivery-stop for signal 19 D0318 14:42:29.336313 182129 task_stop.go:118] [ 38947( 586): 38947( 586)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0318 14:42:29.336671 182129 task_signals.go:443] [ 38941( 584): 38945( 585)] Discarding ignored signal 17 D0318 14:42:29.343858 182129 usertrap_amd64.go:212] [ 38941( 584): 38941( 584)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:29.344118 182129 usertrap_amd64.go:122] [ 38941( 584): 38941( 584)] Allocate a new trap: 0xc003f5fe00 42 D0318 14:42:29.345371 182129 usertrap_amd64.go:225] [ 38941( 584): 38941( 584)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:29.357258 182129 task_exit.go:204] [ 38941( 584): 38941( 584)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.358367 182129 task_signals.go:204] [ 38941( 584): 38945( 585)] Signal 9, PID: 38941, TID: 38945, fault addr: 0x0: terminating thread group D0318 14:42:29.358617 182129 task_exit.go:204] [ 38941( 584): 38945( 585)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.358797 182129 task_exit.go:204] [ 38941( 584): 38941( 584)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.359069 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:29.359154 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 39 D0318 14:42:29.359280 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:29.360846 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d58640d1ae:sysno 230 D0318 14:42:29.360971 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 43 D0318 14:42:29.361099 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d58640d1ae trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:29.369139 182129 task_stop.go:138] [ 38947( 586): 38947( 586)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0318 14:42:29.369362 182129 task_exit.go:204] [ 38941( 584): 38945( 585)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.369440 182129 task_exit.go:204] [ 38941( 584): 38945( 585)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.369686 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.369832 182129 task_exit.go:204] [ 38941( 584): 38941( 584)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.370049 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:29.370179 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 36 D0318 14:42:29.370557 182129 task_signals.go:808] [ 38947( 586): 38947( 586)] Signal 19: stopping 1 threads in thread group D0318 14:42:29.370705 182129 task_signals.go:885] [ 38947( 586): 38947( 586)] Completing group stop D0318 14:42:29.370849 182129 task_stop.go:118] [ 38947( 586): 38947( 586)] Entering internal stop (*kernel.groupStop)(nil) D0318 14:42:29.370993 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.371263 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) 14:42:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) write$tun(r0, &(0x7f0000000080)=ANY=[], 0xfdef) D0318 14:42:29.378333 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:29.378414 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 40 D0318 14:42:29.378488 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:29.380820 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:29.380883 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 41 D0318 14:42:29.381050 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:29.382815 182129 usertrap_amd64.go:212] [ 38946( 621): 38950( 622)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:29.382911 182129 usertrap_amd64.go:122] [ 38946( 621): 38950( 622)] Allocate a new trap: 0xc005d97c80 42 D0318 14:42:29.383106 182129 usertrap_amd64.go:225] [ 38946( 621): 38950( 622)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:29.383945 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:29.384043 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 37 D0318 14:42:29.384140 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:29.394154 182129 usertrap_amd64.go:212] [ 38946( 621): 38946( 621)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:29.394297 182129 usertrap_amd64.go:122] [ 38946( 621): 38946( 621)] Allocate a new trap: 0xc005d97c80 43 D0318 14:42:29.394658 182129 usertrap_amd64.go:225] [ 38946( 621): 38946( 621)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:29.403663 182129 task_exit.go:204] [ 38946( 621): 38946( 621)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.404098 182129 task_signals.go:204] [ 38946( 621): 38950( 622)] Signal 9, PID: 38946, TID: 38950, fault addr: 0x0: terminating thread group D0318 14:42:29.404287 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:29.404297 182129 task_exit.go:204] [ 38946( 621): 38950( 622)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.404368 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 38 D0318 14:42:29.404486 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:29.405509 182129 task_exit.go:204] [ 38946( 621): 38946( 621)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.417316 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:29.417400 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 39 D0318 14:42:29.417498 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:29.420084 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:29.420144 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 40 D0318 14:42:29.420225 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:29.420722 182129 usertrap_amd64.go:212] [ 38949( 544): 38952( 545)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:29.420809 182129 usertrap_amd64.go:122] [ 38949( 544): 38952( 545)] Allocate a new trap: 0xc005d97ce0 41 D0318 14:42:29.420925 182129 usertrap_amd64.go:225] [ 38949( 544): 38952( 545)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:29.422184 182129 task_exit.go:204] [ 38946( 621): 38950( 622)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.422358 182129 task_exit.go:204] [ 38946( 621): 38950( 622)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.422483 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:29.423544 182129 task_exit.go:204] [ 38946( 621): 38946( 621)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.425020 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:29.425215 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 36 14:42:29 executing program 3: prctl$PR_MCE_KILL_GET(0x39) D0318 14:42:29.427134 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:29.428313 182129 usertrap_amd64.go:212] [ 38949( 544): 38949( 544)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:29.428414 182129 usertrap_amd64.go:122] [ 38949( 544): 38949( 544)] Allocate a new trap: 0xc005d97ce0 42 D0318 14:42:29.428550 182129 usertrap_amd64.go:225] [ 38949( 544): 38949( 544)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:29.439525 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:29.439787 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 37 D0318 14:42:29.440012 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:29.441524 182129 task_exit.go:204] [ 38949( 544): 38949( 544)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.442622 182129 task_signals.go:204] [ 38949( 544): 38952( 545)] Signal 9, PID: 38949, TID: 38952, fault addr: 0x0: terminating thread group D0318 14:42:29.442911 182129 task_exit.go:204] [ 38949( 544): 38952( 545)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.443027 182129 task_exit.go:204] [ 38949( 544): 38949( 544)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.454007 182129 task_exit.go:204] [ 38949( 544): 38952( 545)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.454147 182129 task_exit.go:204] [ 38949( 544): 38952( 545)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.454304 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:29.454757 182129 task_exit.go:204] [ 38949( 544): 38949( 544)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 0: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3000003, 0x200000006c832, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) pwritev(r0, &(0x7f0000000a00)=[{&(0x7f0000000400)="fd", 0xffff8001}], 0x1, 0x8000000, 0x0) D0318 14:42:29.464314 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:29.464388 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 38 D0318 14:42:29.464492 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:29.473600 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:29.473962 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 37 D0318 14:42:29.474683 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:29.474860 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 39 D0318 14:42:29.474993 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:29.478406 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:29.478494 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 40 D0318 14:42:29.478614 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:29.479127 182129 usertrap_amd64.go:212] [ 38951( 587): 38954( 588)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:29.479227 182129 usertrap_amd64.go:122] [ 38951( 587): 38954( 588)] Allocate a new trap: 0xc015016030 41 D0318 14:42:29.479359 182129 usertrap_amd64.go:225] [ 38951( 587): 38954( 588)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:29.480194 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:29.485771 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:29.486853 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 38 D0318 14:42:29.486979 182129 usertrap_amd64.go:212] [ 38951( 587): 38951( 587)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:29.487056 182129 usertrap_amd64.go:122] [ 38951( 587): 38951( 587)] Allocate a new trap: 0xc015016030 42 D0318 14:42:29.487174 182129 usertrap_amd64.go:225] [ 38951( 587): 38951( 587)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:29.488097 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:29.499288 182129 task_exit.go:204] [ 38951( 587): 38951( 587)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.499631 182129 task_signals.go:204] [ 38951( 587): 38954( 588)] Signal 9, PID: 38951, TID: 38954, fault addr: 0x0: terminating thread group D0318 14:42:29.501150 182129 task_exit.go:204] [ 38951( 587): 38951( 587)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.501409 182129 task_exit.go:204] [ 38951( 587): 38954( 588)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.512602 182129 task_exit.go:204] [ 38951( 587): 38954( 588)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.512799 182129 task_exit.go:204] [ 38951( 587): 38954( 588)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.513086 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.513262 182129 task_exit.go:204] [ 38951( 587): 38951( 587)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001500)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0}, 0x2000c000) sendmsg$inet6(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) D0318 14:42:29.522892 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:29.523082 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 36 D0318 14:42:29.524952 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:29.526060 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:29.526187 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 39 D0318 14:42:29.526322 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:29.647977 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:29.648437 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 37 D0318 14:42:29.648556 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:29.658397 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:29.658630 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 40 D0318 14:42:29.658782 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:29.664860 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:29.665059 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 41 D0318 14:42:29.665406 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:29.665713 182129 usertrap_amd64.go:212] [ 38953( 623): 38956( 624)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:29.665912 182129 usertrap_amd64.go:122] [ 38953( 623): 38956( 624)] Allocate a new trap: 0xc0011562a0 42 D0318 14:42:29.666003 182129 usertrap_amd64.go:225] [ 38953( 623): 38956( 624)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:29.673961 182129 usertrap_amd64.go:212] [ 38953( 623): 38953( 623)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:29.674099 182129 usertrap_amd64.go:122] [ 38953( 623): 38953( 623)] Allocate a new trap: 0xc0011562a0 43 D0318 14:42:29.674182 182129 usertrap_amd64.go:225] [ 38953( 623): 38953( 623)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:29.679744 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:29.679863 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 38 D0318 14:42:29.679977 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:29.700708 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:29.700939 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 39 D0318 14:42:29.701081 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:29.705551 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:29.705737 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 40 D0318 14:42:29.705845 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:29.706289 182129 usertrap_amd64.go:212] [ 38955( 546): 38958( 547)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:29.706524 182129 usertrap_amd64.go:122] [ 38955( 546): 38958( 547)] Allocate a new trap: 0xc001156330 41 D0318 14:42:29.706641 182129 usertrap_amd64.go:225] [ 38955( 546): 38958( 547)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:29.710695 182129 task_exit.go:204] [ 38953( 623): 38953( 623)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.711725 182129 task_exit.go:204] [ 38953( 623): 38953( 623)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.712032 182129 task_signals.go:204] [ 38953( 623): 38956( 624)] Signal 9, PID: 38953, TID: 38956, fault addr: 0x0: terminating thread group D0318 14:42:29.712358 182129 task_exit.go:204] [ 38953( 623): 38956( 624)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.720723 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:29.721182 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 36 D0318 14:42:29.722827 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:29.724834 182129 task_exit.go:204] [ 38953( 623): 38956( 624)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.725005 182129 task_exit.go:204] [ 38953( 623): 38956( 624)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.725421 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:29.725921 182129 task_exit.go:204] [ 38953( 623): 38953( 623)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x20000010304, @dev}, 0x0, {0x2, 0x0, @multicast1=0xe000cc02}}) D0318 14:42:29.737081 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:29.737242 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 37 D0318 14:42:29.737381 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:29.764158 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:29.764423 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 38 D0318 14:42:29.764576 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:29.774669 182129 usertrap_amd64.go:212] [ 38955( 546): 38955( 546)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:29.774890 182129 usertrap_amd64.go:122] [ 38955( 546): 38955( 546)] Allocate a new trap: 0xc001156330 42 D0318 14:42:29.775218 182129 usertrap_amd64.go:225] [ 38955( 546): 38955( 546)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:29.789561 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:29.789774 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 39 D0318 14:42:29.789891 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:29.798094 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:29.798365 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 40 D0318 14:42:29.798533 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:29.798863 182129 usertrap_amd64.go:212] [ 38957( 589): 38960( 590)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:29.799002 182129 usertrap_amd64.go:122] [ 38957( 589): 38960( 590)] Allocate a new trap: 0xc003c42090 41 D0318 14:42:29.799162 182129 usertrap_amd64.go:225] [ 38957( 589): 38960( 590)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:29.805798 182129 task_exit.go:204] [ 38955( 546): 38955( 546)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.806097 182129 task_signals.go:204] [ 38955( 546): 38958( 547)] Signal 9, PID: 38955, TID: 38958, fault addr: 0x0: terminating thread group D0318 14:42:29.807331 182129 task_exit.go:204] [ 38955( 546): 38955( 546)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.807992 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:29.807710 182129 task_exit.go:204] [ 38955( 546): 38958( 547)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.809739 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 37 D0318 14:42:29.824697 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:29.826825 182129 usertrap_amd64.go:212] [ 38957( 589): 38957( 589)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:29.826936 182129 usertrap_amd64.go:122] [ 38957( 589): 38957( 589)] Allocate a new trap: 0xc003c42090 42 D0318 14:42:29.827082 182129 usertrap_amd64.go:225] [ 38957( 589): 38957( 589)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:29.828633 182129 task_exit.go:204] [ 38955( 546): 38958( 547)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.828752 182129 task_exit.go:204] [ 38955( 546): 38958( 547)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.828967 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:29.829885 182129 task_exit.go:204] [ 38955( 546): 38955( 546)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.832374 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:29.832543 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 38 D0318 14:42:29.832783 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) 14:42:29 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0318 14:42:29.852161 182129 task_exit.go:204] [ 38957( 589): 38957( 589)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.852465 182129 task_signals.go:204] [ 38957( 589): 38960( 590)] Signal 9, PID: 38957, TID: 38960, fault addr: 0x0: terminating thread group D0318 14:42:29.853274 182129 task_exit.go:204] [ 38957( 589): 38957( 589)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.853430 182129 task_exit.go:204] [ 38957( 589): 38960( 590)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.862465 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:29.862599 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 39 D0318 14:42:29.862771 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:29.872309 182129 task_exit.go:204] [ 38957( 589): 38960( 590)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.872470 182129 task_exit.go:204] [ 38957( 589): 38960( 590)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.872662 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:29.872940 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:29.873017 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 40 D0318 14:42:29.873101 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:29.875521 182129 task_exit.go:204] [ 38957( 589): 38957( 589)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.875772 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:29.876057 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 41 D0318 14:42:29.876375 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:29.877170 182129 usertrap_amd64.go:212] [ 38959( 625): 38962( 626)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:29.877479 182129 usertrap_amd64.go:122] [ 38959( 625): 38962( 626)] Allocate a new trap: 0xc012432060 42 D0318 14:42:29.877775 182129 usertrap_amd64.go:225] [ 38959( 625): 38962( 626)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) 14:42:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x3002d000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) D0318 14:42:29.889144 182129 usertrap_amd64.go:212] [ 38959( 625): 38959( 625)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:29.889298 182129 usertrap_amd64.go:122] [ 38959( 625): 38959( 625)] Allocate a new trap: 0xc012432060 43 D0318 14:42:29.889411 182129 usertrap_amd64.go:225] [ 38959( 625): 38959( 625)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:29.895526 182129 task_exit.go:204] [ 38959( 625): 38959( 625)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.897352 182129 task_signals.go:204] [ 38959( 625): 38962( 626)] Signal 9, PID: 38959, TID: 38962, fault addr: 0x0: terminating thread group D0318 14:42:29.898378 182129 task_exit.go:204] [ 38959( 625): 38959( 625)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.898956 182129 task_exit.go:204] [ 38959( 625): 38962( 626)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:29.898994 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:29.899279 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 36 D0318 14:42:29.900510 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:29.909244 182129 task_exit.go:204] [ 38959( 625): 38962( 626)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:29.909385 182129 task_exit.go:204] [ 38959( 625): 38962( 626)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.909505 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:29.909350 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:29.909653 182129 task_exit.go:204] [ 38959( 625): 38959( 625)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:29.909707 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 37 D0318 14:42:29.909830 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) 14:42:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)) D0318 14:42:29.920313 182129 usertrap_amd64.go:212] [ 38937(1362): 38937(1362)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:29.920484 182129 usertrap_amd64.go:122] [ 38937(1362): 38937(1362)] Allocate a new trap: 0xc0014a5320 44 D0318 14:42:29.920610 182129 usertrap_amd64.go:225] [ 38937(1362): 38937(1362)] Apply the binary patch addr 55d5863e0c93 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0318 14:42:29.938645 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:29.938790 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 36 D0318 14:42:29.943138 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:29.949384 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:29.949622 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 38 D0318 14:42:29.949795 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:29.949885 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 37 D0318 14:42:29.950002 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:29.950146 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:29.970088 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:29.970249 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 39 D0318 14:42:29.970450 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:29.974034 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:29.974185 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 40 D0318 14:42:29.974351 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:29.974926 182129 usertrap_amd64.go:212] [ 38961( 548): 38965( 549)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:29.975134 182129 usertrap_amd64.go:122] [ 38961( 548): 38965( 549)] Allocate a new trap: 0xc012432120 41 D0318 14:42:29.975657 182129 usertrap_amd64.go:225] [ 38961( 548): 38965( 549)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:29.978752 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:29.979007 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 37 D0318 14:42:29.981085 182129 usertrap_amd64.go:212] [ 38961( 548): 38961( 548)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:29.981184 182129 usertrap_amd64.go:122] [ 38961( 548): 38961( 548)] Allocate a new trap: 0xc012432120 42 D0318 14:42:29.981601 182129 usertrap_amd64.go:225] [ 38961( 548): 38961( 548)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:29.981957 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:29.992560 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:29.992686 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 38 D0318 14:42:29.992798 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:29.994142 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:29.994268 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 38 D0318 14:42:29.994374 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.006264 182129 task_exit.go:204] [ 38961( 548): 38961( 548)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.006504 182129 task_signals.go:204] [ 38961( 548): 38965( 549)] Signal 9, PID: 38961, TID: 38965, fault addr: 0x0: terminating thread group D0318 14:42:30.007986 182129 task_exit.go:204] [ 38961( 548): 38961( 548)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.010799 182129 task_exit.go:204] [ 38961( 548): 38965( 549)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.012368 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.012495 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 39 D0318 14:42:30.012598 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.015335 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.015501 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 40 D0318 14:42:30.015641 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.020769 182129 usertrap_amd64.go:212] [ 38963( 591): 38966( 592)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.020897 182129 usertrap_amd64.go:122] [ 38963( 591): 38966( 592)] Allocate a new trap: 0xc005f00e40 41 D0318 14:42:30.021061 182129 usertrap_amd64.go:225] [ 38963( 591): 38966( 592)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.021394 182129 task_exit.go:204] [ 38961( 548): 38965( 549)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.021682 182129 task_exit.go:204] [ 38961( 548): 38965( 549)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.022162 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.022537 182129 task_exit.go:204] [ 38961( 548): 38961( 548)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40001) D0318 14:42:30.027070 182129 usertrap_amd64.go:212] [ 38963( 591): 38963( 591)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.027172 182129 usertrap_amd64.go:122] [ 38963( 591): 38963( 591)] Allocate a new trap: 0xc005f00e40 42 D0318 14:42:30.027254 182129 usertrap_amd64.go:225] [ 38963( 591): 38963( 591)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.036546 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.036717 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 39 D0318 14:42:30.036906 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.049705 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.049871 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 40 D0318 14:42:30.050076 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.052680 182129 task_signals.go:204] [ 38963( 591): 38966( 592)] Signal 9, PID: 38963, TID: 38966, fault addr: 0x0: terminating thread group D0318 14:42:30.052914 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.052985 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 41 D0318 14:42:30.053247 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.053467 182129 usertrap_amd64.go:212] [ 38964( 627): 38967( 628)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.053572 182129 usertrap_amd64.go:122] [ 38964( 627): 38967( 628)] Allocate a new trap: 0xc005d97d10 42 D0318 14:42:30.053656 182129 usertrap_amd64.go:225] [ 38964( 627): 38967( 628)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.054518 182129 task_exit.go:204] [ 38963( 591): 38963( 591)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.055486 182129 task_exit.go:204] [ 38963( 591): 38966( 592)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.055880 182129 task_exit.go:204] [ 38963( 591): 38963( 591)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.060248 182129 usertrap_amd64.go:212] [ 38964( 627): 38964( 627)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.060382 182129 usertrap_amd64.go:122] [ 38964( 627): 38964( 627)] Allocate a new trap: 0xc005d97d10 43 D0318 14:42:30.060486 182129 usertrap_amd64.go:225] [ 38964( 627): 38964( 627)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.066354 182129 task_exit.go:204] [ 38963( 591): 38966( 592)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.066515 182129 task_exit.go:204] [ 38963( 591): 38966( 592)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.066766 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.069574 182129 task_exit.go:204] [ 38963( 591): 38963( 591)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) D0318 14:42:30.083286 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.083539 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 36 D0318 14:42:30.084920 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.088347 182129 task_exit.go:204] [ 38964( 627): 38964( 627)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.089219 182129 task_exit.go:204] [ 38964( 627): 38964( 627)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.089509 182129 task_signals.go:204] [ 38964( 627): 38967( 628)] Signal 9, PID: 38964, TID: 38967, fault addr: 0x0: terminating thread group D0318 14:42:30.089681 182129 task_exit.go:204] [ 38964( 627): 38967( 628)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.089684 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.089782 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 37 D0318 14:42:30.089911 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.108661 182129 task_exit.go:204] [ 38964( 627): 38967( 628)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.108777 182129 task_exit.go:204] [ 38964( 627): 38967( 628)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.109019 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.110486 182129 task_exit.go:204] [ 38964( 627): 38964( 627)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @multicast1}}}}) D0318 14:42:30.118788 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.118880 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 36 D0318 14:42:30.119855 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.124379 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.124462 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 37 D0318 14:42:30.124574 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.132034 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.132137 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 38 D0318 14:42:30.132250 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.149564 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.149681 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 39 D0318 14:42:30.149806 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.150448 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.150575 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 38 D0318 14:42:30.150834 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.152781 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.152885 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 40 D0318 14:42:30.153242 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.153785 182129 usertrap_amd64.go:212] [ 38968( 550): 38971( 551)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.153866 182129 usertrap_amd64.go:122] [ 38968( 550): 38971( 551)] Allocate a new trap: 0xc003f5fe90 41 D0318 14:42:30.153973 182129 usertrap_amd64.go:225] [ 38968( 550): 38971( 551)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.163317 182129 usertrap_amd64.go:212] [ 38968( 550): 38968( 550)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.163424 182129 usertrap_amd64.go:122] [ 38968( 550): 38968( 550)] Allocate a new trap: 0xc003f5fe90 42 D0318 14:42:30.163570 182129 usertrap_amd64.go:225] [ 38968( 550): 38968( 550)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.165910 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:30.166170 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 37 D0318 14:42:30.167199 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:30.172187 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.172354 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 39 D0318 14:42:30.172634 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.173256 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:30.173351 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 38 D0318 14:42:30.173485 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:30.174911 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.174994 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 40 D0318 14:42:30.175174 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.175637 182129 usertrap_amd64.go:212] [ 38969( 593): 38972( 594)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.175727 182129 usertrap_amd64.go:122] [ 38969( 593): 38972( 594)] Allocate a new trap: 0xc01531c060 41 D0318 14:42:30.175823 182129 usertrap_amd64.go:225] [ 38969( 593): 38972( 594)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.183135 182129 usertrap_amd64.go:212] [ 38969( 593): 38969( 593)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.183244 182129 usertrap_amd64.go:122] [ 38969( 593): 38969( 593)] Allocate a new trap: 0xc01531c060 42 D0318 14:42:30.183370 182129 usertrap_amd64.go:225] [ 38969( 593): 38969( 593)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.185198 182129 task_exit.go:204] [ 38968( 550): 38968( 550)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.186459 182129 task_signals.go:204] [ 38968( 550): 38971( 551)] Signal 9, PID: 38968, TID: 38971, fault addr: 0x0: terminating thread group D0318 14:42:30.186496 182129 task_exit.go:204] [ 38968( 550): 38968( 550)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.186611 182129 task_exit.go:204] [ 38968( 550): 38971( 551)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.194022 182129 task_exit.go:204] [ 38969( 593): 38969( 593)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.194896 182129 task_signals.go:204] [ 38969( 593): 38972( 594)] Signal 9, PID: 38969, TID: 38972, fault addr: 0x0: terminating thread group D0318 14:42:30.195055 182129 task_exit.go:204] [ 38969( 593): 38969( 593)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.195528 182129 task_exit.go:204] [ 38969( 593): 38972( 594)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.197782 182129 task_exit.go:204] [ 38968( 550): 38971( 551)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.197982 182129 task_exit.go:204] [ 38968( 550): 38971( 551)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.198168 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.198535 182129 task_exit.go:204] [ 38968( 550): 38968( 550)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) D0318 14:42:30.207700 182129 task_exit.go:204] [ 38969( 593): 38972( 594)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.207829 182129 task_exit.go:204] [ 38969( 593): 38972( 594)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.207976 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.208372 182129 task_exit.go:204] [ 38969( 593): 38969( 593)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89b1, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) D0318 14:42:30.211902 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.212013 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 39 D0318 14:42:30.212155 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.227383 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.227475 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 40 D0318 14:42:30.227553 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.229936 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.230065 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 41 D0318 14:42:30.230228 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.231088 182129 usertrap_amd64.go:212] [ 38970( 629): 38973( 630)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.231196 182129 usertrap_amd64.go:122] [ 38970( 629): 38973( 630)] Allocate a new trap: 0xc015016150 42 D0318 14:42:30.231343 182129 usertrap_amd64.go:225] [ 38970( 629): 38973( 630)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.237148 182129 usertrap_amd64.go:212] [ 38970( 629): 38970( 629)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.237243 182129 usertrap_amd64.go:122] [ 38970( 629): 38970( 629)] Allocate a new trap: 0xc015016150 43 D0318 14:42:30.237404 182129 usertrap_amd64.go:225] [ 38970( 629): 38970( 629)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.264007 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.264336 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 36 D0318 14:42:30.265647 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.266031 182129 task_exit.go:204] [ 38970( 629): 38970( 629)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.266799 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.267005 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 36 D0318 14:42:30.267778 182129 task_signals.go:204] [ 38970( 629): 38973( 630)] Signal 9, PID: 38970, TID: 38973, fault addr: 0x0: terminating thread group D0318 14:42:30.268048 182129 task_exit.go:204] [ 38970( 629): 38970( 629)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.268290 182129 task_exit.go:204] [ 38970( 629): 38973( 630)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.276111 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.276469 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.276592 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 37 D0318 14:42:30.276763 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.279209 182129 task_exit.go:204] [ 38970( 629): 38973( 630)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.279398 182129 task_exit.go:204] [ 38970( 629): 38973( 630)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.279543 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.279920 182129 task_exit.go:204] [ 38970( 629): 38970( 629)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b0f, &(0x7f0000000000)={'wlan1\x00', @random='\rh\x00%\x00'}) D0318 14:42:30.282651 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.282721 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 37 D0318 14:42:30.282849 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.293415 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.293522 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 38 D0318 14:42:30.293610 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.302228 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.302328 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 38 D0318 14:42:30.302455 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.303598 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.303751 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 39 D0318 14:42:30.303895 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.306420 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.306653 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 40 D0318 14:42:30.306832 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.307183 182129 usertrap_amd64.go:212] [ 38974( 552): 38976( 553)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.307280 182129 usertrap_amd64.go:122] [ 38974( 552): 38976( 553)] Allocate a new trap: 0xc005f00f00 41 D0318 14:42:30.307370 182129 usertrap_amd64.go:225] [ 38974( 552): 38976( 553)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.317805 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.317927 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 39 D0318 14:42:30.318087 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.319204 182129 usertrap_amd64.go:212] [ 38974( 552): 38974( 552)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.319317 182129 usertrap_amd64.go:122] [ 38974( 552): 38974( 552)] Allocate a new trap: 0xc005f00f00 42 D0318 14:42:30.319430 182129 usertrap_amd64.go:225] [ 38974( 552): 38974( 552)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.320619 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.320890 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 40 D0318 14:42:30.321144 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.321892 182129 usertrap_amd64.go:212] [ 38975( 595): 38978( 596)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.322079 182129 usertrap_amd64.go:122] [ 38975( 595): 38978( 596)] Allocate a new trap: 0xc005d97d40 41 D0318 14:42:30.322294 182129 usertrap_amd64.go:225] [ 38975( 595): 38978( 596)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.326760 182129 usertrap_amd64.go:212] [ 38975( 595): 38975( 595)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.326879 182129 usertrap_amd64.go:122] [ 38975( 595): 38975( 595)] Allocate a new trap: 0xc005d97d40 42 D0318 14:42:30.327206 182129 usertrap_amd64.go:225] [ 38975( 595): 38975( 595)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.331723 182129 task_exit.go:204] [ 38974( 552): 38974( 552)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.333046 182129 task_exit.go:204] [ 38974( 552): 38974( 552)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.332978 182129 task_signals.go:204] [ 38974( 552): 38976( 553)] Signal 9, PID: 38974, TID: 38976, fault addr: 0x0: terminating thread group D0318 14:42:30.333342 182129 task_exit.go:204] [ 38974( 552): 38976( 553)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.337372 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:30.337763 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 37 D0318 14:42:30.339004 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:30.339530 182129 task_exit.go:204] [ 38975( 595): 38975( 595)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.340010 182129 task_signals.go:204] [ 38975( 595): 38978( 596)] Signal 9, PID: 38975, TID: 38978, fault addr: 0x0: terminating thread group D0318 14:42:30.340169 182129 task_exit.go:204] [ 38975( 595): 38978( 596)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.341261 182129 task_exit.go:204] [ 38975( 595): 38975( 595)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.344665 182129 task_exit.go:204] [ 38974( 552): 38976( 553)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.344767 182129 task_exit.go:204] [ 38974( 552): 38976( 553)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.344933 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.345823 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:30.345904 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 38 D0318 14:42:30.345996 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:30.345996 182129 task_exit.go:204] [ 38974( 552): 38974( 552)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xc000) close(r0) D0318 14:42:30.352502 182129 task_exit.go:204] [ 38975( 595): 38978( 596)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.352594 182129 task_exit.go:204] [ 38975( 595): 38978( 596)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.352805 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.356219 182129 task_exit.go:204] [ 38975( 595): 38975( 595)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086604, 0x0) D0318 14:42:30.384201 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.384317 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 39 D0318 14:42:30.384506 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.392712 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.392955 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 36 D0318 14:42:30.394076 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.399550 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.399697 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 37 D0318 14:42:30.399806 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.402749 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.403021 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 40 D0318 14:42:30.403232 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.405794 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.405950 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 41 D0318 14:42:30.406362 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.406764 182129 usertrap_amd64.go:212] [ 38977( 631): 38981( 632)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.406881 182129 usertrap_amd64.go:122] [ 38977( 631): 38981( 632)] Allocate a new trap: 0xc005d97d70 42 D0318 14:42:30.406974 182129 usertrap_amd64.go:225] [ 38977( 631): 38981( 632)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.410543 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.410675 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 36 D0318 14:42:30.411768 182129 usertrap_amd64.go:212] [ 38977( 631): 38977( 631)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.411890 182129 usertrap_amd64.go:122] [ 38977( 631): 38977( 631)] Allocate a new trap: 0xc005d97d70 43 D0318 14:42:30.411995 182129 usertrap_amd64.go:225] [ 38977( 631): 38977( 631)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.412256 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.418868 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.419118 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 37 D0318 14:42:30.419394 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.425408 182129 task_exit.go:204] [ 38977( 631): 38977( 631)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.425806 182129 task_signals.go:204] [ 38977( 631): 38981( 632)] Signal 9, PID: 38977, TID: 38981, fault addr: 0x0: terminating thread group D0318 14:42:30.426749 182129 task_exit.go:204] [ 38977( 631): 38977( 631)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.427038 182129 task_exit.go:204] [ 38977( 631): 38981( 632)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.445989 182129 task_exit.go:204] [ 38977( 631): 38981( 632)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.446137 182129 task_exit.go:204] [ 38977( 631): 38981( 632)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.446290 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.446492 182129 task_exit.go:204] [ 38977( 631): 38977( 631)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) write$cgroup_int(r2, &(0x7f0000000340), 0x12) D0318 14:42:30.455225 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.455464 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 38 D0318 14:42:30.455815 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.458715 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.458830 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 38 D0318 14:42:30.458943 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.469092 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.469179 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 39 D0318 14:42:30.469302 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.472246 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.472346 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 40 D0318 14:42:30.472505 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.472918 182129 usertrap_amd64.go:212] [ 38980( 597): 38982( 598)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.473049 182129 usertrap_amd64.go:122] [ 38980( 597): 38982( 598)] Allocate a new trap: 0xc003f5fec0 41 D0318 14:42:30.473203 182129 usertrap_amd64.go:225] [ 38980( 597): 38982( 598)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.476949 182129 usertrap_amd64.go:212] [ 38980( 597): 38980( 597)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.477056 182129 usertrap_amd64.go:122] [ 38980( 597): 38980( 597)] Allocate a new trap: 0xc003f5fec0 42 D0318 14:42:30.477212 182129 usertrap_amd64.go:225] [ 38980( 597): 38980( 597)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.479681 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.479794 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 39 D0318 14:42:30.479928 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.482592 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.482697 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 40 D0318 14:42:30.482816 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.483803 182129 task_exit.go:204] [ 38980( 597): 38980( 597)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.483958 182129 usertrap_amd64.go:212] [ 38979( 554): 38984( 555)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.484161 182129 usertrap_amd64.go:122] [ 38979( 554): 38984( 555)] Allocate a new trap: 0xc005d0c180 41 D0318 14:42:30.484338 182129 task_signals.go:204] [ 38980( 597): 38982( 598)] Signal 9, PID: 38980, TID: 38982, fault addr: 0x0: terminating thread group D0318 14:42:30.484426 182129 usertrap_amd64.go:225] [ 38979( 554): 38984( 555)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.485514 182129 task_exit.go:204] [ 38980( 597): 38980( 597)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.485787 182129 task_exit.go:204] [ 38980( 597): 38982( 598)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.490727 182129 usertrap_amd64.go:212] [ 38979( 554): 38979( 554)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.490884 182129 usertrap_amd64.go:122] [ 38979( 554): 38979( 554)] Allocate a new trap: 0xc005d0c180 42 D0318 14:42:30.491061 182129 usertrap_amd64.go:225] [ 38979( 554): 38979( 554)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.505333 182129 task_exit.go:204] [ 38979( 554): 38979( 554)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.505943 182129 task_signals.go:204] [ 38979( 554): 38984( 555)] Signal 9, PID: 38979, TID: 38984, fault addr: 0x0: terminating thread group D0318 14:42:30.506091 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:30.506346 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 37 D0318 14:42:30.506836 182129 task_exit.go:204] [ 38979( 554): 38979( 554)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.508216 182129 task_exit.go:204] [ 38979( 554): 38984( 555)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.508684 182129 task_exit.go:204] [ 38980( 597): 38982( 598)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.508813 182129 task_exit.go:204] [ 38980( 597): 38982( 598)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.509063 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.509407 182129 task_exit.go:204] [ 38980( 597): 38980( 597)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d}, {}, {0x6}]}) D0318 14:42:30.516186 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:30.518150 182129 task_exit.go:204] [ 38979( 554): 38984( 555)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.518258 182129 task_exit.go:204] [ 38979( 554): 38984( 555)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.518516 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.518719 182129 task_exit.go:204] [ 38979( 554): 38979( 554)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) D0318 14:42:30.525595 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:30.525770 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 38 D0318 14:42:30.526096 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:30.557598 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.557778 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 39 D0318 14:42:30.557964 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.562615 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.562719 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 36 D0318 14:42:30.563952 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.569071 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.569212 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 37 D0318 14:42:30.569302 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.570738 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.570828 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 40 D0318 14:42:30.570989 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.572306 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.572433 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 36 D0318 14:42:30.573542 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.573526 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.573675 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 41 D0318 14:42:30.573897 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.574155 182129 usertrap_amd64.go:212] [ 38983( 633): 38987( 634)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.574244 182129 usertrap_amd64.go:122] [ 38983( 633): 38987( 634)] Allocate a new trap: 0xc005d97da0 42 D0318 14:42:30.574342 182129 usertrap_amd64.go:225] [ 38983( 633): 38987( 634)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.583538 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.583766 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 37 D0318 14:42:30.584052 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.589263 182129 usertrap_amd64.go:212] [ 38983( 633): 38983( 633)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.589350 182129 usertrap_amd64.go:122] [ 38983( 633): 38983( 633)] Allocate a new trap: 0xc005d97da0 43 D0318 14:42:30.589519 182129 usertrap_amd64.go:225] [ 38983( 633): 38983( 633)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.591866 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.591989 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 38 D0318 14:42:30.592118 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.597831 182129 task_signals.go:204] [ 38983( 633): 38987( 634)] Signal 9, PID: 38983, TID: 38987, fault addr: 0x0: terminating thread group D0318 14:42:30.597856 182129 task_exit.go:204] [ 38983( 633): 38983( 633)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.598102 182129 task_exit.go:204] [ 38983( 633): 38987( 634)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.599404 182129 task_exit.go:204] [ 38983( 633): 38987( 634)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.599499 182129 task_exit.go:204] [ 38983( 633): 38987( 634)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.603890 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.604009 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 39 D0318 14:42:30.604078 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.606993 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.607151 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 40 D0318 14:42:30.607056 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.607463 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.607484 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 38 D0318 14:42:30.607678 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.607832 182129 usertrap_amd64.go:212] [ 38985( 599): 38988( 600)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.608083 182129 usertrap_amd64.go:122] [ 38985( 599): 38988( 600)] Allocate a new trap: 0xc0043f0d20 41 D0318 14:42:30.608213 182129 usertrap_amd64.go:225] [ 38985( 599): 38988( 600)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.609162 182129 task_exit.go:204] [ 38983( 633): 38983( 633)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.609427 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.609600 182129 task_exit.go:204] [ 38983( 633): 38983( 633)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 14:42:30.614344 182129 usertrap_amd64.go:212] [ 38985( 599): 38985( 599)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.614520 182129 usertrap_amd64.go:122] [ 38985( 599): 38985( 599)] Allocate a new trap: 0xc0043f0d20 42 D0318 14:42:30.614760 182129 usertrap_amd64.go:225] [ 38985( 599): 38985( 599)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.631537 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.631680 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 39 D0318 14:42:30.631790 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.634860 182129 task_signals.go:204] [ 38985( 599): 38988( 600)] Signal 9, PID: 38985, TID: 38988, fault addr: 0x0: terminating thread group D0318 14:42:30.635001 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.635081 182129 task_exit.go:204] [ 38985( 599): 38988( 600)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.635109 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 40 D0318 14:42:30.635190 182129 task_exit.go:204] [ 38985( 599): 38985( 599)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.635533 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.636505 182129 task_exit.go:204] [ 38985( 599): 38988( 600)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.636645 182129 task_exit.go:204] [ 38985( 599): 38988( 600)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.637399 182129 usertrap_amd64.go:212] [ 38986( 556): 38989( 557)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.637533 182129 usertrap_amd64.go:122] [ 38986( 556): 38989( 557)] Allocate a new trap: 0xc0124321b0 41 D0318 14:42:30.637702 182129 usertrap_amd64.go:225] [ 38986( 556): 38989( 557)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.646180 182129 task_exit.go:204] [ 38985( 599): 38985( 599)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.646427 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.646712 182129 task_exit.go:204] [ 38985( 599): 38985( 599)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 14:42:30.651753 182129 usertrap_amd64.go:212] [ 38986( 556): 38986( 556)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.651873 182129 usertrap_amd64.go:122] [ 38986( 556): 38986( 556)] Allocate a new trap: 0xc0124321b0 42 D0318 14:42:30.652646 182129 usertrap_amd64.go:225] [ 38986( 556): 38986( 556)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.659213 182129 task_exit.go:204] [ 38986( 556): 38986( 556)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.660275 182129 task_signals.go:204] [ 38986( 556): 38989( 557)] Signal 9, PID: 38986, TID: 38989, fault addr: 0x0: terminating thread group D0318 14:42:30.660426 182129 task_exit.go:204] [ 38986( 556): 38986( 556)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.660620 182129 task_exit.go:204] [ 38986( 556): 38989( 557)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.669923 182129 task_exit.go:204] [ 38986( 556): 38989( 557)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.670008 182129 task_exit.go:204] [ 38986( 556): 38989( 557)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.670158 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.670433 182129 task_exit.go:204] [ 38986( 556): 38986( 556)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) D0318 14:42:30.687663 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:30.687936 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 37 D0318 14:42:30.689222 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:30.694565 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:30.694693 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 38 D0318 14:42:30.694820 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:30.702625 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.702745 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 36 D0318 14:42:30.703907 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.709331 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.709765 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 37 D0318 14:42:30.709895 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.719656 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.719909 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 39 D0318 14:42:30.720137 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.726667 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.727136 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 36 D0318 14:42:30.728649 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.734931 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.735125 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 40 D0318 14:42:30.735359 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.736796 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.736935 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 37 D0318 14:42:30.737071 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.738071 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.738169 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 41 D0318 14:42:30.738293 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.738665 182129 usertrap_amd64.go:212] [ 38990( 635): 38993( 636)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.738767 182129 usertrap_amd64.go:122] [ 38990( 635): 38993( 636)] Allocate a new trap: 0xc01531c150 42 D0318 14:42:30.738851 182129 usertrap_amd64.go:225] [ 38990( 635): 38993( 636)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.743511 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.743652 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 38 D0318 14:42:30.744419 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.756123 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.756199 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 39 D0318 14:42:30.756262 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.758426 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.758484 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.758756 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 40 D0318 14:42:30.758644 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 38 D0318 14:42:30.758909 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.758878 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.759362 182129 usertrap_amd64.go:212] [ 38991( 601): 38994( 602)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.759462 182129 usertrap_amd64.go:122] [ 38991( 601): 38994( 602)] Allocate a new trap: 0xc000881920 41 D0318 14:42:30.759558 182129 usertrap_amd64.go:225] [ 38991( 601): 38994( 602)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.767004 182129 usertrap_amd64.go:212] [ 38991( 601): 38991( 601)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.767141 182129 usertrap_amd64.go:122] [ 38991( 601): 38991( 601)] Allocate a new trap: 0xc000881920 42 D0318 14:42:30.767263 182129 usertrap_amd64.go:225] [ 38991( 601): 38991( 601)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.776249 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.776410 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 39 D0318 14:42:30.776616 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.779217 182129 task_exit.go:204] [ 38991( 601): 38991( 601)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.779291 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.779448 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 40 D0318 14:42:30.779585 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.780433 182129 task_signals.go:204] [ 38991( 601): 38994( 602)] Signal 9, PID: 38991, TID: 38994, fault addr: 0x0: terminating thread group D0318 14:42:30.780592 182129 task_exit.go:204] [ 38991( 601): 38991( 601)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.781041 182129 task_exit.go:204] [ 38991( 601): 38994( 602)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.781695 182129 usertrap_amd64.go:212] [ 38995( 637): 38995( 637)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:30.781843 182129 usertrap_amd64.go:122] [ 38995( 637): 38995( 637)] Allocate a new trap: 0xc000881950 43 D0318 14:42:30.783328 182129 usertrap_amd64.go:225] [ 38995( 637): 38995( 637)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.790223 182129 usertrap_amd64.go:212] [ 38992( 558): 38996( 559)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.790339 182129 usertrap_amd64.go:122] [ 38992( 558): 38996( 559)] Allocate a new trap: 0xc005d97dd0 41 D0318 14:42:30.790523 182129 usertrap_amd64.go:225] [ 38992( 558): 38996( 559)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.793561 182129 task_exit.go:204] [ 38991( 601): 38994( 602)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.793678 182129 task_exit.go:204] [ 38991( 601): 38994( 602)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.793820 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.795071 182129 task_exit.go:204] [ 38991( 601): 38991( 601)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40106614, &(0x7f0000000040)) D0318 14:42:30.801488 182129 usertrap_amd64.go:212] [ 38990( 635): 38990( 635)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.801740 182129 usertrap_amd64.go:122] [ 38990( 635): 38990( 635)] Allocate a new trap: 0xc01531c150 43 D0318 14:42:30.802399 182129 usertrap_amd64.go:225] [ 38990( 635): 38990( 635)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.802784 182129 usertrap_amd64.go:212] [ 38992( 558): 38992( 558)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.802885 182129 usertrap_amd64.go:122] [ 38992( 558): 38992( 558)] Allocate a new trap: 0xc005d97dd0 42 D0318 14:42:30.802976 182129 usertrap_amd64.go:225] [ 38992( 558): 38992( 558)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.815412 182129 task_exit.go:204] [ 38990( 635): 38990( 635)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.816806 182129 task_signals.go:204] [ 38990( 635): 38993( 636)] Signal 9, PID: 38990, TID: 38993, fault addr: 0x0: terminating thread group D0318 14:42:30.816812 182129 task_exit.go:204] [ 38990( 635): 38990( 635)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.817058 182129 task_exit.go:204] [ 38990( 635): 38993( 636)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.818702 182129 task_exit.go:204] [ 38992( 558): 38992( 558)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.819852 182129 task_exit.go:204] [ 38992( 558): 38992( 558)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.819806 182129 task_signals.go:204] [ 38992( 558): 38996( 559)] Signal 9, PID: 38992, TID: 38996, fault addr: 0x0: terminating thread group D0318 14:42:30.820276 182129 task_exit.go:204] [ 38992( 558): 38996( 559)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.829412 182129 task_exit.go:204] [ 38990( 635): 38993( 636)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.829571 182129 task_exit.go:204] [ 38990( 635): 38993( 636)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.829723 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.830074 182129 task_exit.go:204] [ 38990( 635): 38990( 635)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.832030 182129 task_exit.go:204] [ 38992( 558): 38996( 559)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.832131 182129 task_exit.go:204] [ 38992( 558): 38996( 559)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.832258 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 14:42:30 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) D0318 14:42:30.833295 182129 task_exit.go:204] [ 38992( 558): 38992( 558)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) D0318 14:42:30.868785 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:30.868958 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 36 D0318 14:42:30.870252 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:30.879596 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:30.879855 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 37 D0318 14:42:30.880036 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:30.886541 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:30.886719 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 37 D0318 14:42:30.887794 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:30.892481 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:30.892651 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 38 D0318 14:42:30.892750 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:30.893064 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:30.893174 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 36 D0318 14:42:30.894242 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:30.905697 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:30.905873 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 37 D0318 14:42:30.906020 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:30.917955 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:30.918133 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 38 D0318 14:42:30.918313 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:30.918378 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:30.918434 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 39 D0318 14:42:30.918575 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:30.938480 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:30.938645 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 40 D0318 14:42:30.938784 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:30.939233 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:30.939438 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 39 D0318 14:42:30.939526 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:30.941867 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:30.942075 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 41 D0318 14:42:30.942207 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:30.944444 182129 usertrap_amd64.go:212] [ 38998( 638): 39000( 639)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:30.944515 182129 usertrap_amd64.go:122] [ 38998( 638): 39000( 639)] Allocate a new trap: 0xc003c42480 42 D0318 14:42:30.944579 182129 usertrap_amd64.go:225] [ 38998( 638): 39000( 639)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:30.944548 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:30.944862 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 40 D0318 14:42:30.945001 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:30.945328 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:30.945634 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 38 D0318 14:42:30.945941 182129 usertrap_amd64.go:212] [ 38997( 603): 39001( 604)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:30.946066 182129 usertrap_amd64.go:122] [ 38997( 603): 39001( 604)] Allocate a new trap: 0xc003c42450 41 D0318 14:42:30.946022 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:30.946155 182129 usertrap_amd64.go:225] [ 38997( 603): 39001( 604)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:30.948044 182129 task_exit.go:204] [ 38995( 637): 38995( 637)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.954142 182129 usertrap_amd64.go:212] [ 38997( 603): 38997( 603)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:30.954370 182129 usertrap_amd64.go:122] [ 38997( 603): 38997( 603)] Allocate a new trap: 0xc003c42450 42 D0318 14:42:30.954567 182129 usertrap_amd64.go:225] [ 38997( 603): 38997( 603)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:30.958247 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:30.958321 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 39 D0318 14:42:30.958428 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:30.962946 182129 task_exit.go:204] [ 38995( 637): 38995( 637)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.963103 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:30.963245 182129 task_exit.go:204] [ 38995( 637): 38995( 637)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.963949 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:30.964062 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 40 D0318 14:42:30.964213 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:30.964408 182129 usertrap_amd64.go:212] [ 38999( 560): 39002( 561)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:30.964550 182129 usertrap_amd64.go:122] [ 38999( 560): 39002( 561)] Allocate a new trap: 0xc015016270 41 D0318 14:42:30.964678 182129 usertrap_amd64.go:225] [ 38999( 560): 39002( 561)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:30.967565 182129 task_exit.go:204] [ 38997( 603): 38997( 603)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.968010 182129 task_signals.go:204] [ 38997( 603): 39001( 604)] Signal 9, PID: 38997, TID: 39001, fault addr: 0x0: terminating thread group D0318 14:42:30.968244 182129 usertrap_amd64.go:212] [ 38998( 638): 38998( 638)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:30.968330 182129 usertrap_amd64.go:122] [ 38998( 638): 38998( 638)] Allocate a new trap: 0xc003c42480 43 D0318 14:42:30.968485 182129 usertrap_amd64.go:225] [ 38998( 638): 38998( 638)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:30.968221 182129 task_exit.go:204] [ 38997( 603): 39001( 604)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.968848 182129 usertrap_amd64.go:212] [ 38999( 560): 38999( 560)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:30.968980 182129 usertrap_amd64.go:122] [ 38999( 560): 38999( 560)] Allocate a new trap: 0xc015016270 42 D0318 14:42:30.969139 182129 usertrap_amd64.go:225] [ 38999( 560): 38999( 560)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:30.969896 182129 task_exit.go:204] [ 38997( 603): 39001( 604)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.970172 182129 task_exit.go:204] [ 38997( 603): 39001( 604)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.979553 182129 task_exit.go:204] [ 38999( 560): 38999( 560)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.981612 182129 task_signals.go:204] [ 38999( 560): 39002( 561)] Signal 9, PID: 38999, TID: 39002, fault addr: 0x0: terminating thread group D0318 14:42:30.982306 182129 task_exit.go:204] [ 38999( 560): 39002( 561)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.982705 182129 task_exit.go:204] [ 38999( 560): 38999( 560)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.990816 182129 task_exit.go:204] [ 38998( 638): 38998( 638)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:30.991766 182129 task_signals.go:204] [ 38998( 638): 39000( 639)] Signal 9, PID: 38998, TID: 39000, fault addr: 0x0: terminating thread group D0318 14:42:30.991954 182129 task_exit.go:204] [ 38998( 638): 38998( 638)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.992151 182129 task_exit.go:204] [ 38997( 603): 38997( 603)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.992336 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:30.992488 182129 task_exit.go:204] [ 38997( 603): 38997( 603)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.994014 182129 task_exit.go:204] [ 38998( 638): 39000( 639)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:30 executing program 2: perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) D0318 14:42:30.994471 182129 task_exit.go:204] [ 38999( 560): 39002( 561)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:30.994598 182129 task_exit.go:204] [ 38999( 560): 39002( 561)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:30.994839 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:30.995188 182129 task_exit.go:204] [ 38999( 560): 38999( 560)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89a2, &(0x7f0000000900)={'bridge0\x00', @random="0200002000"}) D0318 14:42:31.004260 182129 task_exit.go:204] [ 38998( 638): 39000( 639)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.004374 182129 task_exit.go:204] [ 38998( 638): 39000( 639)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.004549 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.005984 182129 task_exit.go:204] [ 38998( 638): 38998( 638)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.047165 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.047385 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 36 D0318 14:42:31.048380 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.048663 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 36 D0318 14:42:31.048964 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.050173 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.054108 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.054218 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 37 D0318 14:42:31.054378 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.056530 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.056927 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 37 D0318 14:42:31.057295 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.073756 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.074036 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 38 D0318 14:42:31.074323 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.087833 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.088012 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 39 D0318 14:42:31.088105 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.090425 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.090546 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 40 D0318 14:42:31.090645 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.091327 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.091407 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 38 D0318 14:42:31.091490 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.091922 182129 usertrap_amd64.go:212] [ 39004( 605): 39005( 606)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.092062 182129 usertrap_amd64.go:122] [ 39004( 605): 39005( 606)] Allocate a new trap: 0xc012432240 41 D0318 14:42:31.092203 182129 usertrap_amd64.go:225] [ 39004( 605): 39005( 606)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.097129 182129 usertrap_amd64.go:212] [ 39004( 605): 39004( 605)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.097246 182129 usertrap_amd64.go:122] [ 39004( 605): 39004( 605)] Allocate a new trap: 0xc012432240 42 D0318 14:42:31.097356 182129 usertrap_amd64.go:225] [ 39004( 605): 39004( 605)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.106303 182129 task_exit.go:204] [ 39004( 605): 39004( 605)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.106811 182129 task_signals.go:204] [ 39004( 605): 39005( 606)] Signal 9, PID: 39004, TID: 39005, fault addr: 0x0: terminating thread group D0318 14:42:31.106722 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.107020 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 39 D0318 14:42:31.107116 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.107846 182129 task_exit.go:204] [ 39004( 605): 39005( 606)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.108196 182129 task_exit.go:204] [ 39004( 605): 39004( 605)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.110698 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.110859 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 40 D0318 14:42:31.111004 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.111702 182129 usertrap_amd64.go:212] [ 39003( 562): 39006( 563)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.111818 182129 usertrap_amd64.go:122] [ 39003( 562): 39006( 563)] Allocate a new trap: 0xc0150162a0 41 D0318 14:42:31.111913 182129 usertrap_amd64.go:225] [ 39003( 562): 39006( 563)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.115689 182129 usertrap_amd64.go:212] [ 39003( 562): 39003( 562)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.115848 182129 usertrap_amd64.go:122] [ 39003( 562): 39003( 562)] Allocate a new trap: 0xc0150162a0 42 D0318 14:42:31.115984 182129 usertrap_amd64.go:225] [ 39003( 562): 39003( 562)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.120930 182129 task_exit.go:204] [ 39004( 605): 39005( 606)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.121021 182129 task_exit.go:204] [ 39004( 605): 39005( 606)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.121220 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.123350 182129 task_exit.go:204] [ 39004( 605): 39004( 605)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.140006 182129 task_exit.go:204] [ 39003( 562): 39003( 562)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.141216 182129 task_exit.go:204] [ 39003( 562): 39003( 562)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.141791 182129 task_signals.go:204] [ 39003( 562): 39006( 563)] Signal 9, PID: 39003, TID: 39006, fault addr: 0x0: terminating thread group D0318 14:42:31.142053 182129 task_exit.go:204] [ 39003( 562): 39006( 563)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.154012 182129 task_exit.go:204] [ 39003( 562): 39006( 563)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.154230 182129 task_exit.go:204] [ 39003( 562): 39006( 563)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.154465 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.155196 182129 task_exit.go:204] [ 39003( 562): 39003( 562)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.260225 182129 task_signals.go:470] [ 38937(1362): 38942(1364)] Notified of signal 13 D0318 14:42:31.264195 182129 task_signals.go:204] [ 38937(1362): 38942(1364)] Signal 13, PID: 38937, TID: 38942, fault addr: 0x0: terminating thread group D0318 14:42:31.264295 182129 task_signals.go:470] [ 38937(1362): 38938(1363)] Notified of signal 13 D0318 14:42:31.264731 182129 task_signals.go:204] [ 38937(1362): 38938(1363)] Signal 13, PID: 38937, TID: 38938, fault addr: 0x0: terminating thread group D0318 14:42:31.264966 182129 task_exit.go:204] [ 38937(1362): 38938(1363)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.264958 182129 task_signals.go:204] [ 38937(1362): 38944(1365)] Signal 9, PID: 38937, TID: 38944, fault addr: 0x0: terminating thread group D0318 14:42:31.265299 182129 task_exit.go:204] [ 38937(1362): 38942(1364)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.265770 182129 task_signals.go:204] [ 38937(1362): 38937(1362)] Signal 9, PID: 38937, TID: 38937, fault addr: 0x0: terminating thread group D0318 14:42:31.266630 182129 task_exit.go:204] [ 38937(1362): 38942(1364)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.266831 182129 task_exit.go:204] [ 38937(1362): 38942(1364)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.267146 182129 task_exit.go:204] [ 38937(1362): 38944(1365)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.267481 182129 task_exit.go:204] [ 38937(1362): 38937(1362)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.268223 182129 task_signals.go:204] [ 38937(1362): 38948(1366)] Signal 9, PID: 38937, TID: 38948, fault addr: 0x0: terminating thread group D0318 14:42:31.268313 182129 task_exit.go:204] [ 38937(1362): 38937(1362)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.268940 182129 task_exit.go:204] [ 38937(1362): 38938(1363)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.268993 182129 task_exit.go:204] [ 38937(1362): 38938(1363)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.269171 182129 task_exit.go:204] [ 38937(1362): 38948(1366)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.269811 182129 task_exit.go:204] [ 38937(1362): 38948(1366)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.269870 182129 task_exit.go:204] [ 38937(1362): 38948(1366)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.279026 182129 task_exit.go:204] [ 38937(1362): 38944(1365)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.279153 182129 task_exit.go:204] [ 38937(1362): 38944(1365)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.279290 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.279776 182129 task_exit.go:204] [ 38937(1362): 38937(1362)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 1: syz_clone(0x186180, 0x0, 0xfffffffffffffe72, 0xfffffffffffffffd, 0x0, 0x0) 14:42:31 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8971, &(0x7f0000003a00)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) D0318 14:42:31.312764 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.312971 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 36 D0318 14:42:31.314189 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.318300 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.318471 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.318526 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 37 D0318 14:42:31.318622 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.318592 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 36 D0318 14:42:31.319981 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.321969 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:31.322313 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 37 D0318 14:42:31.322537 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:31.322665 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 37 D0318 14:42:31.323440 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:31.323701 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:31.324388 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.324459 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 37 D0318 14:42:31.324612 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.328687 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:31.328836 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 38 D0318 14:42:31.329004 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:31.329419 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:31.329507 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 38 D0318 14:42:31.329584 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:31.336180 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.336309 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 38 D0318 14:42:31.336394 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.347190 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.347319 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 38 D0318 14:42:31.347445 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.348523 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:31.348645 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 39 D0318 14:42:31.348719 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:31.357687 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.357796 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 39 D0318 14:42:31.357875 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.358090 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:31.358167 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 40 D0318 14:42:31.358236 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:31.360281 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.360355 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 40 D0318 14:42:31.360445 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.360810 182129 usertrap_amd64.go:212] [ 39007( 607): 39011( 608)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.360914 182129 usertrap_amd64.go:122] [ 39007( 607): 39011( 608)] Allocate a new trap: 0xc000680000 41 D0318 14:42:31.360999 182129 usertrap_amd64.go:225] [ 39007( 607): 39011( 608)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.361554 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:31.361655 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 39 D0318 14:42:31.361577 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:31.361786 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:31.361803 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 41 D0318 14:42:31.361910 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:31.362233 182129 usertrap_amd64.go:212] [ 39009( 640): 39012( 641)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:31.362342 182129 usertrap_amd64.go:122] [ 39009( 640): 39012( 641)] Allocate a new trap: 0xc003f5e000 42 D0318 14:42:31.362598 182129 usertrap_amd64.go:225] [ 39009( 640): 39012( 641)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:31.366036 182129 usertrap_amd64.go:212] [ 39009( 640): 39009( 640)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:31.366184 182129 usertrap_amd64.go:122] [ 39009( 640): 39009( 640)] Allocate a new trap: 0xc003f5e000 43 D0318 14:42:31.366110 182129 usertrap_amd64.go:212] [ 39007( 607): 39007( 607)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.366256 182129 usertrap_amd64.go:225] [ 39009( 640): 39009( 640)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.366473 182129 usertrap_amd64.go:122] [ 39007( 607): 39007( 607)] Allocate a new trap: 0xc000680000 42 D0318 14:42:31.366638 182129 usertrap_amd64.go:225] [ 39007( 607): 39007( 607)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.372925 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:31.373015 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 40 D0318 14:42:31.373104 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:31.374179 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.374265 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 39 D0318 14:42:31.374350 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.375066 182129 task_signals.go:204] [ 39009( 640): 39012( 641)] Signal 9, PID: 39009, TID: 39012, fault addr: 0x0: terminating thread group D0318 14:42:31.375103 182129 task_signals.go:204] [ 39007( 607): 39011( 608)] Signal 9, PID: 39007, TID: 39011, fault addr: 0x0: terminating thread group D0318 14:42:31.375239 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:31.375291 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 41 D0318 14:42:31.375362 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:31.375643 182129 usertrap_amd64.go:212] [ 39010(1367): 39013(1368)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:31.375771 182129 usertrap_amd64.go:122] [ 39010(1367): 39013(1368)] Allocate a new trap: 0xc000e68000 42 D0318 14:42:31.375948 182129 usertrap_amd64.go:225] [ 39010(1367): 39013(1368)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:31.376796 182129 task_exit.go:204] [ 39009( 640): 39009( 640)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.376985 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.377039 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 40 D0318 14:42:31.377077 182129 task_exit.go:204] [ 39007( 607): 39007( 607)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.377187 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.377348 182129 usertrap_amd64.go:212] [ 39010(1367): 39010(1367)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:31.377335 182129 task_exit.go:204] [ 39009( 640): 39012( 641)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.377407 182129 usertrap_amd64.go:122] [ 39010(1367): 39010(1367)] Allocate a new trap: 0xc000e68000 43 D0318 14:42:31.377422 182129 usertrap_amd64.go:212] [ 39008( 564): 39014( 565)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.377480 182129 usertrap_amd64.go:122] [ 39008( 564): 39014( 565)] Allocate a new trap: 0xc00063e000 41 D0318 14:42:31.377534 182129 task_exit.go:204] [ 39007( 607): 39011( 608)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.377578 182129 usertrap_amd64.go:225] [ 39008( 564): 39014( 565)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.377496 182129 usertrap_amd64.go:225] [ 39010(1367): 39010(1367)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:31.378625 182129 task_exit.go:204] [ 39009( 640): 39009( 640)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.379360 182129 task_exit.go:204] [ 39007( 607): 39007( 607)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.381551 182129 usertrap_amd64.go:212] [ 39008( 564): 39008( 564)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.381700 182129 usertrap_amd64.go:122] [ 39008( 564): 39008( 564)] Allocate a new trap: 0xc00063e000 42 D0318 14:42:31.381847 182129 usertrap_amd64.go:225] [ 39008( 564): 39008( 564)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.385822 182129 task_signals.go:204] [ 39010(1367): 39013(1368)] Signal 9, PID: 39010, TID: 39013, fault addr: 0x0: terminating thread group D0318 14:42:31.385941 182129 task_exit.go:204] [ 39010(1367): 39010(1367)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.386191 182129 task_exit.go:204] [ 39010(1367): 39013(1368)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.386995 182129 task_exit.go:204] [ 39010(1367): 39013(1368)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.387062 182129 task_exit.go:204] [ 39010(1367): 39013(1368)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.387430 182129 task_exit.go:204] [ 39007( 607): 39011( 608)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.387515 182129 task_exit.go:204] [ 39007( 607): 39011( 608)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.387745 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.388951 182129 task_exit.go:204] [ 39007( 607): 39007( 607)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 14:42:31.393420 182129 task_exit.go:204] [ 39008( 564): 39008( 564)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.394430 182129 task_signals.go:204] [ 39008( 564): 39014( 565)] Signal 9, PID: 39008, TID: 39014, fault addr: 0x0: terminating thread group D0318 14:42:31.394567 182129 task_exit.go:204] [ 39008( 564): 39008( 564)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.394802 182129 task_exit.go:204] [ 39008( 564): 39014( 565)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.395857 182129 task_exit.go:204] [ 39010(1367): 39010(1367)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.395971 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.396154 182129 task_exit.go:204] [ 39010(1367): 39010(1367)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) D0318 14:42:31.398440 182129 task_exit.go:204] [ 39009( 640): 39012( 641)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.398502 182129 task_exit.go:204] [ 39009( 640): 39012( 641)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.398674 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.400156 182129 task_exit.go:204] [ 39009( 640): 39009( 640)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.403923 182129 task_exit.go:204] [ 39008( 564): 39014( 565)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.404091 182129 task_exit.go:204] [ 39008( 564): 39014( 565)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.404209 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 14:42:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan1\x00', @random='\rh\x00%\x00'}) D0318 14:42:31.406341 182129 task_exit.go:204] [ 39008( 564): 39008( 564)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001340)) ioctl$SIOCSIFHWADDR(r0, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0100e1ff00"}) D0318 14:42:31.434961 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.435116 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 36 D0318 14:42:31.436710 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.443526 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.443745 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 37 D0318 14:42:31.443858 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.447079 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:31.447454 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 37 D0318 14:42:31.448668 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:31.452885 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:31.453007 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 38 D0318 14:42:31.453204 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:31.454149 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.454274 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 36 D0318 14:42:31.454559 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:31.454661 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 37 D0318 14:42:31.455768 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:31.455953 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.460319 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:31.460411 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 38 D0318 14:42:31.460553 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:31.461401 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.461472 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 37 D0318 14:42:31.461551 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.466150 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.466264 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 38 D0318 14:42:31.466378 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.469985 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:31.470106 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 39 D0318 14:42:31.470183 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:31.477710 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:31.477793 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 39 D0318 14:42:31.477908 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:31.478495 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.478814 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 39 D0318 14:42:31.478932 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.481765 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.481869 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 40 D0318 14:42:31.481979 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.482079 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.482160 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 38 D0318 14:42:31.482277 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.482584 182129 usertrap_amd64.go:212] [ 39015( 609): 39019( 610)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.482648 182129 usertrap_amd64.go:122] [ 39015( 609): 39019( 610)] Allocate a new trap: 0xc0004e0240 41 D0318 14:42:31.482713 182129 usertrap_amd64.go:225] [ 39015( 609): 39019( 610)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.483691 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:31.484001 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 40 D0318 14:42:31.484215 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:31.486870 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:31.487067 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 41 D0318 14:42:31.487332 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:31.488229 182129 usertrap_amd64.go:212] [ 39016( 642): 39020( 643)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:31.488353 182129 usertrap_amd64.go:122] [ 39016( 642): 39020( 643)] Allocate a new trap: 0xc005f00030 42 D0318 14:42:31.488447 182129 usertrap_amd64.go:225] [ 39016( 642): 39020( 643)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:31.488727 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:31.488897 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 40 D0318 14:42:31.488998 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:31.491068 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:31.491145 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 41 D0318 14:42:31.491210 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:31.492594 182129 usertrap_amd64.go:212] [ 39017(1369): 39021(1370)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:31.492676 182129 usertrap_amd64.go:122] [ 39017(1369): 39021(1370)] Allocate a new trap: 0xc004db0000 42 D0318 14:42:31.492759 182129 usertrap_amd64.go:225] [ 39017(1369): 39021(1370)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:31.494796 182129 usertrap_amd64.go:212] [ 39016( 642): 39016( 642)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:31.494968 182129 usertrap_amd64.go:122] [ 39016( 642): 39016( 642)] Allocate a new trap: 0xc005f00030 43 D0318 14:42:31.495121 182129 usertrap_amd64.go:225] [ 39016( 642): 39016( 642)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.506143 182129 usertrap_amd64.go:212] [ 39017(1369): 39017(1369)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:31.506223 182129 usertrap_amd64.go:122] [ 39017(1369): 39017(1369)] Allocate a new trap: 0xc004db0000 43 D0318 14:42:31.506314 182129 usertrap_amd64.go:225] [ 39017(1369): 39017(1369)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:31.506594 182129 usertrap_amd64.go:212] [ 39022( 611): 39022( 611)] Found the pattern at ip 556d17c731ae:sysno 230 D0318 14:42:31.506718 182129 usertrap_amd64.go:122] [ 39022( 611): 39022( 611)] Allocate a new trap: 0xc0007060f0 42 D0318 14:42:31.506950 182129 task_exit.go:204] [ 39016( 642): 39016( 642)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.507658 182129 usertrap_amd64.go:225] [ 39022( 611): 39022( 611)] Apply the binary patch addr 556d17c731ae trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.507944 182129 task_signals.go:204] [ 39016( 642): 39020( 643)] Signal 9, PID: 39016, TID: 39020, fault addr: 0x0: terminating thread group D0318 14:42:31.508076 182129 task_exit.go:204] [ 39016( 642): 39016( 642)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.508747 182129 task_exit.go:204] [ 39016( 642): 39020( 643)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.509563 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.509661 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 39 D0318 14:42:31.509780 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.512204 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.512293 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 40 D0318 14:42:31.512366 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.512535 182129 task_exit.go:204] [ 39017(1369): 39017(1369)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.512706 182129 task_signals.go:204] [ 39017(1369): 39021(1370)] Signal 9, PID: 39017, TID: 39021, fault addr: 0x0: terminating thread group D0318 14:42:31.513007 182129 usertrap_amd64.go:212] [ 39018( 566): 39023( 567)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.513073 182129 usertrap_amd64.go:122] [ 39018( 566): 39023( 567)] Allocate a new trap: 0xc003f5e030 41 D0318 14:42:31.513160 182129 usertrap_amd64.go:225] [ 39018( 566): 39023( 567)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.513549 182129 task_exit.go:204] [ 39017(1369): 39021(1370)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.513953 182129 task_exit.go:204] [ 39017(1369): 39017(1369)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.517603 182129 usertrap_amd64.go:212] [ 39018( 566): 39018( 566)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.517802 182129 usertrap_amd64.go:122] [ 39018( 566): 39018( 566)] Allocate a new trap: 0xc003f5e030 42 D0318 14:42:31.517971 182129 usertrap_amd64.go:225] [ 39018( 566): 39018( 566)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.519932 182129 task_exit.go:204] [ 39016( 642): 39020( 643)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.520109 182129 task_exit.go:204] [ 39016( 642): 39020( 643)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.520308 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.521402 182129 task_exit.go:204] [ 39016( 642): 39016( 642)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) D0318 14:42:31.523782 182129 task_exit.go:204] [ 39017(1369): 39021(1370)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.523869 182129 task_exit.go:204] [ 39017(1369): 39021(1370)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.524051 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.524757 182129 usertrap_amd64.go:212] [ 39015( 609): 39015( 609)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.524905 182129 usertrap_amd64.go:122] [ 39015( 609): 39015( 609)] Allocate a new trap: 0xc0004e0240 42 D0318 14:42:31.525264 182129 usertrap_amd64.go:225] [ 39015( 609): 39015( 609)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.525469 182129 task_exit.go:204] [ 39017(1369): 39017(1369)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0xfffffecc) dup2(r0, r1) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x0) D0318 14:42:31.528740 182129 task_exit.go:204] [ 39018( 566): 39018( 566)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.529038 182129 task_signals.go:204] [ 39018( 566): 39023( 567)] Signal 9, PID: 39018, TID: 39023, fault addr: 0x0: terminating thread group D0318 14:42:31.529696 182129 task_exit.go:204] [ 39018( 566): 39018( 566)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.529978 182129 task_exit.go:204] [ 39018( 566): 39023( 567)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.532404 182129 task_exit.go:204] [ 39015( 609): 39015( 609)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.532744 182129 task_signals.go:204] [ 39015( 609): 39019( 610)] Signal 9, PID: 39015, TID: 39019, fault addr: 0x0: terminating thread group D0318 14:42:31.533353 182129 task_exit.go:204] [ 39015( 609): 39015( 609)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.533519 182129 task_exit.go:204] [ 39015( 609): 39019( 610)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.537515 182129 task_exit.go:204] [ 39018( 566): 39023( 567)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.537606 182129 task_exit.go:204] [ 39018( 566): 39023( 567)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.537751 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.538339 182129 task_exit.go:204] [ 39018( 566): 39018( 566)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 14:42:31.544123 182129 task_exit.go:204] [ 39015( 609): 39019( 610)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.544231 182129 task_exit.go:204] [ 39015( 609): 39019( 610)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.544328 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.546405 182129 task_exit.go:204] [ 39015( 609): 39015( 609)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) D0318 14:42:31.564771 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:31.564913 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 37 D0318 14:42:31.565285 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:31.565468 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 37 D0318 14:42:31.566051 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:31.566587 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:31.571075 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:31.571161 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 38 D0318 14:42:31.571284 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:31.571361 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 38 D0318 14:42:31.571254 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:31.571440 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:31.582931 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.583050 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 36 D0318 14:42:31.585281 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:31.585372 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 39 D0318 14:42:31.585505 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:31.585897 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.586797 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.586914 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 36 D0318 14:42:31.592796 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:31.592890 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 39 D0318 14:42:31.593018 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:31.594210 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.594331 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 37 D0318 14:42:31.594498 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.596073 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.600546 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.600762 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 37 D0318 14:42:31.601010 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.605243 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:31.605340 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 40 D0318 14:42:31.605414 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:31.607674 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:31.607997 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 41 D0318 14:42:31.608258 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:31.608285 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:31.608471 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 40 D0318 14:42:31.608566 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:31.608623 182129 usertrap_amd64.go:212] [ 39025(1371): 39028(1372)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:31.608711 182129 usertrap_amd64.go:122] [ 39025(1371): 39028(1372)] Allocate a new trap: 0xc000706120 42 D0318 14:42:31.608832 182129 usertrap_amd64.go:225] [ 39025(1371): 39028(1372)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:31.610812 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:31.610913 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 41 D0318 14:42:31.610998 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:31.611845 182129 usertrap_amd64.go:212] [ 39024( 644): 39029( 645)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:31.612146 182129 usertrap_amd64.go:122] [ 39024( 644): 39029( 645)] Allocate a new trap: 0xc00063e0c0 42 D0318 14:42:31.612355 182129 usertrap_amd64.go:225] [ 39024( 644): 39029( 645)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:31.620734 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.620846 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 38 D0318 14:42:31.620912 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.627362 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.627468 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 38 D0318 14:42:31.627544 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.631331 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.631438 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 39 D0318 14:42:31.631508 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.634147 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.634218 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 40 D0318 14:42:31.634276 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.635001 182129 usertrap_amd64.go:212] [ 39026( 568): 39031( 569)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.635070 182129 usertrap_amd64.go:122] [ 39026( 568): 39031( 569)] Allocate a new trap: 0xc0014a4060 41 D0318 14:42:31.635186 182129 usertrap_amd64.go:225] [ 39026( 568): 39031( 569)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.646175 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.646445 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 39 D0318 14:42:31.646555 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.648690 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.648795 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 40 D0318 14:42:31.648892 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.649465 182129 usertrap_amd64.go:212] [ 39027( 612): 39032( 613)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.649566 182129 usertrap_amd64.go:122] [ 39027( 612): 39032( 613)] Allocate a new trap: 0xc0006800f0 41 D0318 14:42:31.649653 182129 usertrap_amd64.go:225] [ 39027( 612): 39032( 613)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.653643 182129 usertrap_amd64.go:212] [ 39027( 612): 39027( 612)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.653712 182129 usertrap_amd64.go:212] [ 39030( 646): 39030( 646)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:31.653754 182129 usertrap_amd64.go:122] [ 39027( 612): 39027( 612)] Allocate a new trap: 0xc0006800f0 42 D0318 14:42:31.653799 182129 usertrap_amd64.go:122] [ 39030( 646): 39030( 646)] Allocate a new trap: 0xc000680150 43 D0318 14:42:31.653816 182129 usertrap_amd64.go:225] [ 39027( 612): 39027( 612)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.654570 182129 usertrap_amd64.go:225] [ 39030( 646): 39030( 646)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.667417 182129 task_exit.go:204] [ 39022( 611): 39022( 611)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.671507 182129 usertrap_amd64.go:212] [ 39033( 570): 39033( 570)] Found the pattern at ip 560b68d3d1ae:sysno 230 D0318 14:42:31.671657 182129 usertrap_amd64.go:122] [ 39033( 570): 39033( 570)] Allocate a new trap: 0xc0008801e0 42 D0318 14:42:31.672746 182129 usertrap_amd64.go:225] [ 39033( 570): 39033( 570)] Apply the binary patch addr 560b68d3d1ae trap addr 62d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.672811 182129 usertrap_amd64.go:212] [ 39025(1371): 39025(1371)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:31.672972 182129 usertrap_amd64.go:122] [ 39025(1371): 39025(1371)] Allocate a new trap: 0xc000706120 43 D0318 14:42:31.673081 182129 usertrap_amd64.go:225] [ 39025(1371): 39025(1371)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:31.673132 182129 usertrap_amd64.go:212] [ 39026( 568): 39026( 568)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.673269 182129 usertrap_amd64.go:122] [ 39026( 568): 39026( 568)] Allocate a new trap: 0xc0014a4060 42 D0318 14:42:31.673663 182129 usertrap_amd64.go:225] [ 39026( 568): 39026( 568)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.674718 182129 task_exit.go:204] [ 39022( 611): 39022( 611)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.674880 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.675042 182129 task_exit.go:204] [ 39022( 611): 39022( 611)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.676531 182129 task_exit.go:204] [ 39027( 612): 39027( 612)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.677393 182129 task_signals.go:204] [ 39027( 612): 39032( 613)] Signal 9, PID: 39027, TID: 39032, fault addr: 0x0: terminating thread group D0318 14:42:31.677542 182129 task_exit.go:204] [ 39027( 612): 39032( 613)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.677959 182129 task_exit.go:204] [ 39027( 612): 39027( 612)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.684025 182129 task_exit.go:204] [ 39027( 612): 39032( 613)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.684115 182129 task_exit.go:204] [ 39027( 612): 39032( 613)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.684258 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.684492 182129 task_exit.go:204] [ 39027( 612): 39027( 612)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.685231 182129 task_exit.go:204] [ 39025(1371): 39025(1371)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.685422 182129 task_signals.go:204] [ 39025(1371): 39034(1373)] Signal 9, PID: 39025, TID: 39034, fault addr: 0x0: terminating thread group D0318 14:42:31.686202 182129 task_exit.go:204] [ 39025(1371): 39025(1371)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.686363 182129 task_exit.go:204] [ 39025(1371): 39034(1373)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.686233 182129 task_signals.go:204] [ 39025(1371): 39028(1372)] Signal 9, PID: 39025, TID: 39028, fault addr: 0x0: terminating thread group 14:42:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x34100) write$cgroup_subtree(r0, &(0x7f0000001000)=ANY=[@ANYRES32, @ANYBLOB], 0x1a000) D0318 14:42:31.687105 182129 task_exit.go:204] [ 39025(1371): 39034(1373)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.687239 182129 task_exit.go:204] [ 39025(1371): 39034(1373)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.687779 182129 task_exit.go:204] [ 39025(1371): 39028(1372)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.690116 182129 task_exit.go:204] [ 39026( 568): 39026( 568)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.690373 182129 task_signals.go:204] [ 39026( 568): 39031( 569)] Signal 9, PID: 39026, TID: 39031, fault addr: 0x0: terminating thread group D0318 14:42:31.690880 182129 task_exit.go:204] [ 39026( 568): 39026( 568)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.691011 182129 task_exit.go:204] [ 39026( 568): 39031( 569)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.691646 182129 usertrap_amd64.go:212] [ 39035( 647): 39035( 647)] Found the pattern at ip 55ff404a31ae:sysno 230 D0318 14:42:31.691812 182129 usertrap_amd64.go:122] [ 39035( 647): 39035( 647)] Allocate a new trap: 0xc0014a40c0 43 D0318 14:42:31.692955 182129 usertrap_amd64.go:225] [ 39035( 647): 39035( 647)] Apply the binary patch addr 55ff404a31ae trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.702522 182129 usertrap_amd64.go:212] [ 39024( 644): 39024( 644)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:31.702628 182129 usertrap_amd64.go:122] [ 39024( 644): 39024( 644)] Allocate a new trap: 0xc00063e0c0 43 D0318 14:42:31.702995 182129 task_exit.go:204] [ 39025(1371): 39028(1372)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.703023 182129 usertrap_amd64.go:225] [ 39024( 644): 39024( 644)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.703049 182129 task_exit.go:204] [ 39025(1371): 39028(1372)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.703158 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.703349 182129 task_exit.go:204] [ 39026( 568): 39031( 569)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.703434 182129 task_exit.go:204] [ 39026( 568): 39031( 569)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.703545 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.703923 182129 task_exit.go:204] [ 39026( 568): 39026( 568)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.705272 182129 task_exit.go:204] [ 39025(1371): 39025(1371)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:42:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xe2480, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) D0318 14:42:31.713134 182129 task_exit.go:204] [ 39024( 644): 39024( 644)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.714012 182129 task_exit.go:204] [ 39024( 644): 39024( 644)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.714197 182129 task_signals.go:204] [ 39024( 644): 39029( 645)] Signal 9, PID: 39024, TID: 39029, fault addr: 0x0: terminating thread group D0318 14:42:31.714309 182129 task_exit.go:204] [ 39024( 644): 39029( 645)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.732198 182129 task_exit.go:204] [ 39024( 644): 39029( 645)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.732459 182129 task_exit.go:204] [ 39024( 644): 39029( 645)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.732637 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.734696 182129 task_exit.go:204] [ 39024( 644): 39024( 644)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, &(0x7f00000003c0)) D0318 14:42:31.738997 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.739132 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 36 D0318 14:42:31.740268 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.746746 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.746857 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 37 D0318 14:42:31.746923 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.747846 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.747973 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 36 D0318 14:42:31.748990 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.753542 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.753623 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 37 D0318 14:42:31.753708 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.754978 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:31.755092 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 37 D0318 14:42:31.756289 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:31.763176 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.763272 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 38 D0318 14:42:31.763354 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:31.763440 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 38 D0318 14:42:31.763373 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.763499 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:31.776060 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.776216 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 38 D0318 14:42:31.776334 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.776925 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:31.776994 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 39 D0318 14:42:31.777101 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:31.778147 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.778255 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 39 D0318 14:42:31.778372 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.780720 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.780808 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 40 D0318 14:42:31.780877 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.781575 182129 usertrap_amd64.go:212] [ 39036( 614): 39040( 615)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.781634 182129 usertrap_amd64.go:122] [ 39036( 614): 39040( 615)] Allocate a new trap: 0xc00063e120 41 D0318 14:42:31.781747 182129 usertrap_amd64.go:225] [ 39036( 614): 39040( 615)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.784736 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:31.784819 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 40 D0318 14:42:31.784894 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:31.785628 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:31.785958 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 37 D0318 14:42:31.786690 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:31.786764 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 41 D0318 14:42:31.786840 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:31.787037 182129 usertrap_amd64.go:212] [ 39037(1374): 39041(1375)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:31.787138 182129 usertrap_amd64.go:122] [ 39037(1374): 39041(1375)] Allocate a new trap: 0xc003f5e090 42 D0318 14:42:31.787247 182129 usertrap_amd64.go:225] [ 39037(1374): 39041(1375)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:31.787347 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.787406 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:31.787480 182129 usertrap_amd64.go:212] [ 39036( 614): 39036( 614)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.787536 182129 usertrap_amd64.go:122] [ 39036( 614): 39036( 614)] Allocate a new trap: 0xc00063e120 42 D0318 14:42:31.787420 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 39 D0318 14:42:31.787651 182129 usertrap_amd64.go:225] [ 39036( 614): 39036( 614)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.787734 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.789929 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.790045 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 40 D0318 14:42:31.790139 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.790415 182129 usertrap_amd64.go:212] [ 39038( 571): 39042( 572)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.790505 182129 usertrap_amd64.go:122] [ 39038( 571): 39042( 572)] Allocate a new trap: 0xc0004280f0 41 D0318 14:42:31.790586 182129 usertrap_amd64.go:225] [ 39038( 571): 39042( 572)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.791931 182129 usertrap_amd64.go:212] [ 39037(1374): 39037(1374)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:31.792006 182129 usertrap_amd64.go:122] [ 39037(1374): 39037(1374)] Allocate a new trap: 0xc003f5e090 43 D0318 14:42:31.792069 182129 usertrap_amd64.go:225] [ 39037(1374): 39037(1374)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:31.792954 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:31.793034 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 38 D0318 14:42:31.793117 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:31.793773 182129 usertrap_amd64.go:212] [ 39038( 571): 39038( 571)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.793953 182129 usertrap_amd64.go:122] [ 39038( 571): 39038( 571)] Allocate a new trap: 0xc0004280f0 42 D0318 14:42:31.794065 182129 usertrap_amd64.go:225] [ 39038( 571): 39038( 571)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.794939 182129 task_exit.go:204] [ 39036( 614): 39036( 614)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.795931 182129 task_signals.go:204] [ 39036( 614): 39040( 615)] Signal 9, PID: 39036, TID: 39040, fault addr: 0x0: terminating thread group D0318 14:42:31.796137 182129 task_exit.go:204] [ 39036( 614): 39036( 614)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.796487 182129 task_exit.go:204] [ 39036( 614): 39040( 615)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.797416 182129 task_signals.go:204] [ 39037(1374): 39041(1375)] Signal 9, PID: 39037, TID: 39041, fault addr: 0x0: terminating thread group D0318 14:42:31.797775 182129 task_exit.go:204] [ 39037(1374): 39037(1374)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.798021 182129 task_exit.go:204] [ 39037(1374): 39041(1375)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.799403 182129 task_exit.go:204] [ 39038( 571): 39038( 571)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.799530 182129 task_exit.go:204] [ 39037(1374): 39037(1374)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.799712 182129 task_signals.go:204] [ 39038( 571): 39042( 572)] Signal 9, PID: 39038, TID: 39042, fault addr: 0x0: terminating thread group D0318 14:42:31.800377 182129 task_exit.go:204] [ 39038( 571): 39038( 571)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.800588 182129 task_exit.go:204] [ 39038( 571): 39042( 572)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.805427 182129 task_exit.go:204] [ 39036( 614): 39040( 615)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.805522 182129 task_exit.go:204] [ 39036( 614): 39040( 615)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.805687 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.805974 182129 task_exit.go:204] [ 39036( 614): 39036( 614)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x99}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) D0318 14:42:31.808201 182129 task_exit.go:204] [ 39037(1374): 39041(1375)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.808274 182129 task_exit.go:204] [ 39037(1374): 39041(1375)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.808748 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.809936 182129 task_exit.go:204] [ 39038( 571): 39042( 572)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.810028 182129 task_exit.go:204] [ 39038( 571): 39042( 572)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.810128 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.810280 182129 task_exit.go:204] [ 39037(1374): 39037(1374)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.810519 182129 task_exit.go:204] [ 39030( 646): 39030( 646)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.811149 182129 task_exit.go:204] [ 39038( 571): 39038( 571)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000}, 0x119882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_clone(0x0, &(0x7f0000000cc0), 0x0, 0x0, 0x0, 0x0) 14:42:31 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x80080900, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43405) D0318 14:42:31.814205 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:31.814302 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 39 D0318 14:42:31.814491 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:31.817330 182129 task_exit.go:204] [ 39030( 646): 39030( 646)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.817443 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.818850 182129 task_exit.go:204] [ 39030( 646): 39030( 646)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.823912 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:31.823996 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 40 D0318 14:42:31.824098 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:31.826413 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:31.826484 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 41 D0318 14:42:31.826559 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:31.826887 182129 usertrap_amd64.go:212] [ 39039( 648): 39043( 649)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:31.826966 182129 usertrap_amd64.go:122] [ 39039( 648): 39043( 649)] Allocate a new trap: 0xc0004e02d0 42 D0318 14:42:31.827056 182129 usertrap_amd64.go:225] [ 39039( 648): 39043( 649)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:31.828227 182129 task_exit.go:204] [ 39033( 570): 39033( 570)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.830494 182129 usertrap_amd64.go:212] [ 39039( 648): 39039( 648)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:31.830556 182129 usertrap_amd64.go:122] [ 39039( 648): 39039( 648)] Allocate a new trap: 0xc0004e02d0 43 D0318 14:42:31.830628 182129 usertrap_amd64.go:225] [ 39039( 648): 39039( 648)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.837114 182129 task_exit.go:204] [ 39033( 570): 39033( 570)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.837267 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.837429 182129 task_signals.go:204] [ 39039( 648): 39043( 649)] Signal 9, PID: 39039, TID: 39043, fault addr: 0x0: terminating thread group D0318 14:42:31.839108 182129 task_exit.go:204] [ 39039( 648): 39039( 648)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.839352 182129 task_exit.go:204] [ 39039( 648): 39043( 649)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.840443 182129 task_exit.go:204] [ 39039( 648): 39039( 648)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.844051 182129 task_exit.go:204] [ 39033( 570): 39033( 570)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.845134 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.845231 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 36 D0318 14:42:31.846395 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.846882 182129 task_exit.go:204] [ 39039( 648): 39043( 649)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.846955 182129 task_exit.go:204] [ 39039( 648): 39043( 649)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.847043 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.847482 182129 task_exit.go:204] [ 39035( 647): 39035( 647)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.847586 182129 task_exit.go:204] [ 39039( 648): 39039( 648)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) D0318 14:42:31.850124 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.850226 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 36 D0318 14:42:31.851131 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.851188 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 37 D0318 14:42:31.851250 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:31.851370 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.854955 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:31.855044 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 37 D0318 14:42:31.855285 182129 task_exit.go:204] [ 39035( 647): 39035( 647)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.855362 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.856053 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:31.856134 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.856211 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 37 D0318 14:42:31.856296 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.860705 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:31.860785 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 38 D0318 14:42:31.860879 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:31.869018 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:31.869111 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 38 D0318 14:42:31.869221 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:31.874083 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:31.874180 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 38 D0318 14:42:31.874314 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:31.877154 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:31.877330 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 39 D0318 14:42:31.877504 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:31.877923 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:31.877982 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 39 D0318 14:42:31.878268 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:31.879443 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:31.879576 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 40 D0318 14:42:31.879818 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:31.880340 182129 usertrap_amd64.go:212] [ 39044( 616): 39048( 617)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:31.880417 182129 task_exit.go:204] [ 39035( 647): 39035( 647)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.880523 182129 usertrap_amd64.go:122] [ 39044( 616): 39048( 617)] Allocate a new trap: 0xc0004e0390 41 D0318 14:42:31.880793 182129 usertrap_amd64.go:225] [ 39044( 616): 39048( 617)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:31.885756 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:31.885892 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 39 D0318 14:42:31.886065 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:31.887919 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:31.888007 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 40 D0318 14:42:31.888082 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:31.889269 182129 usertrap_amd64.go:212] [ 39045( 573): 39049( 574)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:31.889339 182129 usertrap_amd64.go:122] [ 39045( 573): 39049( 574)] Allocate a new trap: 0xc0004e03c0 41 D0318 14:42:31.889446 182129 usertrap_amd64.go:225] [ 39045( 573): 39049( 574)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:31.891820 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:31.892017 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 37 D0318 14:42:31.892025 182129 usertrap_amd64.go:212] [ 39044( 616): 39044( 616)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:31.892186 182129 usertrap_amd64.go:122] [ 39044( 616): 39044( 616)] Allocate a new trap: 0xc0004e0390 42 D0318 14:42:31.892311 182129 usertrap_amd64.go:225] [ 39044( 616): 39044( 616)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:31.895788 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:31.896445 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:31.896575 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 40 D0318 14:42:31.896647 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:31.898775 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:31.898861 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 41 D0318 14:42:31.898951 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:31.899169 182129 usertrap_amd64.go:212] [ 39046(1376): 39050(1377)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:31.899254 182129 usertrap_amd64.go:122] [ 39046(1376): 39050(1377)] Allocate a new trap: 0xc0006801b0 42 D0318 14:42:31.899350 182129 usertrap_amd64.go:225] [ 39046(1376): 39050(1377)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:31.902232 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:31.902385 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 38 D0318 14:42:31.903378 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:31.907844 182129 usertrap_amd64.go:212] [ 39045( 573): 39045( 573)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:31.908010 182129 usertrap_amd64.go:122] [ 39045( 573): 39045( 573)] Allocate a new trap: 0xc0004e03c0 42 D0318 14:42:31.908112 182129 usertrap_amd64.go:225] [ 39045( 573): 39045( 573)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:31.908873 182129 task_exit.go:204] [ 39044( 616): 39044( 616)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.910010 182129 task_signals.go:204] [ 39044( 616): 39048( 617)] Signal 9, PID: 39044, TID: 39048, fault addr: 0x0: terminating thread group D0318 14:42:31.910147 182129 task_exit.go:204] [ 39044( 616): 39048( 617)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.910442 182129 task_exit.go:204] [ 39044( 616): 39044( 616)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.916275 182129 task_exit.go:204] [ 39045( 573): 39045( 573)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.916597 182129 task_signals.go:204] [ 39045( 573): 39049( 574)] Signal 9, PID: 39045, TID: 39049, fault addr: 0x0: terminating thread group D0318 14:42:31.917592 182129 task_exit.go:204] [ 39045( 573): 39045( 573)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.917886 182129 task_exit.go:204] [ 39045( 573): 39049( 574)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.921016 182129 task_exit.go:204] [ 39044( 616): 39048( 617)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.921111 182129 task_exit.go:204] [ 39044( 616): 39048( 617)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.921272 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:31.921531 182129 task_run.go:306] [ 39051(1378): 39051(1378)] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0318 14:42:31.921669 182129 task_log.go:87] [ 39051(1378): 39051(1378)] Registers: D0318 14:42:31.921733 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Cs = 0000000000000033 D0318 14:42:31.921774 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Ds = 0000000000000000 D0318 14:42:31.921805 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Eflags = 0000000000010217 D0318 14:42:31.921878 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Es = 0000000000000000 D0318 14:42:31.921907 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Fs = 0000000000000000 D0318 14:42:31.921964 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Fs_base = 00007eae37c8a6c0 D0318 14:42:31.921989 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Gs = 0000000000000000 D0318 14:42:31.922014 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Gs_base = 0000000000000000 D0318 14:42:31.922107 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Orig_rax = ffffffffffffffff D0318 14:42:31.922156 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R10 = 0000000000000000 D0318 14:42:31.922218 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R11 = 0000000000000246 D0318 14:42:31.922267 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R12 = 0000000000000000 D0318 14:42:31.922295 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R13 = 000000000000000b D0318 14:42:31.922371 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R14 = 000055d58650ff80 D0318 14:42:31.922404 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R15 = 00007ebf8583e228 D0318 14:42:31.922463 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R8 = 0000000000000000 D0318 14:42:31.922510 182129 task_log.go:94] [ 39051(1378): 39051(1378)] R9 = 0000000000000000 D0318 14:42:31.922543 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rax = 0000000000000000 D0318 14:42:31.922601 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rbp = 000055d58642e47a D0318 14:42:31.922671 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rbx = 000055d58650ff80 D0318 14:42:31.922710 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rcx = 000055d5863e1da9 D0318 14:42:31.922800 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rdi = 0000000000000000 D0318 14:42:31.922830 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rdx = 0000000000000000 D0318 14:42:31.922887 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rip = 0000000000000000 D0318 14:42:31.922927 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rsi = 0000000020000cc0 D0318 14:42:31.922969 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Rsp = 0000000020000cc8 D0318 14:42:31.922996 182129 task_log.go:94] [ 39051(1378): 39051(1378)] Ss = 000000000000002b D0318 14:42:31.923035 182129 task_log.go:111] [ 39051(1378): 39051(1378)] Stack: D0318 14:42:31.923193 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923262 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923291 182129 task_exit.go:204] [ 39044( 616): 39044( 616)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.923311 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923366 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923444 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923494 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923704 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923763 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923743 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:31.923823 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923833 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 39 D0318 14:42:31.923924 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923968 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924008 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.923997 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:31.924054 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924102 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924136 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924172 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924203 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924234 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924266 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924332 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924435 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924522 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924566 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924648 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924727 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924815 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924870 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.924961 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925023 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925058 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925107 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925150 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925190 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925229 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925283 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925324 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925376 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925424 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925456 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925520 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925555 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925591 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925628 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925693 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925737 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925786 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925819 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925848 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925885 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925923 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.925967 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926036 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20000ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926116 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926147 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926175 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926222 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926266 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926305 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926341 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926383 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926426 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926477 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 20001090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926540 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 200010a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926590 182129 task_log.go:128] [ 39051(1378): 39051(1378)] 200010b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 14:42:31.926628 182129 task_log.go:149] [ 39051(1378): 39051(1378)] Code: D0318 14:42:31.926673 182129 task_log.go:170] [ 39051(1378): 39051(1378)] Error reading stack at address ffffffffffffffc0: bad address D0318 14:42:31.927183 182129 task_exit.go:204] [ 39045( 573): 39049( 574)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.927252 182129 task_exit.go:204] [ 39045( 573): 39049( 574)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.927381 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:31.927553 182129 task_exit.go:204] [ 39045( 573): 39045( 573)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.926696 182129 task_log.go:71] [ 39051(1378): 39051(1378)] Mappings: VMAs: 00067000-0006c000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b31c20000-1b31c60000 rw-s 00000000 00:05 5 /memfd:syz-shared-mem (deleted) 55d586364000-55d586389000 r--p 00000000 00:11 8 /syz-executor 55d586389000-55d58642d000 r-xp 00025000 00:11 8 /syz-executor 55d58642d000-55d5864dd000 r--p 000c9000 00:11 8 /syz-executor 55d5864dd000-55d5864e6000 rw-p 00179000 00:11 8 /syz-executor 55d5864f4000-55d587040000 rw-p 00000000 00:00 0 55d587040000-55d587062000 rw-p 00000000 00:00 0 [heap] 7eae37800000-7eae37c00000 r--p 00000000 00:05 4 /memfd:syz-shared-mem (deleted) 7eae37c6a000-7eae37c6b000 ---p 00000000 00:00 0 7eae37c6b000-7eae37c8b000 rw-p 00000000 00:00 0 7eae37c8b000-7eae37c8c000 r--p 00000000 00:00 0 [vvar] 7eae37c8c000-7eae37c8e000 r-xp 00000000 00:00 0 7ebf8503f000-7ebf8583f000 rw-p 00000000 00:00 0 [stack] PMAs: 00067000-00068000 r-xp 0b527000 *pgalloc.MemoryFile 00068000-0006c000 r-xp 0b762000 *pgalloc.MemoryFile 20000000-20200000 r-xp 19a00000 *pgalloc.MemoryFile 55d586364000-55d586389000 r--p 0d733000 *pgalloc.MemoryFile 55d5863a5000-55d5863a6000 r-xp 0b615000 *pgalloc.MemoryFile 55d5863b6000-55d5863b7000 r-xp 0b855000 *pgalloc.MemoryFile 55d5863de000-55d5863df000 r-xp 0b84a000 *pgalloc.MemoryFile 55d5863df000-55d5863e0000 r-xp 0b778000 *pgalloc.MemoryFile 55d5863e0000-55d5863e1000 r-xp 0b838000 *pgalloc.MemoryFile 55d5863e1000-55d5863e2000 r-xp 0b847000 *pgalloc.MemoryFile 55d5863e3000-55d5863e4000 r-xp 0b761000 *pgalloc.MemoryFile 55d5863eb000-55d5863ec000 r-xp 0b63c000 *pgalloc.MemoryFile 55d5863fb000-55d5863fc000 r-xp 03dff000 *pgalloc.MemoryFile 55d58640d000-55d58640e000 r-xp 0b804000 *pgalloc.MemoryFile 55d58642c000-55d58642d000 r-xp 0b614000 *pgalloc.MemoryFile 55d58642d000-55d586481000 r--p 0d84e000 *pgalloc.MemoryFile 55d586481000-55d5864e6000 r--p 10f18000 *pgalloc.MemoryFile 55d5864f4000-55d586600000 r--p 17cbe000 *pgalloc.MemoryFile 55d587000000-55d587040000 r--p 0e200000 *pgalloc.MemoryFile 55d587040000-55d587041000 r--p 0b5b6000 *pgalloc.MemoryFile 55d587041000-55d587062000 r--p 0e981000 *pgalloc.MemoryFile 7eae37c6b000-7eae37c8b000 r--p 0e10b000 *pgalloc.MemoryFile 7ebf85800000-7ebf8583b000 r--p 0dc4a000 *pgalloc.MemoryFile 7ebf8583b000-7ebf8583d000 r--p 0b859000 *pgalloc.MemoryFile 7ebf8583d000-7ebf8583f000 r--p 0d7fe000 *pgalloc.MemoryFile D0318 14:42:31.928277 182129 task_log.go:73] [ 39051(1378): 39051(1378)] FDTable: fd:0 => name pipe:[1657] fd:1 => name pipe:[1657] fd:2 => name pipe:[1657] fd:200 => name /dev/net/tun fd:201 => name / D0318 14:42:31.928672 182129 task_signals.go:470] [ 39051(1378): 39051(1378)] Notified of signal 11 D0318 14:42:31.928771 182129 task_signals.go:220] [ 39051(1378): 39051(1378)] Signal 11: delivering to handler D0318 14:42:31.931196 182129 task_exit.go:204] [ 39051(1378): 39051(1378)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) D0318 14:42:31.934812 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:31.934872 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 40 D0318 14:42:31.934944 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) 14:42:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xfc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() r5 = perf_event_open$cgroup(0x0, r3, 0x10, r1, 0xe) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xd5, 0x1, 0x20, 0x5, 0x0, 0x7, 0x40020, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x88, 0x6, 0x0, 0x4, 0x108, 0xede6f1c, 0x100, 0x0, 0xa23e}, r4, 0x0, r5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) D0318 14:42:31.938749 182129 task_exit.go:204] [ 39051(1378): 39051(1378)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.938773 182129 usertrap_amd64.go:212] [ 39047( 650): 39052( 651)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:31.939120 182129 usertrap_amd64.go:122] [ 39047( 650): 39052( 651)] Allocate a new trap: 0xc0004e0480 41 D0318 14:42:31.939237 182129 usertrap_amd64.go:225] [ 39047( 650): 39052( 651)] Apply the binary patch addr 55ff4044c320 trap addr 68cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:31.939465 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:31.939527 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 42 D0318 14:42:31.939663 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff4044cc10 trap addr 68d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:31.939931 182129 usertrap_amd64.go:212] [ 39046(1376): 39046(1376)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:31.940082 182129 usertrap_amd64.go:122] [ 39046(1376): 39046(1376)] Allocate a new trap: 0xc0006801b0 43 D0318 14:42:31.940544 182129 usertrap_amd64.go:225] [ 39046(1376): 39046(1376)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:31.942106 182129 usertrap_amd64.go:212] [ 39047( 650): 39047( 650)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:31.942178 182129 usertrap_amd64.go:122] [ 39047( 650): 39047( 650)] Allocate a new trap: 0xc0004e0480 43 D0318 14:42:31.942328 182129 usertrap_amd64.go:225] [ 39047( 650): 39047( 650)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:31.947174 182129 task_exit.go:204] [ 39046(1376): 39046(1376)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.948225 182129 task_signals.go:204] [ 39047( 650): 39052( 651)] Signal 9, PID: 39047, TID: 39052, fault addr: 0x0: terminating thread group D0318 14:42:31.948215 182129 task_signals.go:204] [ 39046(1376): 39050(1377)] Signal 9, PID: 39046, TID: 39050, fault addr: 0x0: terminating thread group D0318 14:42:31.948334 182129 task_exit.go:204] [ 39046(1376): 39046(1376)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.948603 182129 task_exit.go:204] [ 39047( 650): 39047( 650)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.949535 182129 task_exit.go:204] [ 39047( 650): 39047( 650)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.949803 182129 task_exit.go:204] [ 39047( 650): 39052( 651)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.950135 182129 task_exit.go:204] [ 39046(1376): 39050(1377)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:31.959659 182129 task_exit.go:204] [ 39047( 650): 39052( 651)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.959796 182129 task_exit.go:204] [ 39047( 650): 39052( 651)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.959927 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:31.960291 182129 task_exit.go:204] [ 39047( 650): 39047( 650)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002cc0)) D0318 14:42:31.964550 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.964690 182129 task_exit.go:204] [ 39046(1376): 39050(1377)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:31.964766 182129 task_exit.go:204] [ 39046(1376): 39050(1377)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.964903 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:31.968425 182129 task_exit.go:204] [ 39051(1378): 39051(1378)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:31.970140 182129 task_exit.go:204] [ 39046(1376): 39046(1376)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xe2480, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x2000}) close(r0) D0318 14:42:31.978255 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:31.978421 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 36 D0318 14:42:31.979738 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:31.984575 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:31.984663 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 37 D0318 14:42:31.984741 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:31.988196 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:31.988502 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 36 D0318 14:42:31.989794 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:31.996454 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:31.996605 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 37 D0318 14:42:31.996691 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.004458 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.004655 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 38 D0318 14:42:32.004882 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.005253 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.005470 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 37 D0318 14:42:32.007713 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.014068 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.014171 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 38 D0318 14:42:32.014277 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.017914 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.017989 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.018075 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 39 D0318 14:42:32.018129 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 37 D0318 14:42:32.018181 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.019204 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.020878 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.020982 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 40 D0318 14:42:32.020892 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.021096 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.021193 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 38 D0318 14:42:32.021316 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.021313 182129 usertrap_amd64.go:212] [ 39054( 575): 39057( 576)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.021538 182129 usertrap_amd64.go:122] [ 39054( 575): 39057( 576)] Allocate a new trap: 0xc004db0180 41 D0318 14:42:32.021650 182129 usertrap_amd64.go:225] [ 39054( 575): 39057( 576)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.026436 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.026644 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 38 D0318 14:42:32.026783 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.041708 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.041830 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 39 D0318 14:42:32.042060 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.044357 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.044452 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 40 D0318 14:42:32.044809 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.045045 182129 usertrap_amd64.go:212] [ 39053( 618): 39058( 619)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.045153 182129 usertrap_amd64.go:122] [ 39053( 618): 39058( 619)] Allocate a new trap: 0xc005f000c0 41 D0318 14:42:32.045262 182129 usertrap_amd64.go:225] [ 39053( 618): 39058( 619)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:32.047671 182129 usertrap_amd64.go:212] [ 39054( 575): 39054( 575)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.047852 182129 usertrap_amd64.go:122] [ 39054( 575): 39054( 575)] Allocate a new trap: 0xc004db0180 42 D0318 14:42:32.048037 182129 usertrap_amd64.go:225] [ 39054( 575): 39054( 575)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.049805 182129 usertrap_amd64.go:212] [ 39053( 618): 39053( 618)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.049951 182129 usertrap_amd64.go:122] [ 39053( 618): 39053( 618)] Allocate a new trap: 0xc005f000c0 42 D0318 14:42:32.050104 182129 usertrap_amd64.go:225] [ 39053( 618): 39053( 618)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.054153 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.054343 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 39 D0318 14:42:32.054466 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.059030 182129 task_exit.go:204] [ 39054( 575): 39054( 575)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.060507 182129 task_signals.go:204] [ 39054( 575): 39057( 576)] Signal 9, PID: 39054, TID: 39057, fault addr: 0x0: terminating thread group D0318 14:42:32.060525 182129 task_exit.go:204] [ 39054( 575): 39054( 575)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.060859 182129 task_exit.go:204] [ 39054( 575): 39057( 576)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.062242 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.062333 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 39 D0318 14:42:32.062454 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.064074 182129 task_exit.go:204] [ 39053( 618): 39053( 618)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.065206 182129 task_signals.go:204] [ 39053( 618): 39058( 619)] Signal 9, PID: 39053, TID: 39058, fault addr: 0x0: terminating thread group D0318 14:42:32.065395 182129 task_exit.go:204] [ 39053( 618): 39053( 618)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.065557 182129 task_exit.go:204] [ 39053( 618): 39058( 619)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.066285 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.066354 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 40 D0318 14:42:32.066501 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.068939 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.069108 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 41 D0318 14:42:32.069223 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.070162 182129 usertrap_amd64.go:212] [ 39055( 652): 39059( 653)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.070249 182129 usertrap_amd64.go:122] [ 39055( 652): 39059( 653)] Allocate a new trap: 0xc000880360 42 D0318 14:42:32.070335 182129 usertrap_amd64.go:225] [ 39055( 652): 39059( 653)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.070948 182129 task_exit.go:204] [ 39054( 575): 39057( 576)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.071037 182129 task_exit.go:204] [ 39054( 575): 39057( 576)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.071370 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.071795 182129 task_exit.go:204] [ 39054( 575): 39054( 575)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(r1) D0318 14:42:32.074272 182129 usertrap_amd64.go:212] [ 39055( 652): 39055( 652)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.074442 182129 usertrap_amd64.go:122] [ 39055( 652): 39055( 652)] Allocate a new trap: 0xc000880360 43 D0318 14:42:32.074642 182129 usertrap_amd64.go:225] [ 39055( 652): 39055( 652)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.074825 182129 task_exit.go:204] [ 39053( 618): 39058( 619)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.074966 182129 task_exit.go:204] [ 39053( 618): 39058( 619)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.075200 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.075723 182129 task_exit.go:204] [ 39053( 618): 39053( 618)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.076087 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.076195 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 40 D0318 14:42:32.076411 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) 14:42:32 executing program 2: socketpair(0x29, 0x2, 0x847f, &(0x7f00000004c0)) D0318 14:42:32.080875 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.080958 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 41 D0318 14:42:32.081407 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.081659 182129 usertrap_amd64.go:212] [ 39056(1379): 39060(1380)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.081783 182129 usertrap_amd64.go:122] [ 39056(1379): 39060(1380)] Allocate a new trap: 0xc0007061b0 42 D0318 14:42:32.082001 182129 usertrap_amd64.go:225] [ 39056(1379): 39060(1380)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:32.087917 182129 task_exit.go:204] [ 39055( 652): 39055( 652)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.088487 182129 usertrap_amd64.go:212] [ 39056(1379): 39056(1379)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.088741 182129 usertrap_amd64.go:122] [ 39056(1379): 39056(1379)] Allocate a new trap: 0xc0007061b0 43 D0318 14:42:32.088895 182129 task_signals.go:204] [ 39055( 652): 39059( 653)] Signal 9, PID: 39055, TID: 39059, fault addr: 0x0: terminating thread group D0318 14:42:32.089033 182129 task_exit.go:204] [ 39055( 652): 39055( 652)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.088945 182129 usertrap_amd64.go:225] [ 39056(1379): 39056(1379)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:32.089259 182129 task_exit.go:204] [ 39055( 652): 39059( 653)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.095324 182129 task_exit.go:204] [ 39056(1379): 39056(1379)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.096413 182129 task_signals.go:204] [ 39056(1379): 39060(1380)] Signal 9, PID: 39056, TID: 39060, fault addr: 0x0: terminating thread group D0318 14:42:32.096456 182129 task_exit.go:204] [ 39056(1379): 39056(1379)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.097908 182129 task_exit.go:204] [ 39056(1379): 39060(1380)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.100324 182129 task_exit.go:204] [ 39055( 652): 39059( 653)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.100554 182129 task_exit.go:204] [ 39055( 652): 39059( 653)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.100722 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.101252 182129 task_exit.go:204] [ 39055( 652): 39055( 652)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 3: r0 = openat$null(0xffffff9c, &(0x7f0000000040), 0xa0001, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) D0318 14:42:32.113232 182129 task_exit.go:204] [ 39056(1379): 39060(1380)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.113341 182129 task_exit.go:204] [ 39056(1379): 39060(1380)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.113462 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.114207 182129 task_exit.go:204] [ 39056(1379): 39056(1379)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 1: socketpair(0x1, 0x0, 0x4, &(0x7f0000000100)) D0318 14:42:32.131753 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.131873 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 36 D0318 14:42:32.132930 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.140547 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.140676 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 36 D0318 14:42:32.141155 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.141255 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 37 D0318 14:42:32.141378 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.141747 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.147304 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.147545 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 37 D0318 14:42:32.148906 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.152757 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.152947 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 37 D0318 14:42:32.153069 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.155597 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.155695 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 38 D0318 14:42:32.155764 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.157465 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.157548 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 38 D0318 14:42:32.157766 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.169376 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.169462 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 39 D0318 14:42:32.169589 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.170564 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.170716 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 37 D0318 14:42:32.171558 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.171649 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 40 D0318 14:42:32.171720 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.172354 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.174073 182129 usertrap_amd64.go:212] [ 39061( 620): 39065( 621)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.174147 182129 usertrap_amd64.go:122] [ 39061( 620): 39065( 621)] Allocate a new trap: 0xc0006801e0 41 D0318 14:42:32.174247 182129 usertrap_amd64.go:225] [ 39061( 620): 39065( 621)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:32.177443 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.177545 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 38 D0318 14:42:32.177793 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.182698 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.182782 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 38 D0318 14:42:32.182891 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.185112 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.185255 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 39 D0318 14:42:32.185433 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.189035 182129 usertrap_amd64.go:212] [ 39061( 620): 39061( 620)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.189124 182129 usertrap_amd64.go:122] [ 39061( 620): 39061( 620)] Allocate a new trap: 0xc0006801e0 42 D0318 14:42:32.189239 182129 usertrap_amd64.go:225] [ 39061( 620): 39061( 620)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.197953 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.198044 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 39 D0318 14:42:32.198031 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.198141 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 40 D0318 14:42:32.198157 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.198246 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.201944 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.202360 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 41 D0318 14:42:32.202474 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.202600 182129 task_exit.go:204] [ 39061( 620): 39061( 620)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.202675 182129 usertrap_amd64.go:212] [ 39063( 654): 39066( 655)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.202875 182129 usertrap_amd64.go:122] [ 39063( 654): 39066( 655)] Allocate a new trap: 0xc00063e1b0 42 D0318 14:42:32.203191 182129 usertrap_amd64.go:225] [ 39063( 654): 39066( 655)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.203815 182129 task_signals.go:204] [ 39061( 620): 39065( 621)] Signal 9, PID: 39061, TID: 39065, fault addr: 0x0: terminating thread group D0318 14:42:32.203895 182129 task_exit.go:204] [ 39061( 620): 39061( 620)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.204039 182129 task_exit.go:204] [ 39061( 620): 39065( 621)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.204635 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.204725 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 39 D0318 14:42:32.204945 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.206480 182129 usertrap_amd64.go:212] [ 39063( 654): 39063( 654)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.206581 182129 usertrap_amd64.go:122] [ 39063( 654): 39063( 654)] Allocate a new trap: 0xc00063e1b0 43 D0318 14:42:32.206648 182129 usertrap_amd64.go:225] [ 39063( 654): 39063( 654)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.207762 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.207911 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 40 D0318 14:42:32.208107 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.210001 182129 usertrap_amd64.go:212] [ 39062( 577): 39067( 578)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.210101 182129 usertrap_amd64.go:122] [ 39062( 577): 39067( 578)] Allocate a new trap: 0xc004db01e0 41 D0318 14:42:32.210198 182129 usertrap_amd64.go:225] [ 39062( 577): 39067( 578)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.213841 182129 task_exit.go:204] [ 39061( 620): 39065( 621)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.213969 182129 task_exit.go:204] [ 39061( 620): 39065( 621)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.214108 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.215012 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.215101 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 40 D0318 14:42:32.215195 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:32.216607 182129 task_exit.go:204] [ 39063( 654): 39063( 654)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.217067 182129 task_signals.go:204] [ 39063( 654): 39066( 655)] Signal 9, PID: 39063, TID: 39066, fault addr: 0x0: terminating thread group D0318 14:42:32.218762 182129 task_exit.go:204] [ 39063( 654): 39066( 655)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.219092 182129 task_exit.go:204] [ 39061( 620): 39061( 620)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.219580 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.219707 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 41 D0318 14:42:32.219788 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.219942 182129 usertrap_amd64.go:212] [ 39064(1381): 39068(1382)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.219983 182129 usertrap_amd64.go:122] [ 39064(1381): 39068(1382)] Allocate a new trap: 0xc0008804b0 42 D0318 14:42:32.220264 182129 task_exit.go:204] [ 39063( 654): 39063( 654)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.220821 182129 usertrap_amd64.go:225] [ 39064(1381): 39068(1382)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) 14:42:32 executing program 2: clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) D0318 14:42:32.224301 182129 usertrap_amd64.go:212] [ 39064(1381): 39064(1381)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.224643 182129 usertrap_amd64.go:122] [ 39064(1381): 39064(1381)] Allocate a new trap: 0xc0008804b0 43 D0318 14:42:32.224788 182129 usertrap_amd64.go:225] [ 39064(1381): 39064(1381)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:32.225857 182129 usertrap_amd64.go:212] [ 39062( 577): 39062( 577)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.226007 182129 usertrap_amd64.go:122] [ 39062( 577): 39062( 577)] Allocate a new trap: 0xc004db01e0 42 D0318 14:42:32.226113 182129 usertrap_amd64.go:225] [ 39062( 577): 39062( 577)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.231051 182129 task_exit.go:204] [ 39063( 654): 39066( 655)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.231157 182129 task_exit.go:204] [ 39063( 654): 39066( 655)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.231415 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.232335 182129 task_exit.go:204] [ 39063( 654): 39063( 654)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.232902 182129 task_exit.go:204] [ 39064(1381): 39064(1381)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.233325 182129 task_signals.go:204] [ 39064(1381): 39068(1382)] Signal 9, PID: 39064, TID: 39068, fault addr: 0x0: terminating thread group 14:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x17, 0x0, &(0x7f0000000340)) D0318 14:42:32.234177 182129 task_exit.go:204] [ 39064(1381): 39064(1381)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.234370 182129 task_exit.go:204] [ 39064(1381): 39068(1382)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.243466 182129 task_exit.go:204] [ 39064(1381): 39068(1382)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.243590 182129 task_exit.go:204] [ 39064(1381): 39068(1382)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.244482 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.245954 182129 task_exit.go:204] [ 39064(1381): 39064(1381)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.246387 182129 task_exit.go:204] [ 39062( 577): 39062( 577)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.247225 182129 task_signals.go:204] [ 39062( 577): 39067( 578)] Signal 9, PID: 39062, TID: 39067, fault addr: 0x0: terminating thread group 14:42:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x19, 0x0, &(0x7f0000000340)) D0318 14:42:32.247403 182129 task_exit.go:204] [ 39062( 577): 39067( 578)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.247564 182129 task_exit.go:204] [ 39062( 577): 39062( 577)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.264156 182129 task_exit.go:204] [ 39062( 577): 39067( 578)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.264271 182129 task_exit.go:204] [ 39062( 577): 39067( 578)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.264426 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.266836 182129 task_exit.go:204] [ 39062( 577): 39062( 577)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0xc, 0x0, &(0x7f0000000340)) D0318 14:42:32.286528 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.286676 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 36 D0318 14:42:32.287877 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.292329 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.292482 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 37 D0318 14:42:32.292564 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.299274 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.299523 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 37 D0318 14:42:32.300633 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.304745 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.304872 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 38 D0318 14:42:32.304987 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.309531 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.309661 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 37 D0318 14:42:32.309771 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.309897 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 36 D0318 14:42:32.310859 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.311047 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.314985 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.315123 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 37 D0318 14:42:32.315377 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.316997 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.317117 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 38 D0318 14:42:32.317237 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.318413 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.318500 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 38 D0318 14:42:32.318828 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.329548 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.329691 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.329774 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 39 D0318 14:42:32.329750 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 39 D0318 14:42:32.329878 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.329909 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.331893 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.332064 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 40 D0318 14:42:32.332142 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.332391 182129 usertrap_amd64.go:212] [ 39070( 622): 39073( 623)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.332451 182129 usertrap_amd64.go:122] [ 39070( 622): 39073( 623)] Allocate a new trap: 0xc000680210 41 D0318 14:42:32.332553 182129 usertrap_amd64.go:225] [ 39070( 622): 39073( 623)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:32.335457 182129 usertrap_amd64.go:212] [ 39070( 622): 39070( 622)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.335643 182129 usertrap_amd64.go:122] [ 39070( 622): 39070( 622)] Allocate a new trap: 0xc000680210 42 D0318 14:42:32.335760 182129 usertrap_amd64.go:225] [ 39070( 622): 39070( 622)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.337686 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.337766 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 38 D0318 14:42:32.337863 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.340258 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.340311 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 40 D0318 14:42:32.340381 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.342042 182129 task_signals.go:204] [ 39070( 622): 39073( 623)] Signal 9, PID: 39070, TID: 39073, fault addr: 0x0: terminating thread group D0318 14:42:32.342174 182129 task_exit.go:204] [ 39070( 622): 39073( 623)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.342194 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.342240 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 41 D0318 14:42:32.342318 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.342716 182129 usertrap_amd64.go:212] [ 39069( 656): 39074( 657)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.342783 182129 usertrap_amd64.go:122] [ 39069( 656): 39074( 657)] Allocate a new trap: 0xc00e84f7d0 42 D0318 14:42:32.342847 182129 usertrap_amd64.go:225] [ 39069( 656): 39074( 657)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.343023 182129 task_exit.go:204] [ 39070( 622): 39070( 622)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.343327 182129 task_exit.go:204] [ 39070( 622): 39073( 623)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.343467 182129 task_exit.go:204] [ 39070( 622): 39073( 623)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.346925 182129 usertrap_amd64.go:212] [ 39069( 656): 39069( 656)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.347178 182129 usertrap_amd64.go:122] [ 39069( 656): 39069( 656)] Allocate a new trap: 0xc00e84f7d0 43 D0318 14:42:32.347407 182129 usertrap_amd64.go:225] [ 39069( 656): 39069( 656)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.348001 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.348146 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 39 D0318 14:42:32.348275 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.351047 182129 task_exit.go:204] [ 39070( 622): 39070( 622)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.351154 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.351663 182129 task_exit.go:204] [ 39070( 622): 39070( 622)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.353984 182129 task_exit.go:204] [ 39069( 656): 39069( 656)] Transitioning from exit state TaskExitNone to TaskExitInitiated 14:42:32 executing program 2: request_key(&(0x7f0000000000)='.dead\x00', 0x0, 0x0, 0x0) D0318 14:42:32.354681 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.354740 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 39 D0318 14:42:32.354855 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.354914 182129 task_signals.go:204] [ 39069( 656): 39074( 657)] Signal 9, PID: 39069, TID: 39074, fault addr: 0x0: terminating thread group D0318 14:42:32.354994 182129 task_exit.go:204] [ 39069( 656): 39069( 656)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.355100 182129 task_exit.go:204] [ 39069( 656): 39074( 657)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.356754 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.356818 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 40 D0318 14:42:32.356959 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.358364 182129 usertrap_amd64.go:212] [ 39072( 579): 39075( 580)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.358427 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.358451 182129 usertrap_amd64.go:122] [ 39072( 579): 39075( 580)] Allocate a new trap: 0xc0004e0630 41 D0318 14:42:32.358483 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 40 D0318 14:42:32.358547 182129 usertrap_amd64.go:225] [ 39072( 579): 39075( 580)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.358646 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:32.362083 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.362150 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 41 D0318 14:42:32.362237 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.362743 182129 usertrap_amd64.go:212] [ 39072( 579): 39072( 579)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.362806 182129 usertrap_amd64.go:122] [ 39072( 579): 39072( 579)] Allocate a new trap: 0xc0004e0630 42 D0318 14:42:32.362872 182129 usertrap_amd64.go:225] [ 39072( 579): 39072( 579)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.363176 182129 usertrap_amd64.go:212] [ 39071(1383): 39076(1384)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.363288 182129 usertrap_amd64.go:122] [ 39071(1383): 39076(1384)] Allocate a new trap: 0xc000e68120 42 D0318 14:42:32.363386 182129 usertrap_amd64.go:225] [ 39071(1383): 39076(1384)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:32.366713 182129 task_exit.go:204] [ 39069( 656): 39074( 657)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.366827 182129 task_exit.go:204] [ 39069( 656): 39074( 657)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.366975 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.367087 182129 task_exit.go:204] [ 39069( 656): 39069( 656)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.367760 182129 usertrap_amd64.go:212] [ 39071(1383): 39071(1383)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.367837 182129 usertrap_amd64.go:122] [ 39071(1383): 39071(1383)] Allocate a new trap: 0xc000e68120 43 D0318 14:42:32.367951 182129 usertrap_amd64.go:225] [ 39071(1383): 39071(1383)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) 14:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x24, 0x0, &(0x7f0000000340)) D0318 14:42:32.376151 182129 task_exit.go:204] [ 39072( 579): 39072( 579)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.377048 182129 task_signals.go:204] [ 39072( 579): 39075( 580)] Signal 9, PID: 39072, TID: 39075, fault addr: 0x0: terminating thread group D0318 14:42:32.377188 182129 task_exit.go:204] [ 39072( 579): 39072( 579)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.377399 182129 task_exit.go:204] [ 39071(1383): 39071(1383)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.377605 182129 task_exit.go:204] [ 39072( 579): 39075( 580)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.377737 182129 task_signals.go:204] [ 39071(1383): 39076(1384)] Signal 9, PID: 39071, TID: 39076, fault addr: 0x0: terminating thread group D0318 14:42:32.377858 182129 task_exit.go:204] [ 39071(1383): 39076(1384)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.378701 182129 task_exit.go:204] [ 39071(1383): 39076(1384)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.378763 182129 task_exit.go:204] [ 39071(1383): 39076(1384)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.389608 182129 task_exit.go:204] [ 39071(1383): 39071(1383)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.389765 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.390172 182129 task_exit.go:204] [ 39072( 579): 39075( 580)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.390461 182129 task_exit.go:204] [ 39072( 579): 39075( 580)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.390643 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.390798 182129 task_exit.go:204] [ 39072( 579): 39072( 579)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.391483 182129 task_exit.go:204] [ 39071(1383): 39071(1383)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0x0) 14:42:32 executing program 1: request_key(&(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffb) D0318 14:42:32.403969 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.404151 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 36 D0318 14:42:32.405623 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.411547 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.411656 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 37 D0318 14:42:32.411778 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.417132 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.417399 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 37 D0318 14:42:32.418496 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.425113 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.425214 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 38 D0318 14:42:32.425340 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.429217 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.429323 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 38 D0318 14:42:32.429456 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.436200 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.436301 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 37 D0318 14:42:32.437414 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.440041 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.440195 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 36 D0318 14:42:32.441143 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.441589 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.441665 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 38 D0318 14:42:32.441755 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.443202 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.443286 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 39 D0318 14:42:32.443415 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.446764 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.446867 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 37 D0318 14:42:32.447074 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.449405 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.449479 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 39 D0318 14:42:32.449596 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.452514 182129 usertrap_amd64.go:212] [ 39077( 624): 39081( 625)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.452734 182129 usertrap_amd64.go:122] [ 39077( 624): 39081( 625)] Allocate a new trap: 0xc000e68180 40 D0318 14:42:32.453010 182129 usertrap_amd64.go:225] [ 39077( 624): 39081( 625)] Apply the binary patch addr 556d17c1c320 trap addr 60c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.453377 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.453495 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 41 D0318 14:42:32.453668 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c1cc10 trap addr 60cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:32.454788 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.454976 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 40 D0318 14:42:32.455692 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.456356 182129 usertrap_amd64.go:212] [ 39077( 624): 39077( 624)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.456443 182129 usertrap_amd64.go:122] [ 39077( 624): 39077( 624)] Allocate a new trap: 0xc000e68180 42 D0318 14:42:32.456579 182129 usertrap_amd64.go:225] [ 39077( 624): 39077( 624)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.458647 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.458712 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 41 D0318 14:42:32.458822 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.459481 182129 usertrap_amd64.go:212] [ 39078( 658): 39082( 659)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.459571 182129 usertrap_amd64.go:122] [ 39078( 658): 39082( 659)] Allocate a new trap: 0xc0004281e0 42 D0318 14:42:32.459692 182129 usertrap_amd64.go:225] [ 39078( 658): 39082( 659)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.460661 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.460760 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 39 D0318 14:42:32.460847 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.463730 182129 usertrap_amd64.go:212] [ 39078( 658): 39078( 658)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.463813 182129 usertrap_amd64.go:122] [ 39078( 658): 39078( 658)] Allocate a new trap: 0xc0004281e0 43 D0318 14:42:32.463916 182129 usertrap_amd64.go:225] [ 39078( 658): 39078( 658)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.465112 182129 task_exit.go:204] [ 39077( 624): 39077( 624)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.466481 182129 task_signals.go:204] [ 39077( 624): 39081( 625)] Signal 9, PID: 39077, TID: 39081, fault addr: 0x0: terminating thread group D0318 14:42:32.466626 182129 task_exit.go:204] [ 39077( 624): 39081( 625)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.467019 182129 task_exit.go:204] [ 39077( 624): 39077( 624)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.474178 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.474290 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 38 D0318 14:42:32.474404 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.475416 182129 task_exit.go:204] [ 39077( 624): 39081( 625)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.475552 182129 task_exit.go:204] [ 39077( 624): 39081( 625)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.475751 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.475997 182129 task_exit.go:204] [ 39077( 624): 39077( 624)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x10, 0x0, &(0x7f0000000340)) D0318 14:42:32.477865 182129 task_exit.go:204] [ 39078( 658): 39078( 658)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.478188 182129 task_signals.go:204] [ 39078( 658): 39082( 659)] Signal 9, PID: 39078, TID: 39082, fault addr: 0x0: terminating thread group D0318 14:42:32.478988 182129 task_exit.go:204] [ 39078( 658): 39078( 658)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.479182 182129 task_exit.go:204] [ 39078( 658): 39082( 659)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.485022 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.485114 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 40 D0318 14:42:32.485218 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:32.485630 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.485722 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 39 D0318 14:42:32.485856 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.487193 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.487260 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 41 D0318 14:42:32.487335 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.488704 182129 usertrap_amd64.go:212] [ 39079(1385): 39083(1386)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.488822 182129 usertrap_amd64.go:122] [ 39079(1385): 39083(1386)] Allocate a new trap: 0xc0004e06c0 42 D0318 14:42:32.488925 182129 usertrap_amd64.go:225] [ 39079(1385): 39083(1386)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:32.489677 182129 task_exit.go:204] [ 39078( 658): 39082( 659)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.489800 182129 task_exit.go:204] [ 39078( 658): 39082( 659)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.490070 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.489710 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.490233 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 40 D0318 14:42:32.490351 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.490595 182129 usertrap_amd64.go:212] [ 39080( 581): 39084( 582)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.490676 182129 usertrap_amd64.go:122] [ 39080( 581): 39084( 582)] Allocate a new trap: 0xc005d961b0 41 D0318 14:42:32.490752 182129 usertrap_amd64.go:225] [ 39080( 581): 39084( 582)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.491869 182129 task_exit.go:204] [ 39078( 658): 39078( 658)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.492639 182129 usertrap_amd64.go:212] [ 39080( 581): 39080( 581)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.492696 182129 usertrap_amd64.go:122] [ 39080( 581): 39080( 581)] Allocate a new trap: 0xc005d961b0 42 D0318 14:42:32.492753 182129 usertrap_amd64.go:225] [ 39080( 581): 39080( 581)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.493119 182129 usertrap_amd64.go:212] [ 39079(1385): 39079(1385)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.493175 182129 usertrap_amd64.go:122] [ 39079(1385): 39079(1385)] Allocate a new trap: 0xc0004e06c0 43 D0318 14:42:32.493226 182129 usertrap_amd64.go:225] [ 39079(1385): 39079(1385)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) 14:42:32 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0x24000920) D0318 14:42:32.498170 182129 task_exit.go:204] [ 39079(1385): 39079(1385)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.498919 182129 task_signals.go:204] [ 39079(1385): 39083(1386)] Signal 9, PID: 39079, TID: 39083, fault addr: 0x0: terminating thread group D0318 14:42:32.499163 182129 task_exit.go:204] [ 39079(1385): 39079(1385)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.499336 182129 task_exit.go:204] [ 39079(1385): 39083(1386)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.500227 182129 task_exit.go:204] [ 39080( 581): 39080( 581)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.501035 182129 task_signals.go:204] [ 39080( 581): 39084( 582)] Signal 9, PID: 39080, TID: 39084, fault addr: 0x0: terminating thread group D0318 14:42:32.501240 182129 task_exit.go:204] [ 39080( 581): 39084( 582)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.501587 182129 task_exit.go:204] [ 39080( 581): 39080( 581)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.509955 182129 task_exit.go:204] [ 39079(1385): 39083(1386)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.510105 182129 task_exit.go:204] [ 39079(1385): 39083(1386)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.510271 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.510597 182129 task_exit.go:204] [ 39080( 581): 39084( 582)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.510741 182129 task_exit.go:204] [ 39080( 581): 39084( 582)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.510947 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.511322 182129 task_exit.go:204] [ 39080( 581): 39080( 581)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.511552 182129 task_exit.go:204] [ 39079(1385): 39079(1385)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x18, &(0x7f0000002440), 0x14) 14:42:32 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000040)={0x1, 0x0, [{0x0, 0x0, 0x6}]}) D0318 14:42:32.533707 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.534066 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 37 D0318 14:42:32.535179 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.535829 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.535949 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 36 D0318 14:42:32.536875 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.541377 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.541555 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 38 D0318 14:42:32.541708 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.541853 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 37 D0318 14:42:32.541744 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.541953 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.559484 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.559635 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 37 D0318 14:42:32.560677 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.561202 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.561300 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 38 D0318 14:42:32.561400 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.562369 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.562469 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 39 D0318 14:42:32.562564 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.564721 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.564843 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 38 D0318 14:42:32.564935 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.568139 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.568471 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 36 D0318 14:42:32.569756 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.573200 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.573276 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 39 D0318 14:42:32.573390 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.575400 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.575515 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 40 D0318 14:42:32.575648 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.575838 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.575891 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 40 D0318 14:42:32.575988 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.576651 182129 usertrap_amd64.go:212] [ 39085( 626): 39089( 627)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.576728 182129 usertrap_amd64.go:122] [ 39085( 626): 39089( 627)] Allocate a new trap: 0xc000e682a0 41 D0318 14:42:32.576817 182129 usertrap_amd64.go:225] [ 39085( 626): 39089( 627)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 14:42:32.578029 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.578097 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 41 D0318 14:42:32.578159 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.579386 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.579436 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 37 D0318 14:42:32.579664 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.579726 182129 usertrap_amd64.go:212] [ 39086( 660): 39090( 661)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.579828 182129 usertrap_amd64.go:122] [ 39086( 660): 39090( 661)] Allocate a new trap: 0xc005f00210 42 D0318 14:42:32.579947 182129 usertrap_amd64.go:225] [ 39086( 660): 39090( 661)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.580760 182129 usertrap_amd64.go:212] [ 39085( 626): 39085( 626)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.580842 182129 usertrap_amd64.go:122] [ 39085( 626): 39085( 626)] Allocate a new trap: 0xc000e682a0 42 D0318 14:42:32.580909 182129 usertrap_amd64.go:225] [ 39085( 626): 39085( 626)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.581886 182129 usertrap_amd64.go:212] [ 39086( 660): 39086( 660)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.582124 182129 usertrap_amd64.go:122] [ 39086( 660): 39086( 660)] Allocate a new trap: 0xc005f00210 43 D0318 14:42:32.582345 182129 usertrap_amd64.go:225] [ 39086( 660): 39086( 660)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.586647 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.586743 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 39 D0318 14:42:32.586826 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.587351 182129 task_exit.go:204] [ 39085( 626): 39085( 626)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.587791 182129 task_signals.go:204] [ 39085( 626): 39089( 627)] Signal 9, PID: 39085, TID: 39089, fault addr: 0x0: terminating thread group D0318 14:42:32.588915 182129 task_exit.go:204] [ 39085( 626): 39085( 626)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.589123 182129 task_exit.go:204] [ 39085( 626): 39089( 627)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.591670 182129 task_exit.go:204] [ 39086( 660): 39086( 660)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.591872 182129 task_signals.go:204] [ 39086( 660): 39090( 661)] Signal 9, PID: 39086, TID: 39090, fault addr: 0x0: terminating thread group D0318 14:42:32.592672 182129 task_exit.go:204] [ 39086( 660): 39086( 660)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.592828 182129 task_exit.go:204] [ 39086( 660): 39090( 661)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.598089 182129 task_exit.go:204] [ 39085( 626): 39089( 627)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.598150 182129 task_exit.go:204] [ 39085( 626): 39089( 627)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.598246 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.598751 182129 task_exit.go:204] [ 39085( 626): 39085( 626)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.599937 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.600090 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 38 D0318 14:42:32.600207 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.600000 182129 task_exit.go:204] [ 39086( 660): 39090( 661)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.600395 182129 task_exit.go:204] [ 39086( 660): 39090( 661)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.600586 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.600726 182129 task_exit.go:204] [ 39086( 660): 39086( 660)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x7, 0x0, &(0x7f0000000340)) 14:42:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000380)="cbfbe018", 0x4) D0318 14:42:32.604822 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.605041 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 40 D0318 14:42:32.605169 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:32.607489 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.607598 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 41 D0318 14:42:32.607990 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.608182 182129 usertrap_amd64.go:212] [ 39088(1387): 39091(1388)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.608547 182129 usertrap_amd64.go:122] [ 39088(1387): 39091(1388)] Allocate a new trap: 0xc0004e07b0 42 D0318 14:42:32.608664 182129 usertrap_amd64.go:225] [ 39088(1387): 39091(1388)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:32.611578 182129 usertrap_amd64.go:212] [ 39088(1387): 39088(1387)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.611691 182129 usertrap_amd64.go:122] [ 39088(1387): 39088(1387)] Allocate a new trap: 0xc0004e07b0 43 D0318 14:42:32.611795 182129 usertrap_amd64.go:225] [ 39088(1387): 39088(1387)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:32.612675 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.612730 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 39 D0318 14:42:32.612862 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.614949 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.615031 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 40 D0318 14:42:32.615111 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.615534 182129 usertrap_amd64.go:212] [ 39087( 583): 39092( 584)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.615655 182129 usertrap_amd64.go:122] [ 39087( 583): 39092( 584)] Allocate a new trap: 0xc004db0270 41 D0318 14:42:32.615749 182129 usertrap_amd64.go:225] [ 39087( 583): 39092( 584)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.616046 182129 task_exit.go:204] [ 39088(1387): 39088(1387)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.617174 182129 task_signals.go:204] [ 39088(1387): 39091(1388)] Signal 9, PID: 39088, TID: 39091, fault addr: 0x0: terminating thread group D0318 14:42:32.617266 182129 task_exit.go:204] [ 39088(1387): 39091(1388)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.617342 182129 task_exit.go:204] [ 39088(1387): 39088(1387)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.619516 182129 usertrap_amd64.go:212] [ 39087( 583): 39087( 583)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.619643 182129 usertrap_amd64.go:122] [ 39087( 583): 39087( 583)] Allocate a new trap: 0xc004db0270 42 D0318 14:42:32.619722 182129 usertrap_amd64.go:225] [ 39087( 583): 39087( 583)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.625214 182129 task_exit.go:204] [ 39087( 583): 39087( 583)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.626060 182129 task_signals.go:204] [ 39087( 583): 39092( 584)] Signal 9, PID: 39087, TID: 39092, fault addr: 0x0: terminating thread group D0318 14:42:32.626282 182129 task_exit.go:204] [ 39087( 583): 39087( 583)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.626576 182129 task_exit.go:204] [ 39087( 583): 39092( 584)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.627669 182129 task_exit.go:204] [ 39088(1387): 39091(1388)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.627757 182129 task_exit.go:204] [ 39088(1387): 39091(1388)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.627907 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.629497 182129 task_exit.go:204] [ 39088(1387): 39088(1387)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) D0318 14:42:32.639042 182129 task_exit.go:204] [ 39087( 583): 39092( 584)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.639206 182129 task_exit.go:204] [ 39087( 583): 39092( 584)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.639385 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.640443 182129 task_exit.go:204] [ 39087( 583): 39087( 583)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x7, &(0x7f0000002440), 0x14) D0318 14:42:32.648728 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.648904 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 37 D0318 14:42:32.649744 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.655766 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.655868 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 38 D0318 14:42:32.655942 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.661349 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.661508 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 36 D0318 14:42:32.662448 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.664961 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.665065 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 37 D0318 14:42:32.666199 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.666622 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.667016 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 37 D0318 14:42:32.667137 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.671533 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.671646 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 39 D0318 14:42:32.671797 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.681855 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.681949 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 40 D0318 14:42:32.682039 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.682954 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.683030 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 36 D0318 14:42:32.683945 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.684034 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 38 D0318 14:42:32.684103 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.684232 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.684283 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 41 D0318 14:42:32.684070 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.684404 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.684706 182129 usertrap_amd64.go:212] [ 39094( 662): 39097( 663)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.684791 182129 usertrap_amd64.go:122] [ 39094( 662): 39097( 663)] Allocate a new trap: 0xc000428270 42 D0318 14:42:32.684861 182129 usertrap_amd64.go:225] [ 39094( 662): 39097( 663)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.689253 182129 usertrap_amd64.go:212] [ 39094( 662): 39094( 662)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.689674 182129 usertrap_amd64.go:122] [ 39094( 662): 39094( 662)] Allocate a new trap: 0xc000428270 43 D0318 14:42:32.689820 182129 usertrap_amd64.go:225] [ 39094( 662): 39094( 662)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.690597 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.690693 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 37 D0318 14:42:32.690762 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.694771 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d5863e1520:sysno 266 D0318 14:42:32.694845 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 38 D0318 14:42:32.694910 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d5863e1520 trap addr 67be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 123 6 0]) D0318 14:42:32.698870 182129 task_exit.go:204] [ 39094( 662): 39094( 662)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.699712 182129 task_signals.go:204] [ 39094( 662): 39097( 663)] Signal 9, PID: 39094, TID: 39097, fault addr: 0x0: terminating thread group D0318 14:42:32.699728 182129 task_exit.go:204] [ 39094( 662): 39094( 662)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.700120 182129 task_exit.go:204] [ 39094( 662): 39097( 663)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.704549 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.704680 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 39 D0318 14:42:32.704757 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.706279 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.706357 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 38 D0318 14:42:32.706427 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.708344 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.708401 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 40 D0318 14:42:32.708488 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.708698 182129 task_exit.go:204] [ 39094( 662): 39097( 663)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.708789 182129 task_exit.go:204] [ 39094( 662): 39097( 663)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.708903 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.709034 182129 task_exit.go:204] [ 39094( 662): 39094( 662)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.709426 182129 usertrap_amd64.go:212] [ 39093( 628): 39098( 629)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.709529 182129 usertrap_amd64.go:122] [ 39093( 628): 39098( 629)] Allocate a new trap: 0xc004db02a0 41 D0318 14:42:32.709620 182129 usertrap_amd64.go:225] [ 39093( 628): 39098( 629)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) 14:42:32 executing program 3: r0 = eventfd2(0xb99, 0x800) read$eventfd(r0, &(0x7f0000000640), 0x8) read$eventfd(r0, &(0x7f0000000680), 0x8) D0318 14:42:32.711158 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d5863b6ca2:sysno 14 D0318 14:42:32.711223 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 39 D0318 14:42:32.711287 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d5863b6ca2 trap addr 67c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 124 6 0]) D0318 14:42:32.714984 182129 usertrap_amd64.go:212] [ 39093( 628): 39093( 628)] Found the pattern at ip 556d17c46c93:sysno 3 D0318 14:42:32.715045 182129 usertrap_amd64.go:122] [ 39093( 628): 39093( 628)] Allocate a new trap: 0xc004db02a0 42 D0318 14:42:32.715101 182129 usertrap_amd64.go:225] [ 39093( 628): 39093( 628)] Apply the binary patch addr 556d17c46c93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 14:42:32.716984 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.717061 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 39 D0318 14:42:32.717135 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.719153 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.719294 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 40 D0318 14:42:32.719456 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.719753 182129 usertrap_amd64.go:212] [ 39096( 585): 39099( 586)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.719811 182129 usertrap_amd64.go:122] [ 39096( 585): 39099( 586)] Allocate a new trap: 0xc004db02d0 41 D0318 14:42:32.719898 182129 usertrap_amd64.go:225] [ 39096( 585): 39099( 586)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.722496 182129 usertrap_amd64.go:212] [ 39096( 585): 39096( 585)] Found the pattern at ip 560b68d10c93:sysno 3 D0318 14:42:32.722584 182129 usertrap_amd64.go:122] [ 39096( 585): 39096( 585)] Allocate a new trap: 0xc004db02d0 42 D0318 14:42:32.722648 182129 usertrap_amd64.go:225] [ 39096( 585): 39096( 585)] Apply the binary patch addr 560b68d10c93 trap addr 62d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0318 14:42:32.724085 182129 task_exit.go:204] [ 39093( 628): 39093( 628)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.724407 182129 task_signals.go:204] [ 39093( 628): 39098( 629)] Signal 9, PID: 39093, TID: 39098, fault addr: 0x0: terminating thread group D0318 14:42:32.724637 182129 task_exit.go:204] [ 39093( 628): 39098( 629)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.724964 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d58640db92:sysno 435 D0318 14:42:32.725029 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 40 D0318 14:42:32.725106 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d58640db92 trap addr 67c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 124 6 0]) D0318 14:42:32.725907 182129 task_exit.go:204] [ 39093( 628): 39093( 628)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.728230 182129 task_signals.go:204] [ 39096( 585): 39099( 586)] Signal 9, PID: 39096, TID: 39099, fault addr: 0x0: terminating thread group D0318 14:42:32.728460 182129 task_exit.go:204] [ 39096( 585): 39099( 586)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.728563 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d5863b6c10:sysno 14 D0318 14:42:32.728789 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 41 D0318 14:42:32.729067 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d5863b6c10 trap addr 67cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 124 6 0]) D0318 14:42:32.729178 182129 task_exit.go:204] [ 39096( 585): 39096( 585)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.729370 182129 task_exit.go:204] [ 39096( 585): 39099( 586)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.729445 182129 task_exit.go:204] [ 39096( 585): 39099( 586)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.729498 182129 usertrap_amd64.go:212] [ 39095(1389): 39100(1390)] Found the pattern at ip 55d5863b6320:sysno 273 D0318 14:42:32.729577 182129 usertrap_amd64.go:122] [ 39095(1389): 39100(1390)] Allocate a new trap: 0xc005f002d0 42 D0318 14:42:32.729716 182129 usertrap_amd64.go:225] [ 39095(1389): 39100(1390)] Apply the binary patch addr 55d5863b6320 trap addr 67d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 125 6 0]) D0318 14:42:32.732787 182129 task_exit.go:204] [ 39093( 628): 39098( 629)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.732870 182129 task_exit.go:204] [ 39093( 628): 39098( 629)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.732970 182129 task_signals.go:443] [ 36503( 1): 36503( 1)] Discarding ignored signal 17 D0318 14:42:32.733224 182129 task_exit.go:204] [ 39093( 628): 39093( 628)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xa, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="4e1f6c030003000000b8038343d4", 0xe}]) D0318 14:42:32.739258 182129 task_exit.go:204] [ 39096( 585): 39096( 585)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.739413 182129 task_signals.go:443] [ 36801( 1): 36801( 1)] Discarding ignored signal 17 D0318 14:42:32.739537 182129 task_exit.go:204] [ 39096( 585): 39096( 585)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x3, &(0x7f0000002440), 0x14) D0318 14:42:32.746389 182129 usertrap_amd64.go:212] [ 39095(1389): 39095(1389)] Found the pattern at ip 55d5863e0c93:sysno 3 D0318 14:42:32.747331 182129 usertrap_amd64.go:122] [ 39095(1389): 39095(1389)] Allocate a new trap: 0xc005f002d0 43 D0318 14:42:32.747528 182129 usertrap_amd64.go:225] [ 39095(1389): 39095(1389)] Apply the binary patch addr 55d5863e0c93 trap addr 67d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0318 14:42:32.757773 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff404a3860:sysno 109 D0318 14:42:32.758151 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 37 D0318 14:42:32.759339 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff404a3860 trap addr 68b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 139 6 0]) D0318 14:42:32.765482 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff40477520:sysno 266 D0318 14:42:32.765551 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 38 D0318 14:42:32.765634 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff40477520 trap addr 68be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 139 6 0]) D0318 14:42:32.766451 182129 task_exit.go:204] [ 39095(1389): 39095(1389)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.766709 182129 task_signals.go:204] [ 39095(1389): 39100(1390)] Signal 9, PID: 39095, TID: 39100, fault addr: 0x0: terminating thread group D0318 14:42:32.767693 182129 task_exit.go:204] [ 39095(1389): 39100(1390)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.767922 182129 task_exit.go:204] [ 39095(1389): 39095(1389)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.777789 182129 task_exit.go:204] [ 39095(1389): 39100(1390)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.778013 182129 task_exit.go:204] [ 39095(1389): 39100(1390)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.778204 182129 task_signals.go:443] [ 33511( 1): 33511( 1)] Discarding ignored signal 17 D0318 14:42:32.779072 182129 task_exit.go:204] [ 39095(1389): 39095(1389)] Transitioning from exit state TaskExitZombie to TaskExitDead 14:42:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)=""/71, 0x47}, {&(0x7f0000000480)=""/93, 0x5d}], 0x2}, 0x0) sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="34cc7bd96004d8daac55dcd309a5268282b500c09cef7e0b0e5d18fefb218b237019044e7964562d5f1360b402ec6f612903873c8bb3e63e", 0x38}, {&(0x7f0000000080)="7d2472afbb1d04f16abcee467bb1fa66571927c552f0b8f4756036f3f90296b75bc598b9b049987bfbbdddaf72fd68ab6f9fd9a5d76310c439b4b9f9d7908e1a31534f396dbee56d3d0fcc17f10695c90ccde7c3b97a2b8a643841ed030c4eded2794b43b4d5f7b1bf982824", 0x6c}], 0x2}, 0x0) D0318 14:42:32.781889 182129 usertrap_amd64.go:212] [ 39102( 630): 39102( 630)] Found the pattern at ip 556d17c73860:sysno 109 D0318 14:42:32.782144 182129 usertrap_amd64.go:122] [ 39102( 630): 39102( 630)] Allocate a new trap: 0xc0004282d0 36 D0318 14:42:32.783215 182129 usertrap_amd64.go:225] [ 39102( 630): 39102( 630)] Apply the binary patch addr 556d17c73860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 14:42:32.786850 182129 usertrap_amd64.go:212] [ 39102( 630): 39102( 630)] Found the pattern at ip 556d17c47520:sysno 266 D0318 14:42:32.786907 182129 usertrap_amd64.go:122] [ 39102( 630): 39102( 630)] Allocate a new trap: 0xc0004282d0 37 D0318 14:42:32.786991 182129 usertrap_amd64.go:225] [ 39102( 630): 39102( 630)] Apply the binary patch addr 556d17c47520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 14:42:32.789426 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff4044cca2:sysno 14 D0318 14:42:32.789510 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 39 D0318 14:42:32.789582 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff4044cca2 trap addr 68c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 140 6 0]) D0318 14:42:32.791526 182129 usertrap_amd64.go:212] [ 39103( 587): 39103( 587)] Found the pattern at ip 560b68d3d860:sysno 109 D0318 14:42:32.791725 182129 usertrap_amd64.go:122] [ 39103( 587): 39103( 587)] Allocate a new trap: 0xc005f00330 36 D0318 14:42:32.792675 182129 usertrap_amd64.go:225] [ 39103( 587): 39103( 587)] Apply the binary patch addr 560b68d3d860 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0318 14:42:32.796636 182129 usertrap_amd64.go:212] [ 39103( 587): 39103( 587)] Found the pattern at ip 560b68d11520:sysno 266 D0318 14:42:32.796711 182129 usertrap_amd64.go:122] [ 39103( 587): 39103( 587)] Allocate a new trap: 0xc005f00330 37 D0318 14:42:32.796771 182129 usertrap_amd64.go:225] [ 39103( 587): 39103( 587)] Apply the binary patch addr 560b68d11520 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0318 14:42:32.799723 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff404a3b92:sysno 435 D0318 14:42:32.799813 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 40 D0318 14:42:32.799885 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff404a3b92 trap addr 68c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 140 6 0]) D0318 14:42:32.801650 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff4044cc10:sysno 14 D0318 14:42:32.801847 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 41 D0318 14:42:32.802159 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff4044cc10 trap addr 68cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0318 14:42:32.802588 182129 usertrap_amd64.go:212] [ 39101( 664): 39104( 665)] Found the pattern at ip 55ff4044c320:sysno 273 D0318 14:42:32.802676 182129 usertrap_amd64.go:122] [ 39101( 664): 39104( 665)] Allocate a new trap: 0xc000880630 42 D0318 14:42:32.802755 182129 usertrap_amd64.go:225] [ 39101( 664): 39104( 665)] Apply the binary patch addr 55ff4044c320 trap addr 68d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 141 6 0]) D0318 14:42:32.806299 182129 usertrap_amd64.go:212] [ 39101( 664): 39101( 664)] Found the pattern at ip 55ff40476c93:sysno 3 D0318 14:42:32.806373 182129 usertrap_amd64.go:122] [ 39101( 664): 39101( 664)] Allocate a new trap: 0xc000880630 43 D0318 14:42:32.806439 182129 usertrap_amd64.go:225] [ 39101( 664): 39101( 664)] Apply the binary patch addr 55ff40476c93 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0318 14:42:32.813562 182129 usertrap_amd64.go:212] [ 39103( 587): 39103( 587)] Found the pattern at ip 560b68ce6ca2:sysno 14 D0318 14:42:32.813639 182129 usertrap_amd64.go:122] [ 39103( 587): 39103( 587)] Allocate a new trap: 0xc005f00330 38 D0318 14:42:32.813774 182129 usertrap_amd64.go:225] [ 39103( 587): 39103( 587)] Apply the binary patch addr 560b68ce6ca2 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0318 14:42:32.814418 182129 task_exit.go:204] [ 39101( 664): 39101( 664)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.814919 182129 task_signals.go:204] [ 39101( 664): 39104( 665)] Signal 9, PID: 39101, TID: 39104, fault addr: 0x0: terminating thread group D0318 14:42:32.815668 182129 usertrap_amd64.go:212] [ 39102( 630): 39102( 630)] Found the pattern at ip 556d17c1cca2:sysno 14 D0318 14:42:32.815596 182129 task_exit.go:204] [ 39101( 664): 39101( 664)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.815781 182129 usertrap_amd64.go:122] [ 39102( 630): 39102( 630)] Allocate a new trap: 0xc0004282d0 38 D0318 14:42:32.815821 182129 task_exit.go:204] [ 39101( 664): 39104( 665)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 14:42:32.815885 182129 usertrap_amd64.go:225] [ 39102( 630): 39102( 630)] Apply the binary patch addr 556d17c1cca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 14:42:32.823824 182129 usertrap_amd64.go:212] [ 39103( 587): 39103( 587)] Found the pattern at ip 560b68d3db92:sysno 435 D0318 14:42:32.824048 182129 usertrap_amd64.go:122] [ 39103( 587): 39103( 587)] Allocate a new trap: 0xc005f00330 39 D0318 14:42:32.824205 182129 usertrap_amd64.go:225] [ 39103( 587): 39103( 587)] Apply the binary patch addr 560b68d3db92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0318 14:42:32.824735 182129 task_exit.go:204] [ 39101( 664): 39104( 665)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 14:42:32.824846 182129 task_exit.go:204] [ 39101( 664): 39104( 665)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.824953 182129 task_signals.go:443] [ 36370( 1): 36370( 1)] Discarding ignored signal 17 D0318 14:42:32.825091 182129 task_exit.go:204] [ 39101( 664): 39101( 664)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 14:42:32.826683 182129 usertrap_amd64.go:212] [ 39102( 630): 39102( 630)] Found the pattern at ip 556d17c73b92:sysno 435 D0318 14:42:32.826927 182129 usertrap_amd64.go:122] [ 39102( 630): 39102( 630)] Allocate a new trap: 0xc0004282d0 39 14:42:32 executing program 3: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) D0318 14:42:32.827119 182129 usertrap_amd64.go:225] [ 39102( 630): 39102( 630)] Apply the binary patch addr 556d17c73b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 14:42:32.827854 182129 usertrap_amd64.go:212] [ 39103( 587): 39103( 587)] Found the pattern at ip 560b68ce6c10:sysno 14 D0318 14:42:32.827928 182129 usertrap_amd64.go:122] [ 39103( 587): 39103( 587)] Allocate a new trap: 0xc005f00330 40 D0318 14:42:32.828017 182129 usertrap_amd64.go:225] [ 39103( 587): 39103( 587)] Apply the binary patch addr 560b68ce6c10 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0318 14:42:32.828296 182129 usertrap_amd64.go:212] [ 39103( 587): 39106( 588)] Found the pattern at ip 560b68ce6320:sysno 273 D0318 14:42:32.828447 182129 usertrap_amd64.go:122] [ 39103( 587): 39106( 588)] Allocate a new trap: 0xc005f00330 41 D0318 14:42:32.828571 182129 usertrap_amd64.go:212] [ 39105(1391): 39105(1391)] Found the pattern at ip 55d58640d860:sysno 109 D0318 14:42:32.828643 182129 usertrap_amd64.go:225] [ 39103( 587): 39106( 588)] Apply the binary patch addr 560b68ce6320 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0318 14:42:32.828732 182129 usertrap_amd64.go:122] [ 39105(1391): 39105(1391)] Allocate a new trap: 0xc004db0300 37 D0318 14:42:32.829221 182129 usertrap_amd64.go:212] [ 39102( 630): 39102( 630)] Found the pattern at ip 556d17c1cc10:sysno 14 D0318 14:42:32.829354 182129 usertrap_amd64.go:122] [ 39102( 630): 39102( 630)] Allocate a new trap: 0xc0004282d0 40 D0318 14:42:32.829509 182129 usertrap_amd64.go:225] [ 39102( 630): 39102( 630)] Apply the binary patch addr 556d17c1cc10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 14:42:32.829861 182129 usertrap_amd64.go:212] [ 39102( 630): 39107( 631)] Found the pattern at ip 556d17c1c320:sysno 273 D0318 14:42:32.829976 182129 usertrap_amd64.go:122] [ 39102( 630): 39107( 631)] Allocate a new trap: 0xc0004282d0 41 D0318 14:42:32.829960 182129 usertrap_amd64.go:225] [ 39105(1391): 39105(1391)] Apply the binary patch addr 55d58640d860 trap addr 67b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 123 6 0]) D0318 14:42:32.830054 182129 usertrap_amd64.go:225] [ 39102( 630): 39107( 631)] Apply the binary patch addr 556d17c1c320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x1e21a36] goroutine 104217 gp=0xc006ba2a80 m=28 mp=0xc0009da808 [running]: panic({0x312ce0?, 0x2827720?}) GOROOT/src/runtime/panic.go:779 +0x158 fp=0xc0050630c0 sp=0xc005063010 pc=0x1358318 runtime.panicmem(...) GOROOT/src/runtime/panic.go:261 runtime.sigpanic() GOROOT/src/runtime/signal_unix.go:881 +0x378 fp=0xc005063120 sp=0xc0050630c0 pc=0x1373578 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*endpoint).OnCorkOptionSet(0xc017739c08, 0x0) pkg/tcpip/transport/tcp/endpoint.go:1766 +0xb6 fp=0xc005063190 sp=0xc005063120 pc=0x1e21a36 gvisor.dev/gvisor/pkg/tcpip.(*SocketOptions).SetCorkOption(0xc01773a118, 0x0) pkg/tcpip/socketops.go:474 +0x66 fp=0xc0050631b0 sp=0xc005063190 pc=0x16d69a6 gvisor.dev/gvisor/pkg/sentry/socket/netstack.setSockOptTCP(0x0?, {0x833048, 0xc00f0950e0}, {0x7f7ff0c30d18, 0xc017739c08}, 0x3, {0xc00e291e3c, 0x14, 0x1399b91?}) pkg/sentry/socket/netstack/netstack.go:2015 +0x425 fp=0xc005063250 sp=0xc0050631b0 pc=0x1ef1945 gvisor.dev/gvisor/pkg/sentry/socket/netstack.SetSockOpt(0xc00e291508, {0x833048, 0xc00f0950e0}, {0x7f7ff0c30d18, 0xc017739c08}, 0x6, 0x3, {0xc00e291e3c, 0x14, 0x90}) pkg/sentry/socket/netstack/netstack.go:1765 +0x196 fp=0xc0050632b0 sp=0xc005063250 pc=0x1eeed16 gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).SetSockOpt(0xc00f0950e0, 0xc00e291508, 0x6, 0x3, {0xc00e291e3c, 0x14, 0x90}) pkg/sentry/socket/netstack/netstack.go:611 +0x608 fp=0xc0050633d8 sp=0xc0050632b0 pc=0x1ee67e8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.SetSockOpt(0xc00e291508, 0xca?, {{0x3}, {0x6}, {0x3}, {0x20002440}, {0x14}, {0x0}}) pkg/sentry/syscalls/linux/sys_socket.go:551 +0x3b5 fp=0xc0050634f0 sp=0xc0050633d8 pc=0x1fb72b5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00e291508, 0x36, {{0x3}, {0x6}, {0x3}, {0x20002440}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:143 +0x995 fp=0xc005063938 sp=0xc0050634f0 pc=0x1d32e55 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00e291508, 0x36, {{0x3}, {0x6}, {0x3}, {0x20002440}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:323 +0x72 fp=0xc0050639e0 sp=0xc005063938 pc=0x1d34cb2 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc00e291508, 0x36, {{0x3}, {0x6}, {0x3}, {0x20002440}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:283 +0x94 fp=0xc005063a50 sp=0xc0050639e0 pc=0x1d346b4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00e291508) pkg/sentry/kernel/task_syscall.go:258 +0x4b0 fp=0xc005063b80 sp=0xc005063a50 pc=0x1d34250 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00e291508?, 0xc00e291508) pkg/sentry/kernel/task_run.go:263 +0x1fee fp=0xc005063e98 sp=0xc005063b80 pc=0x1d1dace gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00e291508, 0x98c2) pkg/sentry/kernel/task_run.go:98 +0x46d fp=0xc005063fb0 sp=0xc005063e98 pc=0x1d1b14d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.gowrap1() pkg/sentry/kernel/task_start.go:390 +0x45 fp=0xc005063fe0 sp=0xc005063fb0 pc=0x1d30985 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc005063fe8 sp=0xc005063fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start in goroutine 104215 pkg/sentry/kernel/task_start.go:390 +0x1ae goroutine 1 gp=0xc0000061c0 m=nil [semacquire, 26 minutes]: runtime.gopark(0xc000290c60?, 0xc00029e0c0?, 0x40?, 0xe2?, 0xc000215118?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000a050c0 sp=0xc000a050a0 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.semacquire1(0xc0003c2270, 0x0, 0x1, 0x0, 0x12) GOROOT/src/runtime/sema.go:160 +0x225 fp=0xc000a05128 sp=0xc000a050c0 pc=0x13706e5 sync.runtime_Semacquire(0xc0003c2270?) GOROOT/src/runtime/sema.go:62 +0x25 fp=0xc000a05160 sp=0xc000a05128 pc=0x13920c5 sync.(*WaitGroup).Wait(0xc0003c2268) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc000a05190 sp=0xc000a05160 pc=0x13aa865 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1265 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000384008) runsc/boot/loader.go:1297 +0x65 fp=0xc000a051b8 sp=0xc000a05190 pc=0x2503ea5 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc0002a6600, {0xc0001ae118?, 0x10?}, 0xc0001ea150, {0xc0001daa40, 0x2, 0x2752400?}) runsc/cmd/boot.go:507 +0x2ac5 fp=0xc000a05bf0 sp=0xc000a051b8 pc=0x26d0045 github.com/google/subcommands.(*Commander).Execute(0xc0001ec000, {0x8129d0, 0x3821fc0}, {0xc0001daa40, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x684 fp=0xc000a05ce0 sp=0xc000a05bf0 pc=0x14a5224 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:221 +0x20f7 fp=0xc000a05f38 sp=0xc000a05ce0 pc=0x271f937 main.main() runsc/main.go:31 +0x1d fp=0xc000a05f50 sp=0xc000a05f38 pc=0x2720c9d runtime.main() GOROOT/src/runtime/proc.go:271 +0x29d fp=0xc000a05fe0 sp=0xc000a05f50 pc=0x135b9dd runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000a05fe8 sp=0xc000a05fe0 pc=0x13968c1 goroutine 2 gp=0xc000006c40 m=nil [force gc (idle), 26 minutes]: runtime.gopark(0x285d590?, 0x2883b00?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00013c7a8 sp=0xc00013c788 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.forcegchelper() GOROOT/src/runtime/proc.go:326 +0xb3 fp=0xc00013c7e0 sp=0xc00013c7a8 pc=0x135bcb3 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00013c7e8 sp=0xc00013c7e0 pc=0x13968c1 created by runtime.init.6 in goroutine 1 GOROOT/src/runtime/proc.go:314 +0x1a goroutine 3 gp=0xc000007180 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014cf80 sp=0xc00014cf60 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.bgsweep(0xc000166000) GOROOT/src/runtime/mgcsweep.go:318 +0xdf fp=0xc00014cfc8 sp=0xc00014cf80 pc=0x134571f runtime.gcenable.gowrap1() GOROOT/src/runtime/mgc.go:203 +0x25 fp=0xc00014cfe0 sp=0xc00014cfc8 pc=0x133a045 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014cfe8 sp=0xc00014cfe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:203 +0x66 goroutine 4 gp=0xc000007340 m=nil [GC scavenge wait]: runtime.gopark(0xbb0c6?, 0x5f379?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000152f78 sp=0xc000152f58 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x2881a80) GOROOT/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc000152fa8 sp=0xc000152f78 pc=0x13430e9 runtime.bgscavenge(0xc000166000) GOROOT/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc000152fc8 sp=0xc000152fa8 pc=0x1343679 runtime.gcenable.gowrap2() GOROOT/src/runtime/mgc.go:204 +0x25 fp=0xc000152fe0 sp=0xc000152fc8 pc=0x1339fe5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000152fe8 sp=0xc000152fe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:204 +0xa5 goroutine 18 gp=0xc000182700 m=nil [finalizer wait, 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000284e20 sp=0xc000284e00 pc=0x135be4e runtime.runfinq() GOROOT/src/runtime/mfinal.go:194 +0x145 fp=0xc000284fe0 sp=0xc000284e20 pc=0x1339005 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000284fe8 sp=0xc000284fe0 pc=0x13968c1 created by runtime.createfing in goroutine 1 GOROOT/src/runtime/mfinal.go:164 +0x3d goroutine 34 gp=0xc0004ec000 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0xc000166000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000283f50 sp=0xc000283f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000283fe0 sp=0xc000283f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000283fe8 sp=0xc000283fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 19 gp=0xc000340a80 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000282f50 sp=0xc000282f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000282fe0 sp=0xc000282f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000282fe8 sp=0xc000282fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 5 gp=0xc000007880 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000281f50 sp=0xc000281f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000281fe0 sp=0xc000281f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000281fe8 sp=0xc000281fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 35 gp=0xc0004ec1c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000280f50 sp=0xc000280f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000280fe0 sp=0xc000280f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000280fe8 sp=0xc000280fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 6 gp=0xc000007a40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035ff50 sp=0xc00035ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035ffe0 sp=0xc00035ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035ffe8 sp=0xc00035ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 20 gp=0xc000340c40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035ef50 sp=0xc00035ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035efe0 sp=0xc00035ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035efe8 sp=0xc00035efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 7 gp=0xc000007c00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035df50 sp=0xc00035df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035dfe0 sp=0xc00035df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035dfe8 sp=0xc00035dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 36 gp=0xc0004ec380 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035cf50 sp=0xc00035cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035cfe0 sp=0xc00035cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035cfe8 sp=0xc00035cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 21 gp=0xc000340e00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035bf50 sp=0xc00035bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035bfe0 sp=0xc00035bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035bfe8 sp=0xc00035bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 8 gp=0xc000007dc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00035af50 sp=0xc00035af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00035afe0 sp=0xc00035af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00035afe8 sp=0xc00035afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 9 gp=0xc000178000 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000359f50 sp=0xc000359f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000359fe0 sp=0xc000359f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000359fe8 sp=0xc000359fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 22 gp=0xc000340fc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000358f50 sp=0xc000358f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000358fe0 sp=0xc000358f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000358fe8 sp=0xc000358fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 37 gp=0xc0004ec540 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000507f50 sp=0xc000507f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000507fe0 sp=0xc000507f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 10 gp=0xc0001781c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000506f50 sp=0xc000506f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000506fe0 sp=0xc000506f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 23 gp=0xc000341180 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000505f50 sp=0xc000505f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000505fe0 sp=0xc000505f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 11 gp=0xc000178380 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000504f50 sp=0xc000504f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000504fe0 sp=0xc000504f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 24 gp=0xc000341340 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000503f50 sp=0xc000503f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000503fe0 sp=0xc000503f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 25 gp=0xc000341500 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000502f50 sp=0xc000502f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000502fe0 sp=0xc000502f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 38 gp=0xc0004ec700 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000501f50 sp=0xc000501f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000501fe0 sp=0xc000501f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000501fe8 sp=0xc000501fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 12 gp=0xc000178540 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000500f50 sp=0xc000500f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000500fe0 sp=0xc000500f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000500fe8 sp=0xc000500fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 39 gp=0xc0004ec8c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004fdf50 sp=0xc0004fdf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004fdfe0 sp=0xc0004fdf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004fdfe8 sp=0xc0004fdfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 40 gp=0xc0004eca80 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004fcf50 sp=0xc0004fcf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004fcfe0 sp=0xc0004fcf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004fcfe8 sp=0xc0004fcfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 41 gp=0xc0004ecc40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004fbf50 sp=0xc0004fbf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004fbfe0 sp=0xc0004fbf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004fbfe8 sp=0xc0004fbfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 26 gp=0xc0003416c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0xc000166000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004faf50 sp=0xc0004faf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004fafe0 sp=0xc0004faf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004fafe8 sp=0xc0004fafe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 13 gp=0xc000178700 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f9f50 sp=0xc0004f9f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f9fe0 sp=0xc0004f9f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f9fe8 sp=0xc0004f9fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 42 gp=0xc0004ece00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f8f50 sp=0xc0004f8f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f8fe0 sp=0xc0004f8f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f8fe8 sp=0xc0004f8fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 27 gp=0xc000341880 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f7f50 sp=0xc0004f7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f7fe0 sp=0xc0004f7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f7fe8 sp=0xc0004f7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 14 gp=0xc0001788c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f6f50 sp=0xc0004f6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f6fe0 sp=0xc0004f6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f6fe8 sp=0xc0004f6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 43 gp=0xc0004ecfc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000369f50 sp=0xc000369f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000369fe0 sp=0xc000369f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000369fe8 sp=0xc000369fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 28 gp=0xc000341a40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000368f50 sp=0xc000368f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000368fe0 sp=0xc000368f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000368fe8 sp=0xc000368fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 44 gp=0xc0004ed180 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000367f50 sp=0xc000367f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000367fe0 sp=0xc000367f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000367fe8 sp=0xc000367fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 29 gp=0xc000341c00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000366f50 sp=0xc000366f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000366fe0 sp=0xc000366f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000366fe8 sp=0xc000366fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 15 gp=0xc000178a80 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000365f50 sp=0xc000365f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000365fe0 sp=0xc000365f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000365fe8 sp=0xc000365fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 45 gp=0xc0004ed340 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000364f50 sp=0xc000364f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000364fe0 sp=0xc000364f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000364fe8 sp=0xc000364fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 30 gp=0xc000341dc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000363f50 sp=0xc000363f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000363fe0 sp=0xc000363f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000363fe8 sp=0xc000363fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 16 gp=0xc000178c40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000362f50 sp=0xc000362f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000362fe0 sp=0xc000362f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000362fe8 sp=0xc000362fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 46 gp=0xc0004ed500 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000371f50 sp=0xc000371f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000371fe0 sp=0xc000371f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000371fe8 sp=0xc000371fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 31 gp=0xc000372000 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000370f50 sp=0xc000370f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000370fe0 sp=0xc000370f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000370fe8 sp=0xc000370fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 50 gp=0xc000178e00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036ff50 sp=0xc00036ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036ffe0 sp=0xc00036ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036ffe8 sp=0xc00036ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 47 gp=0xc0004ed6c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036ef50 sp=0xc00036ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036efe0 sp=0xc00036ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036efe8 sp=0xc00036efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 32 gp=0xc0003721c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0xc000166000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036df50 sp=0xc00036df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036dfe0 sp=0xc00036df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036dfe8 sp=0xc00036dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 51 gp=0xc000178fc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036cf50 sp=0xc00036cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036cfe0 sp=0xc00036cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036cfe8 sp=0xc00036cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 48 gp=0xc0004ed880 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036bf50 sp=0xc00036bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036bfe0 sp=0xc00036bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036bfe8 sp=0xc00036bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 33 gp=0xc000372380 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036af50 sp=0xc00036af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036afe0 sp=0xc00036af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036afe8 sp=0xc00036afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 52 gp=0xc000179180 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f5f50 sp=0xc0004f5f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f5fe0 sp=0xc0004f5f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f5fe8 sp=0xc0004f5fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 49 gp=0xc0004eda40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f4f50 sp=0xc0004f4f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f4fe0 sp=0xc0004f4f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f4fe8 sp=0xc0004f4fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 66 gp=0xc000372540 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f3f50 sp=0xc0004f3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f3fe0 sp=0xc0004f3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f3fe8 sp=0xc0004f3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 53 gp=0xc000179340 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f2f50 sp=0xc0004f2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f2fe0 sp=0xc0004f2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f2fe8 sp=0xc0004f2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 82 gp=0xc0004edc00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f1f50 sp=0xc0004f1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f1fe0 sp=0xc0004f1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f1fe8 sp=0xc0004f1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 67 gp=0xc000372700 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004f0f50 sp=0xc0004f0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004f0fe0 sp=0xc0004f0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004f0fe8 sp=0xc0004f0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 54 gp=0xc000179500 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004eff50 sp=0xc0004eff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004effe0 sp=0xc0004eff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004effe8 sp=0xc0004effe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 83 gp=0xc0004eddc0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004eef50 sp=0xc0004eef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004eefe0 sp=0xc0004eef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004eefe8 sp=0xc0004eefe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 84 gp=0xc0004fe000 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037bf50 sp=0xc00037bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037bfe0 sp=0xc00037bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037bfe8 sp=0xc00037bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 68 gp=0xc0003728c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037af50 sp=0xc00037af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037afe0 sp=0xc00037af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037afe8 sp=0xc00037afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 55 gp=0xc0001796c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000379f50 sp=0xc000379f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000379fe0 sp=0xc000379f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000379fe8 sp=0xc000379fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 56 gp=0xc000179880 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0xc000166000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000378f50 sp=0xc000378f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000378fe0 sp=0xc000378f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000378fe8 sp=0xc000378fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 57 gp=0xc000179a40 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000377f50 sp=0xc000377f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000377fe0 sp=0xc000377f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000377fe8 sp=0xc000377fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 58 gp=0xc000179c00 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000376f50 sp=0xc000376f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000376fe0 sp=0xc000376f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000376fe8 sp=0xc000376fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 85 gp=0xc0004fe1c0 m=nil [GC worker (idle), 26 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000375f50 sp=0xc000375f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000375fe0 sp=0xc000375f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000375fe8 sp=0xc000375fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 59 gp=0xc000179dc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c5636802146?, 0x1?, 0x70?, 0x8c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000374f50 sp=0xc000374f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000374fe0 sp=0xc000374f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000374fe8 sp=0xc000374fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 69 gp=0xc000372a80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xf9?, 0x88?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000517f50 sp=0xc000517f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000517fe0 sp=0xc000517f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000517fe8 sp=0xc000517fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 86 gp=0xc0004fe380 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfc33ed1?, 0x1?, 0x5a?, 0x48?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000516f50 sp=0xc000516f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000516fe0 sp=0xc000516f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000516fe8 sp=0xc000516fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 87 gp=0xc0004fe540 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfac2f43?, 0x1?, 0x68?, 0x97?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000515f50 sp=0xc000515f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000515fe0 sp=0xc000515f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000515fe8 sp=0xc000515fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 88 gp=0xc0004fe700 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bffd7ea7?, 0x1?, 0x2a?, 0xf4?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000514f50 sp=0xc000514f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000514fe0 sp=0xc000514f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000514fe8 sp=0xc000514fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 60 gp=0xc00017c000 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c563681a110?, 0x1?, 0x3e?, 0x54?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000513f50 sp=0xc000513f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000513fe0 sp=0xc000513f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000513fe8 sp=0xc000513fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 70 gp=0xc000372c40 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f3363c24?, 0x1?, 0xc6?, 0x8d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000512f50 sp=0xc000512f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000512fe0 sp=0xc000512f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000512fe8 sp=0xc000512fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 89 gp=0xc0004fe8c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c56365bfbea?, 0x3?, 0x28?, 0x6f?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000511f50 sp=0xc000511f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000511fe0 sp=0xc000511f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000511fe8 sp=0xc000511fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 61 gp=0xc00017c1c0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x9e?, 0x95?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000510f50 sp=0xc000510f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000510fe0 sp=0xc000510f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000510fe8 sp=0xc000510fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 71 gp=0xc000372e00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xa?, 0xf3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ff50 sp=0xc00050ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050ffe0 sp=0xc00050ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050ffe8 sp=0xc00050ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 62 gp=0xc00017c380 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfc930b1?, 0x1?, 0x6e?, 0xd2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ef50 sp=0xc00050ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050efe0 sp=0xc00050ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050efe8 sp=0xc00050efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 72 gp=0xc000372fc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xce?, 0x7?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050df50 sp=0xc00050df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050dfe0 sp=0xc00050df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050dfe8 sp=0xc00050dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 90 gp=0xc0004fea80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x62?, 0xa0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050cf50 sp=0xc00050cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050cfe0 sp=0xc00050cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050cfe8 sp=0xc00050cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 63 gp=0xc00017c540 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f337a866?, 0x1?, 0x36?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050bf50 sp=0xc00050bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050bfe0 sp=0xc00050bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050bfe8 sp=0xc00050bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 73 gp=0xc000373180 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x78?, 0x4e?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050af50 sp=0xc00050af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050afe0 sp=0xc00050af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050afe8 sp=0xc00050afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 91 gp=0xc0004fec40 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfc91c57?, 0x1?, 0xe4?, 0xd5?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000509f50 sp=0xc000509f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000509fe0 sp=0xc000509f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000509fe8 sp=0xc000509fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 64 gp=0xc00017c700 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x2c?, 0xbc?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000508f50 sp=0xc000508f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000508fe0 sp=0xc000508f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000508fe8 sp=0xc000508fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 74 gp=0xc000373340 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x5d?, 0x3c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051ff50 sp=0xc00051ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051ffe0 sp=0xc00051ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051ffe8 sp=0xc00051ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 92 gp=0xc0004fee00 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c56366a8f48?, 0x1?, 0xfc?, 0x9e?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051ef50 sp=0xc00051ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051efe0 sp=0xc00051ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051efe8 sp=0xc00051efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 65 gp=0xc00017c8c0 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f3363fee?, 0x1?, 0xc8?, 0x56?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051df50 sp=0xc00051df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051dfe0 sp=0xc00051df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051dfe8 sp=0xc00051dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 93 gp=0xc0004fefc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x2e?, 0x9d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051cf50 sp=0xc00051cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051cfe0 sp=0xc00051cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051cfe8 sp=0xc00051cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 75 gp=0xc000373500 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xb4?, 0xdb?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051bf50 sp=0xc00051bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051bfe0 sp=0xc00051bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051bfe8 sp=0xc00051bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 98 gp=0xc00017ca80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x82?, 0xe9?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051af50 sp=0xc00051af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051afe0 sp=0xc00051af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051afe8 sp=0xc00051afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 94 gp=0xc0004ff180 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x48?, 0xa2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000519f50 sp=0xc000519f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000519fe0 sp=0xc000519f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000519fe8 sp=0xc000519fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 76 gp=0xc0003736c0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x0?, 0x7d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000518f50 sp=0xc000518f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000518fe0 sp=0xc000518f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000518fe8 sp=0xc000518fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 99 gp=0xc00017cc40 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfa72633?, 0x3?, 0x2a?, 0x3e?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000527f50 sp=0xc000527f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000527fe0 sp=0xc000527f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000527fe8 sp=0xc000527fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 95 gp=0xc0004ff340 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f337a15e?, 0x1?, 0xe5?, 0x4d?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000526f50 sp=0xc000526f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000526fe0 sp=0xc000526f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000526fe8 sp=0xc000526fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 77 gp=0xc000373880 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c56366a6054?, 0x1?, 0xb4?, 0xe5?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000525f50 sp=0xc000525f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000525fe0 sp=0xc000525f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000525fe8 sp=0xc000525fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 100 gp=0xc00017ce00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x54?, 0x5a?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000524f50 sp=0xc000524f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000524fe0 sp=0xc000524f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000524fe8 sp=0xc000524fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 96 gp=0xc0004ff500 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f335b1f0?, 0x1?, 0x7b?, 0x86?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000523f50 sp=0xc000523f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000523fe0 sp=0xc000523f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000523fe8 sp=0xc000523fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 78 gp=0xc000373a40 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c56366ccd3a?, 0x1?, 0x60?, 0xc8?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000522f50 sp=0xc000522f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000522fe0 sp=0xc000522f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000522fe8 sp=0xc000522fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 97 gp=0xc0004ff6c0 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x3823b00?, 0x1?, 0xe2?, 0xff?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000521f50 sp=0xc000521f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000521fe0 sp=0xc000521f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000521fe8 sp=0xc000521fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 101 gp=0xc00017cfc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xe?, 0x32?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000520f50 sp=0xc000520f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000520fe0 sp=0xc000520f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000520fe8 sp=0xc000520fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 79 gp=0xc000373c00 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c563683d8e0?, 0x1?, 0x87?, 0xc6?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052ff50 sp=0xc00052ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052ffe0 sp=0xc00052ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052ffe8 sp=0xc00052ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 114 gp=0xc0004ff880 m=nil [GC worker (idle)]: runtime.gopark(0x4c5c55bfa87ad3?, 0x1?, 0x1b?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052ef50 sp=0xc00052ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052efe0 sp=0xc00052ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052efe8 sp=0xc00052efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 115 gp=0xc0004ffa40 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f33640ca?, 0x1?, 0x32?, 0x32?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052df50 sp=0xc00052df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052dfe0 sp=0xc00052df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052dfe8 sp=0xc00052dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 116 gp=0xc0004ffc00 m=nil [GC worker (idle), 2 minutes]: runtime.gopark(0x4c5c39f336c8d8?, 0x1?, 0x6c?, 0x10?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052cf50 sp=0xc00052cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052cfe0 sp=0xc00052cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052cfe8 sp=0xc00052cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 102 gp=0xc000202700 m=nil [sync.Cond.Wait, 26 minutes]: runtime.gopark(0xc00014fcd8?, 0x13a854e?, 0x91?, 0x9b?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014fcb8 sp=0xc00014fc98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000200ed8, 0x0) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00014fd08 sp=0xc00014fcb8 pc=0x1392439 sync.(*Cond).Wait(0xc000200ec8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc00014fd38 sp=0xc00014fd08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000200808) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc00014fdf0 sp=0xc00014fd38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000200808) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc00014ffc0 sp=0xc00014fdf0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc00014ffe0 sp=0xc00014ffc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014ffe8 sp=0xc00014ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 103 gp=0xc000202a80 m=nil [chan receive]: runtime.gopark(0xc000295380?, 0x22b52c0?, 0x40?, 0x2a?, 0xc00eb3c3c0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000285ef8 sp=0xc000285ed8 pc=0x135be4e runtime.chanrecv(0xc00018e420, 0xc000285fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x36d fp=0xc000285f70 sp=0xc000285ef8 pc=0x13251ed runtime.chanrecv2(0xc0002028c0?, 0x34b880?) GOROOT/src/runtime/chan.go:447 +0x12 fp=0xc000285f98 sp=0xc000285f70 pc=0x1324e72 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:336 +0x5b fp=0xc000285fe0 sp=0xc000285f98 pc=0x22b5bfb runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000285fe8 sp=0xc000285fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess in goroutine 1 pkg/sentry/platform/systrap/subprocess.go:333 +0x550 goroutine 80 gp=0xc00017d180 m=nil [sleep]: runtime.gopark(0x4c5c569434a5bf?, 0x1399bc9?, 0xb0?, 0x1f?, 0x16b7594?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000151f80 sp=0xc000151f60 pc=0x135be4e time.Sleep(0x61a80) GOROOT/src/runtime/time.go:195 +0x115 fp=0xc000151fc0 sp=0xc000151f80 pc=0x13930f5 gvisor.dev/gvisor/pkg/sentry/platform/systrap.controlFastPath() pkg/sentry/platform/systrap/metrics.go:263 +0x25 fp=0xc000151fe0 sp=0xc000151fc0 pc=0x22af865 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000151fe8 sp=0xc000151fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.New.func2 in goroutine 1 pkg/sentry/platform/systrap/systrap.go:346 +0x25 goroutine 81 gp=0xc00017d340 m=nil [sync.Cond.Wait]: runtime.gopark(0xc0004adcd8?, 0x13a854e?, 0x91?, 0x9b?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004adcb8 sp=0xc0004adc98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc0001816d8, 0x14d4b) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc0004add08 sp=0xc0004adcb8 pc=0x1392439 sync.(*Cond).Wait(0xc0001816c8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc0004add38 sp=0xc0004add08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000181008) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc0004addf0 sp=0xc0004add38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000181008) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc0004adfc0 sp=0xc0004addf0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc0004adfe0 sp=0xc0004adfc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004adfe8 sp=0xc0004adfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 130 gp=0xc00017d500 m=nil [select]: runtime.gopark(0xc00099ffb0?, 0x2?, 0xc0?, 0xe0?, 0xc00099ff04?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00099fd80 sp=0xc00099fd60 pc=0x135be4e runtime.selectgo(0xc00099ffb0, 0xc00099ff00, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x865 fp=0xc00099fed0 sp=0xc00099fd80 pc=0x136f3e5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x2ba fp=0xc00099ffe0 sp=0xc00099fed0 pc=0x1d4229a runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00099ffe8 sp=0xc00099ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater in goroutine 1 pkg/sentry/kernel/timekeeper.go:224 +0x16d goroutine 131 gp=0xc00017d6c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744038?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004abde8 sp=0xc0004abdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744038, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004abe18 sp=0xc0004abde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004abe88 sp=0xc0004abe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004abeb0 sp=0xc0004abe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744008, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004abfb0 sp=0xc0004abeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004abfe0 sp=0xc0004abfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004abfe8 sp=0xc0004abfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 132 gp=0xc00017d880 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007440c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004acde8 sp=0xc0004acdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007440c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004ace18 sp=0xc0004acde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007440b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004ace88 sp=0xc0004ace18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007440b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004aceb0 sp=0xc0004ace88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744098, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004acfb0 sp=0xc0004aceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004acfe0 sp=0xc0004acfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004acfe8 sp=0xc0004acfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 133 gp=0xc00017da40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744158?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000547de8 sp=0xc000547dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744158, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000547e18 sp=0xc000547de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000547e88 sp=0xc000547e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000547eb0 sp=0xc000547e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744128, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000547fb0 sp=0xc000547eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000547fe0 sp=0xc000547fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000547fe8 sp=0xc000547fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 134 gp=0xc00017dc00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007441e8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000546de8 sp=0xc000546dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007441e8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000546e18 sp=0xc000546de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007441d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000546e88 sp=0xc000546e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007441d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000546eb0 sp=0xc000546e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007441b8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000546fb0 sp=0xc000546eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000546fe0 sp=0xc000546fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000546fe8 sp=0xc000546fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 135 gp=0xc00017ddc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744278?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000548de8 sp=0xc000548dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744278, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000548e18 sp=0xc000548de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000548e88 sp=0xc000548e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000548eb0 sp=0xc000548e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744248, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000548fb0 sp=0xc000548eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000548fe0 sp=0xc000548fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000548fe8 sp=0xc000548fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 136 gp=0xc000373dc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744308?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00054ede8 sp=0xc00054edc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744308, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00054ee18 sp=0xc00054ede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007442f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00054ee88 sp=0xc00054ee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007442f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00054eeb0 sp=0xc00054ee88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007442d8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00054efb0 sp=0xc00054eeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00054efe0 sp=0xc00054efb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00054efe8 sp=0xc00054efe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 137 gp=0xc0004ffdc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744398?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000549de8 sp=0xc000549dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744398, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000549e18 sp=0xc000549de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000549e88 sp=0xc000549e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000549eb0 sp=0xc000549e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744368, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000549fb0 sp=0xc000549eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000549fe0 sp=0xc000549fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000549fe8 sp=0xc000549fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 138 gp=0xc000532380 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744428?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00054fde8 sp=0xc00054fdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744428, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00054fe18 sp=0xc00054fde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00054fe88 sp=0xc00054fe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00054feb0 sp=0xc00054fe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007443f8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00054ffb0 sp=0xc00054feb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00054ffe0 sp=0xc00054ffb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00054ffe8 sp=0xc00054ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 139 gp=0xc000532540 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007444b8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000550de8 sp=0xc000550dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007444b8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000550e18 sp=0xc000550de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007444a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000550e88 sp=0xc000550e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007444a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000550eb0 sp=0xc000550e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744488, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000550fb0 sp=0xc000550eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000550fe0 sp=0xc000550fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000550fe8 sp=0xc000550fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 140 gp=0xc000532700 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744548?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b6de8 sp=0xc0004b6dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744548, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b6e18 sp=0xc0004b6de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b6e88 sp=0xc0004b6e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b6eb0 sp=0xc0004b6e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744518, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b6fb0 sp=0xc0004b6eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b6fe0 sp=0xc0004b6fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b6fe8 sp=0xc0004b6fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 141 gp=0xc0005328c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007445d8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000551de8 sp=0xc000551dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007445d8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000551e18 sp=0xc000551de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007445c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000551e88 sp=0xc000551e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007445c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000551eb0 sp=0xc000551e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007445a8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000551fb0 sp=0xc000551eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000551fe0 sp=0xc000551fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000551fe8 sp=0xc000551fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 142 gp=0xc000532a80 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744668?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b8de8 sp=0xc0004b8dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744668, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b8e18 sp=0xc0004b8de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b8e88 sp=0xc0004b8e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b8eb0 sp=0xc0004b8e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744638, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b8fb0 sp=0xc0004b8eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b8fe0 sp=0xc0004b8fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b8fe8 sp=0xc0004b8fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 143 gp=0xc000532c40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007446f8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b7de8 sp=0xc0004b7dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007446f8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b7e18 sp=0xc0004b7de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007446e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b7e88 sp=0xc0004b7e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007446e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b7eb0 sp=0xc0004b7e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007446c8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b7fb0 sp=0xc0004b7eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b7fe0 sp=0xc0004b7fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b7fe8 sp=0xc0004b7fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 144 gp=0xc000532e00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744788?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b9de8 sp=0xc0004b9dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744788, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b9e18 sp=0xc0004b9de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b9e88 sp=0xc0004b9e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b9eb0 sp=0xc0004b9e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744758, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b9fb0 sp=0xc0004b9eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b9fe0 sp=0xc0004b9fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b9fe8 sp=0xc0004b9fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 145 gp=0xc000532fc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744818?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060cde8 sp=0xc00060cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744818, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00060ce18 sp=0xc00060cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00060ce88 sp=0xc00060ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00060ceb0 sp=0xc00060ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007447e8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00060cfb0 sp=0xc00060ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00060cfe0 sp=0xc00060cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060cfe8 sp=0xc00060cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 146 gp=0xc000533180 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007448a8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060ade8 sp=0xc00060adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007448a8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00060ae18 sp=0xc00060ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00060ae88 sp=0xc00060ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00060aeb0 sp=0xc00060ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744878, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00060afb0 sp=0xc00060aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00060afe0 sp=0xc00060afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060afe8 sp=0xc00060afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 147 gp=0xc000533340 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744938?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060bde8 sp=0xc00060bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744938, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00060be18 sp=0xc00060bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00060be88 sp=0xc00060be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00060beb0 sp=0xc00060be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744908, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00060bfb0 sp=0xc00060beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00060bfe0 sp=0xc00060bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060bfe8 sp=0xc00060bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 148 gp=0xc000533500 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007449c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061ade8 sp=0xc00061adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007449c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00061ae18 sp=0xc00061ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007449b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00061ae88 sp=0xc00061ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007449b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00061aeb0 sp=0xc00061ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744998, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00061afb0 sp=0xc00061aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00061afe0 sp=0xc00061afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061afe8 sp=0xc00061afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 149 gp=0xc0005336c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744a58?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060dde8 sp=0xc00060ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744a58, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00060de18 sp=0xc00060dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744a40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00060de88 sp=0xc00060de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744a40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00060deb0 sp=0xc00060de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744a28, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00060dfb0 sp=0xc00060deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00060dfe0 sp=0xc00060dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060dfe8 sp=0xc00060dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 150 gp=0xc000533880 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744ae8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061bde8 sp=0xc00061bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744ae8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00061be18 sp=0xc00061bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744ad0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00061be88 sp=0xc00061be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744ad0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00061beb0 sp=0xc00061be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744ab8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00061bfb0 sp=0xc00061beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00061bfe0 sp=0xc00061bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061bfe8 sp=0xc00061bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 151 gp=0xc000533a40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744b78?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061cde8 sp=0xc00061cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744b78, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00061ce18 sp=0xc00061cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744b60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00061ce88 sp=0xc00061ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744b60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00061ceb0 sp=0xc00061ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744b48, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00061cfb0 sp=0xc00061ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00061cfe0 sp=0xc00061cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061cfe8 sp=0xc00061cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 152 gp=0xc000533c00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744c08?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004aade8 sp=0xc0004aadc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744c08, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004aae18 sp=0xc0004aade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744bf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004aae88 sp=0xc0004aae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744bf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004aaeb0 sp=0xc0004aae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744bd8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004aafb0 sp=0xc0004aaeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004aafe0 sp=0xc0004aafb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004aafe8 sp=0xc0004aafe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 153 gp=0xc000533dc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744c98?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061dde8 sp=0xc00061ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744c98, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00061de18 sp=0xc00061dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744c80, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00061de88 sp=0xc00061de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744c80, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00061deb0 sp=0xc00061de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744c68, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00061dfb0 sp=0xc00061deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00061dfe0 sp=0xc00061dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061dfe8 sp=0xc00061dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 154 gp=0xc000340380 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744d28?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b3de8 sp=0xc0004b3dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744d28, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b3e18 sp=0xc0004b3de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744d10, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b3e88 sp=0xc0004b3e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744d10, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b3eb0 sp=0xc0004b3e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744cf8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b3fb0 sp=0xc0004b3eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b3fe0 sp=0xc0004b3fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b3fe8 sp=0xc0004b3fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 155 gp=0xc000340540 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744db8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b4de8 sp=0xc0004b4dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744db8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b4e18 sp=0xc0004b4de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744da0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b4e88 sp=0xc0004b4e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744da0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b4eb0 sp=0xc0004b4e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744d88, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b4fb0 sp=0xc0004b4eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b4fe0 sp=0xc0004b4fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b4fe8 sp=0xc0004b4fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 156 gp=0xc000340700 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744e48?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000606de8 sp=0xc000606dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744e48, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000606e18 sp=0xc000606de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744e30, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000606e88 sp=0xc000606e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744e30, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000606eb0 sp=0xc000606e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744e18, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000606fb0 sp=0xc000606eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000606fe0 sp=0xc000606fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000606fe8 sp=0xc000606fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 157 gp=0xc0003408c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744ed8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b5de8 sp=0xc0004b5dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744ed8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b5e18 sp=0xc0004b5de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744ec0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b5e88 sp=0xc0004b5e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744ec0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b5eb0 sp=0xc0004b5e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744ea8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b5fb0 sp=0xc0004b5eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b5fe0 sp=0xc0004b5fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b5fe8 sp=0xc0004b5fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 158 gp=0xc00075a000 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744f68?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000607de8 sp=0xc000607dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744f68, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000607e18 sp=0xc000607de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744f50, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000607e88 sp=0xc000607e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744f50, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000607eb0 sp=0xc000607e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744f38, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000607fb0 sp=0xc000607eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000607fe0 sp=0xc000607fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000607fe8 sp=0xc000607fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 159 gp=0xc00075a1c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000744ff8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b2de8 sp=0xc0004b2dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000744ff8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004b2e18 sp=0xc0004b2de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000744fe0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004b2e88 sp=0xc0004b2e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000744fe0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004b2eb0 sp=0xc0004b2e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000744fc8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004b2fb0 sp=0xc0004b2eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004b2fe0 sp=0xc0004b2fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b2fe8 sp=0xc0004b2fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 160 gp=0xc00075a380 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745088?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056ede8 sp=0xc00056edc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745088, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056ee18 sp=0xc00056ede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745070, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056ee88 sp=0xc00056ee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745070, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056eeb0 sp=0xc00056ee88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745058, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056efb0 sp=0xc00056eeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056efe0 sp=0xc00056efb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056efe8 sp=0xc00056efe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 161 gp=0xc00075a540 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745118?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056dde8 sp=0xc00056ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745118, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056de18 sp=0xc00056dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745100, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056de88 sp=0xc00056de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745100, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056deb0 sp=0xc00056de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007450e8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056dfb0 sp=0xc00056deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056dfe0 sp=0xc00056dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056dfe8 sp=0xc00056dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 162 gp=0xc00075a700 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007451a8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056cde8 sp=0xc00056cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007451a8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056ce18 sp=0xc00056cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745190, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056ce88 sp=0xc00056ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745190, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056ceb0 sp=0xc00056ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745178, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056cfb0 sp=0xc00056ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056cfe0 sp=0xc00056cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056cfe8 sp=0xc00056cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 163 gp=0xc00075a8c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745238?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00062ade8 sp=0xc00062adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745238, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00062ae18 sp=0xc00062ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745220, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00062ae88 sp=0xc00062ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745220, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00062aeb0 sp=0xc00062ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745208, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00062afb0 sp=0xc00062aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00062afe0 sp=0xc00062afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00062afe8 sp=0xc00062afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 164 gp=0xc00075aa80 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007452c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056fde8 sp=0xc00056fdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007452c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056fe18 sp=0xc00056fde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007452b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056fe88 sp=0xc00056fe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007452b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056feb0 sp=0xc00056fe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745298, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056ffb0 sp=0xc00056feb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056ffe0 sp=0xc00056ffb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056ffe8 sp=0xc00056ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 165 gp=0xc00075ac40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745358?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000568de8 sp=0xc000568dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745358, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000568e18 sp=0xc000568de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745340, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000568e88 sp=0xc000568e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745340, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000568eb0 sp=0xc000568e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745328, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000568fb0 sp=0xc000568eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000568fe0 sp=0xc000568fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000568fe8 sp=0xc000568fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 166 gp=0xc00075ae00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007453e8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000660de8 sp=0xc000660dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007453e8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000660e18 sp=0xc000660de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007453d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000660e88 sp=0xc000660e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007453d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000660eb0 sp=0xc000660e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007453b8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000660fb0 sp=0xc000660eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000660fe0 sp=0xc000660fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000660fe8 sp=0xc000660fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 167 gp=0xc00075afc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745478?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00062cde8 sp=0xc00062cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745478, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00062ce18 sp=0xc00062cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745460, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00062ce88 sp=0xc00062ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745460, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00062ceb0 sp=0xc00062ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745448, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00062cfb0 sp=0xc00062ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00062cfe0 sp=0xc00062cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00062cfe8 sp=0xc00062cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 168 gp=0xc00075b180 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745508?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00062bde8 sp=0xc00062bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745508, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00062be18 sp=0xc00062bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007454f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00062be88 sp=0xc00062be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007454f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00062beb0 sp=0xc00062be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007454d8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00062bfb0 sp=0xc00062beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00062bfe0 sp=0xc00062bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00062bfe8 sp=0xc00062bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 169 gp=0xc00075b340 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745598?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000565de8 sp=0xc000565dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745598, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000565e18 sp=0xc000565de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745580, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000565e88 sp=0xc000565e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745580, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000565eb0 sp=0xc000565e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745568, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000565fb0 sp=0xc000565eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000565fe0 sp=0xc000565fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000565fe8 sp=0xc000565fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 170 gp=0xc00075b500 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745628?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00062dde8 sp=0xc00062ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745628, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00062de18 sp=0xc00062dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745610, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00062de88 sp=0xc00062de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745610, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00062deb0 sp=0xc00062de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007455f8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00062dfb0 sp=0xc00062deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00062dfe0 sp=0xc00062dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00062dfe8 sp=0xc00062dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 171 gp=0xc00075b6c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007456b8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000611de8 sp=0xc000611dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007456b8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000611e18 sp=0xc000611de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007456a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000611e88 sp=0xc000611e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007456a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000611eb0 sp=0xc000611e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745688, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000611fb0 sp=0xc000611eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000611fe0 sp=0xc000611fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000611fe8 sp=0xc000611fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 172 gp=0xc00075b880 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745748?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000629de8 sp=0xc000629dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745748, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000629e18 sp=0xc000629de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745730, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000629e88 sp=0xc000629e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745730, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000629eb0 sp=0xc000629e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745718, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000629fb0 sp=0xc000629eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000629fe0 sp=0xc000629fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000629fe8 sp=0xc000629fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 173 gp=0xc00075ba40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007457d8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000628de8 sp=0xc000628dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007457d8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000628e18 sp=0xc000628de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007457c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000628e88 sp=0xc000628e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007457c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000628eb0 sp=0xc000628e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007457a8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000628fb0 sp=0xc000628eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000628fe0 sp=0xc000628fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000628fe8 sp=0xc000628fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 174 gp=0xc00075bc00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745868?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000664de8 sp=0xc000664dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745868, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000664e18 sp=0xc000664de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745850, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000664e88 sp=0xc000664e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745850, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000664eb0 sp=0xc000664e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745838, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000664fb0 sp=0xc000664eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000664fe0 sp=0xc000664fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000664fe8 sp=0xc000664fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 175 gp=0xc00075bdc0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc0007458f8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000564de8 sp=0xc000564dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc0007458f8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000564e18 sp=0xc000564de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0007458e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000564e88 sp=0xc000564e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0007458e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000564eb0 sp=0xc000564e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007458c8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000564fb0 sp=0xc000564eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000564fe0 sp=0xc000564fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000564fe8 sp=0xc000564fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 176 gp=0xc00076a000 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745988?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052ade8 sp=0xc00052adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745988, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00052ae18 sp=0xc00052ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745970, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00052ae88 sp=0xc00052ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745970, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00052aeb0 sp=0xc00052ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745958, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00052afb0 sp=0xc00052aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00052afe0 sp=0xc00052afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052afe8 sp=0xc00052afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 177 gp=0xc00076a1c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745a18?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000560de8 sp=0xc000560dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745a18, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000560e18 sp=0xc000560de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745a00, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000560e88 sp=0xc000560e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745a00, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000560eb0 sp=0xc000560e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0007459e8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000560fb0 sp=0xc000560eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000560fe0 sp=0xc000560fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000560fe8 sp=0xc000560fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 178 gp=0xc00076a380 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745aa8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000153de8 sp=0xc000153dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745aa8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000153e18 sp=0xc000153de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745a90, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000153e88 sp=0xc000153e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745a90, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000153eb0 sp=0xc000153e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745a78, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000153fb0 sp=0xc000153eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000153fe0 sp=0xc000153fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000153fe8 sp=0xc000153fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 179 gp=0xc00076a540 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745b38?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000529de8 sp=0xc000529dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745b38, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000529e18 sp=0xc000529de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745b20, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000529e88 sp=0xc000529e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745b20, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000529eb0 sp=0xc000529e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745b08, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000529fb0 sp=0xc000529eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000529fe0 sp=0xc000529fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000529fe8 sp=0xc000529fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 180 gp=0xc00076a700 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745bc8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052bde8 sp=0xc00052bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745bc8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00052be18 sp=0xc00052bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745bb0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00052be88 sp=0xc00052be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745bb0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00052beb0 sp=0xc00052be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745b98, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00052bfb0 sp=0xc00052beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00052bfe0 sp=0xc00052bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052bfe8 sp=0xc00052bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 181 gp=0xc00076a8c0 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745c58?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053ade8 sp=0xc00053adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745c58, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00053ae18 sp=0xc00053ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745c40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00053ae88 sp=0xc00053ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745c40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00053aeb0 sp=0xc00053ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745c28, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00053afb0 sp=0xc00053aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00053afe0 sp=0xc00053afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00053afe8 sp=0xc00053afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 182 gp=0xc00076aa80 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745ce8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053cde8 sp=0xc00053cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745ce8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00053ce18 sp=0xc00053cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745cd0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00053ce88 sp=0xc00053ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745cd0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00053ceb0 sp=0xc00053ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745cb8, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00053cfb0 sp=0xc00053ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00053cfe0 sp=0xc00053cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00053cfe8 sp=0xc00053cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 183 gp=0xc00076ac40 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745d78?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053dde8 sp=0xc00053ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745d78, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00053de18 sp=0xc00053dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745d60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00053de88 sp=0xc00053de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745d60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00053deb0 sp=0xc00053de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc000745d48, 0xc0001d61f8) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00053dfb0 sp=0xc00053deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00053dfe0 sp=0xc00053dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00053dfe8 sp=0xc00053dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 184 gp=0xc00076ae00 m=nil [select, 26 minutes]: runtime.gopark(0x53f4e0?, 0xc000745e08?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053ede8 sp=0xc00053edc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc000745e08, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00053ee18 sp=0xc00053ede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc000745df0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00053ee88 sp=0xc00053ee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc000745df0, 0x1, 0x0) pkg/sleep/ VM DIAGNOSIS: I0318 14:42:33.202290 236934 main.go:194] **************** gVisor **************** I0318 14:42:33.202364 236934 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 236934, PPID 971561, UID 0, GID 0 D0318 14:42:33.202417 236934 main.go:196] Page size: 0x1000 (4096 bytes) I0318 14:42:33.202473 236934 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0318 14:42:33.202538 236934 config.go:395] Platform: systrap I0318 14:42:33.202586 236934 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0318 14:42:33.202619 236934 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 14:42:33.202644 236934 config.go:398] Network: sandbox I0318 14:42:33.202665 236934 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 14:42:33.202701 236934 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0318 14:42:33.202734 236934 config.go:418] Config.Traceback (--traceback): system D0318 14:42:33.202782 236934 config.go:418] Config.Debug (--debug): true D0318 14:42:33.202808 236934 config.go:418] Config.LogFilename (--log): (empty) D0318 14:42:33.202831 236934 config.go:418] Config.LogFormat (--log-format): text D0318 14:42:33.202865 236934 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 14:42:33.202946 236934 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 14:42:33.203016 236934 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 14:42:33.203059 236934 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 14:42:33.203087 236934 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 14:42:33.203117 236934 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 14:42:33.203161 236934 config.go:418] Config.FileAccess (--file-access): shared D0318 14:42:33.203207 236934 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 14:42:33.203228 236934 config.go:418] Config.Overlay (--overlay): false D0318 14:42:33.203272 236934 config.go:418] Config.Overlay2 (--overlay2): none D0318 14:42:33.203320 236934 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 14:42:33.203342 236934 config.go:418] Config.HostUDS (--host-uds): none D0318 14:42:33.203394 236934 config.go:418] Config.HostFifo (--host-fifo): none D0318 14:42:33.203425 236934 config.go:418] Config.Network (--network): sandbox D0318 14:42:33.203475 236934 config.go:418] Config.EnableRaw (--net-raw): true D0318 14:42:33.203517 236934 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 14:42:33.203550 236934 config.go:418] Config.HostGSO (--gso): false D0318 14:42:33.203578 236934 config.go:418] Config.GvisorGSO (--software-gso): true D0318 14:42:33.203650 236934 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 14:42:33.203691 236934 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 14:42:33.203721 236934 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 14:42:33.203754 236934 config.go:418] Config.QDisc (--qdisc): fifo D0318 14:42:33.203804 236934 config.go:418] Config.LogPackets (--log-packets): false D0318 14:42:33.203825 236934 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 14:42:33.203859 236934 config.go:418] Config.Platform (--platform): systrap D0318 14:42:33.203905 236934 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 14:42:33.203947 236934 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 14:42:33.203987 236934 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 14:42:33.204006 236934 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 14:42:33.204038 236934 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 14:42:33.204069 236934 config.go:418] Config.Strace (--strace): false D0318 14:42:33.204101 236934 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 14:42:33.204142 236934 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 14:42:33.204194 236934 config.go:418] Config.StraceEvent (--strace-event): false D0318 14:42:33.204255 236934 config.go:420] Config.DisableSeccomp: false D0318 14:42:33.204298 236934 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 14:42:33.204318 236934 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 14:42:33.204365 236934 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 14:42:33.204406 236934 config.go:418] Config.ProfileEnable (--profile): false D0318 14:42:33.219988 236934 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 14:42:33.220084 236934 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 14:42:33.220111 236934 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 14:42:33.220135 236934 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 14:42:33.220197 236934 config.go:418] Config.TraceFile (--trace): (empty) D0318 14:42:33.220222 236934 config.go:420] Config.RestoreFile: (empty) D0318 14:42:33.220274 236934 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0318 14:42:33.220339 236934 config.go:418] Config.Rootless (--rootless): false D0318 14:42:33.220371 236934 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 14:42:33.220425 236934 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 14:42:33.220505 236934 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 14:42:33.220538 236934 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 14:42:33.220590 236934 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 14:42:33.220621 236934 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 14:42:33.220658 236934 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 14:42:33.220690 236934 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 14:42:33.220722 236934 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 14:42:33.220746 236934 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 14:42:33.220781 236934 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 14:42:33.220812 236934 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 14:42:33.220843 236934 config.go:418] Config.DCache (--dcache): -1 D0318 14:42:33.220865 236934 config.go:418] Config.IOUring (--iouring): false D0318 14:42:33.220904 236934 config.go:418] Config.DirectFS (--directfs): true D0318 14:42:33.220925 236934 config.go:418] Config.NVProxy (--nvproxy): false D0318 14:42:33.220971 236934 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 14:42:33.221003 236934 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 14:42:33.221027 236934 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0318 14:42:33.221051 236934 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 14:42:33.221100 236934 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 14:42:33.221126 236934 config.go:420] Config.explicitlySet: (unexported) D0318 14:42:33.221158 236934 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 14:42:33.221204 236934 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 14:42:33.221240 236934 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 14:42:33.221268 236934 main.go:199] **************** gVisor **************** W0318 14:42:33.221306 236934 main.go:214] Block the TERM signal. This is only safe in tests! D0318 14:42:33.221414 236934 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 14:42:33.227873 236934 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-0", PID: 182129 Found sandbox "ci-gvisor-systrap-1-race-0", PID: 182129 I0318 14:42:33.227976 236934 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 14:42:33.228018 236934 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0318 14:42:33.228063 236934 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0318 14:42:33.228286 236934 urpc.go:568] urpc: successfully marshalled 36 bytes. W0318 14:42:33.370804 236934 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0318 14:42:33.371114 236934 main.go:235] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0318 14:42:33.202290 236934 main.go:194] **************** gVisor **************** I0318 14:42:33.202364 236934 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 236934, PPID 971561, UID 0, GID 0 D0318 14:42:33.202417 236934 main.go:196] Page size: 0x1000 (4096 bytes) I0318 14:42:33.202473 236934 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0318 14:42:33.202538 236934 config.go:395] Platform: systrap I0318 14:42:33.202586 236934 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0318 14:42:33.202619 236934 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 14:42:33.202644 236934 config.go:398] Network: sandbox I0318 14:42:33.202665 236934 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 14:42:33.202701 236934 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0318 14:42:33.202734 236934 config.go:418] Config.Traceback (--traceback): system D0318 14:42:33.202782 236934 config.go:418] Config.Debug (--debug): true D0318 14:42:33.202808 236934 config.go:418] Config.LogFilename (--log): (empty) D0318 14:42:33.202831 236934 config.go:418] Config.LogFormat (--log-format): text D0318 14:42:33.202865 236934 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 14:42:33.202946 236934 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 14:42:33.203016 236934 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 14:42:33.203059 236934 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 14:42:33.203087 236934 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 14:42:33.203117 236934 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 14:42:33.203161 236934 config.go:418] Config.FileAccess (--file-access): shared D0318 14:42:33.203207 236934 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 14:42:33.203228 236934 config.go:418] Config.Overlay (--overlay): false D0318 14:42:33.203272 236934 config.go:418] Config.Overlay2 (--overlay2): none D0318 14:42:33.203320 236934 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 14:42:33.203342 236934 config.go:418] Config.HostUDS (--host-uds): none D0318 14:42:33.203394 236934 config.go:418] Config.HostFifo (--host-fifo): none D0318 14:42:33.203425 236934 config.go:418] Config.Network (--network): sandbox D0318 14:42:33.203475 236934 config.go:418] Config.EnableRaw (--net-raw): true D0318 14:42:33.203517 236934 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 14:42:33.203550 236934 config.go:418] Config.HostGSO (--gso): false D0318 14:42:33.203578 236934 config.go:418] Config.GvisorGSO (--software-gso): true D0318 14:42:33.203650 236934 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 14:42:33.203691 236934 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 14:42:33.203721 236934 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 14:42:33.203754 236934 config.go:418] Config.QDisc (--qdisc): fifo D0318 14:42:33.203804 236934 config.go:418] Config.LogPackets (--log-packets): false D0318 14:42:33.203825 236934 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 14:42:33.203859 236934 config.go:418] Config.Platform (--platform): systrap D0318 14:42:33.203905 236934 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 14:42:33.203947 236934 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 14:42:33.203987 236934 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 14:42:33.204006 236934 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 14:42:33.204038 236934 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 14:42:33.204069 236934 config.go:418] Config.Strace (--strace): false D0318 14:42:33.204101 236934 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 14:42:33.204142 236934 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 14:42:33.204194 236934 config.go:418] Config.StraceEvent (--strace-event): false D0318 14:42:33.204255 236934 config.go:420] Config.DisableSeccomp: false D0318 14:42:33.204298 236934 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 14:42:33.204318 236934 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 14:42:33.204365 236934 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 14:42:33.204406 236934 config.go:418] Config.ProfileEnable (--profile): false D0318 14:42:33.219988 236934 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 14:42:33.220084 236934 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 14:42:33.220111 236934 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 14:42:33.220135 236934 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 14:42:33.220197 236934 config.go:418] Config.TraceFile (--trace): (empty) D0318 14:42:33.220222 236934 config.go:420] Config.RestoreFile: (empty) D0318 14:42:33.220274 236934 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0318 14:42:33.220339 236934 config.go:418] Config.Rootless (--rootless): false D0318 14:42:33.220371 236934 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 14:42:33.220425 236934 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 14:42:33.220505 236934 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 14:42:33.220538 236934 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 14:42:33.220590 236934 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 14:42:33.220621 236934 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 14:42:33.220658 236934 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 14:42:33.220690 236934 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 14:42:33.220722 236934 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 14:42:33.220746 236934 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 14:42:33.220781 236934 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 14:42:33.220812 236934 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 14:42:33.220843 236934 config.go:418] Config.DCache (--dcache): -1 D0318 14:42:33.220865 236934 config.go:418] Config.IOUring (--iouring): false D0318 14:42:33.220904 236934 config.go:418] Config.DirectFS (--directfs): true D0318 14:42:33.220925 236934 config.go:418] Config.NVProxy (--nvproxy): false D0318 14:42:33.220971 236934 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 14:42:33.221003 236934 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 14:42:33.221027 236934 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0318 14:42:33.221051 236934 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 14:42:33.221100 236934 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 14:42:33.221126 236934 config.go:420] Config.explicitlySet: (unexported) D0318 14:42:33.221158 236934 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 14:42:33.221204 236934 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 14:42:33.221240 236934 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 14:42:33.221268 236934 main.go:199] **************** gVisor **************** W0318 14:42:33.221306 236934 main.go:214] Block the TERM signal. This is only safe in tests! D0318 14:42:33.221414 236934 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 14:42:33.227873 236934 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-0", PID: 182129 Found sandbox "ci-gvisor-systrap-1-race-0", PID: 182129 I0318 14:42:33.227976 236934 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 14:42:33.228018 236934 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0318 14:42:33.228063 236934 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0318 14:42:33.228286 236934 urpc.go:568] urpc: successfully marshalled 36 bytes. W0318 14:42:33.370804 236934 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0318 14:42:33.371114 236934 main.go:235] Failure to execute command, err: 1 [21397765.351439] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397766.121406] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826062 di:ffffffffff600000 [21397771.920714] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13a7ccab9 cs:33 sp:7f929d250858 ax:0 si:55d13a826097 di:ffffffffff600000 [21397776.639037] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397780.822094] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397781.374624] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397800.313757] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98097 di:ffffffffff600000 [21397802.851844] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b90d3eab9 cs:33 sp:7fe417eee858 ax:0 si:560b90d98062 di:ffffffffff600000 [21397810.655752] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397821.019555] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12097 di:ffffffffff600000 [21397831.948269] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397855.428454] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397862.965047] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397863.030160] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397865.652612] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397865.704976] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12062 di:ffffffffff600000 [21397866.165339] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56027dbb8ab9 cs:33 sp:7fd923bfe858 ax:0 si:56027dc12097 di:ffffffffff600000 [21397873.019651] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.077431] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.499066] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397873.662074] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397876.157394] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397877.640542] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a097 di:ffffffffff600000 [21397878.604339] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397880.854365] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397890.731469] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a097 di:ffffffffff600000 [21397895.207596] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397895.394418] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397896.846851] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397899.332168] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223b5c0ab9 cs:33 sp:7fe341ccc858 ax:0 si:56223b61a062 di:ffffffffff600000 [21397904.224804] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397909.260467] exe[915413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397912.900116] exe[906367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f097 di:ffffffffff600000 [21397914.458931] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397918.676248] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f097 di:ffffffffff600000 [21397926.791966] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561260515ab9 cs:33 sp:7f11b1dd9858 ax:0 si:56126056f062 di:ffffffffff600000 [21397929.764076] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ce1a3ab9 cs:33 sp:7f988bb68858 ax:0 si:5630ce1fd062 di:ffffffffff600000 [21397932.691532] exe[905303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ce1a3ab9 cs:33 sp:7f988bb68858 ax:0 si:5630ce1fd062 di:ffffffffff600000 [21397936.741892] exe[906359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc0c46aab9 cs:33 sp:7fb44efaf858 ax:0 si:55cc0c4c4062 di:ffffffffff600000 [21397959.088116] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397959.479077] exe[909619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529097 di:ffffffffff600000 [21397961.092137] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397961.141677] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397965.472293] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397965.794524] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397970.316847] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397977.303954] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397988.856525] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112c4cfab9 cs:33 sp:7fb005323858 ax:0 si:56112c529062 di:ffffffffff600000 [21397992.895246] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397993.474018] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397994.672182] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397995.370586] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397998.509114] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21397999.097402] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398004.652367] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398005.822769] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398010.233407] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398019.816600] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398024.560947] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398027.082538] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398029.995529] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398031.415068] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeebffe858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398036.504710] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398038.692880] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398041.310780] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398042.807549] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398050.278331] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398053.328506] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398056.078518] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398056.591283] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398057.324940] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398059.468670] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398060.452820] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.122231] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.422229] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398064.120038] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398065.323679] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.568477] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.699841] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.133494] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.245468] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.611918] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398070.653220] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398071.929764] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398075.354630] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398078.375672] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398084.365188] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.503944] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.975525] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398089.660740] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398100.814762] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398103.149891] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398108.126400] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398109.727655] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398114.926120] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398115.326643] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398116.464738] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398117.363072] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398118.107760] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398119.056651] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b070 di:ffffffffff600000 [21398122.811183] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398126.709936] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398128.976124] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398134.017772] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398138.986826] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398144.595270] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398147.740445] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398153.836628] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe097 di:ffffffffff600000 [21398154.429724] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398170.354252] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398178.833978] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398179.226311] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398194.626602] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae097 di:ffffffffff600000 [21398200.237249] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398201.652049] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398207.656925] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.429069] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.585670] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.999123] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398213.090744] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398234.875538] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398236.383763] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.310888] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.880938] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398250.215371] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398250.957948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398254.226072] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398255.486365] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398260.434278] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398265.469418] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398269.051341] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398269.513840] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398271.673795] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398272.616789] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398273.924585] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398277.831892] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398286.091207] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398286.137692] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398288.818879] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398291.251585] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398292.528986] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398293.177860] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398296.876293] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398297.547492] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398303.631253] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398307.056962] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398309.191658] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398309.256834] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398310.586312] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398316.366362] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398317.114740] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398318.757589] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398321.659757] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.031872] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.950021] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398326.802881] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398330.243521] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.305590] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.625216] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398336.307442] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398338.072993] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.348139] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.998434] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398344.165955] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398347.141159] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398347.996114] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398350.871793] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398351.358950] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398352.559626] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398355.862755] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398357.894524] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398359.037982] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398361.795239] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398365.856348] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.587949] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.853704] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398371.898448] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398372.115864] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398373.950137] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398380.153091] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398382.247312] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398388.417898] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398390.819601] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398391.851429] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398392.556223] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398395.937836] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398397.879860] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86097 di:ffffffffff600000 [21398410.692769] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398410.873139] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398414.429586] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398416.832172] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.769695] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.823843] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398418.987019] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398419.473838] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398420.029058] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398420.590705] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398421.664358] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398422.062997] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398423.355332] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d070 di:ffffffffff600000 [21398423.399659] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398435.438023] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.342008] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.775508] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398442.909284] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398447.142962] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398449.414905] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398449.675703] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398452.943792] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398457.970324] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398458.895332] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398459.102871] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398460.653358] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398461.032711] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398469.852084] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398470.306389] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398471.635083] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398473.905666] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398482.377237] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398483.473645] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398490.798263] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398491.655735] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398493.644298] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b097 di:ffffffffff600000 [21398495.354436] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398495.575138] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.144003] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.384895] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398498.502754] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.566138] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.792158] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d097 di:ffffffffff600000 [21398512.025224] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398531.302715] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398534.970820] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398535.280932] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398543.585555] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398545.214698] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398546.360752] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398560.002814] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398561.384622] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398566.765734] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398568.382722] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398573.910780] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.592856] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.729631] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398585.216202] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398585.367089] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398587.445412] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398592.713622] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398595.091456] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398596.476278] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398597.609836] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398598.430066] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398605.961078] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398607.712645] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398609.806570] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398610.415356] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.477826] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.705753] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.445433] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.690695] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398621.232556] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398626.661156] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df1f57fab9 cs:33 sp:7f8da8a50858 ax:0 si:55df1f5d9062 di:ffffffffff600000 [21398630.483392] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398630.892451] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398639.672951] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398641.355657] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398642.977955] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398649.503938] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c097 di:ffffffffff600000 [21398654.613690] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398656.518746] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398666.979397] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398672.940849] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398673.373469] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398681.792107] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564701ea5ab9 cs:33 sp:7f8aaa8b5858 ax:0 si:564701eff062 di:ffffffffff600000 [21398682.106959] potentially unexpected fatal signal 11. [21398682.112304] CPU: 28 PID: 909380 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21398682.124303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21398682.133947] RIP: 0033:0x55681398537b [21398682.137962] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21398682.158516] RSP: 002b:00007f8b97ad7310 EFLAGS: 00010246 [21398682.165529] RAX: 00007f8b97ad7470 RBX: 00007f8b97ad7470 RCX: 0000000000000000 [21398682.174464] RDX: 00007f8036200060 RSI: 00007f8b97ad74c8 RDI: 00007f8b97ad74f0 [21398682.183403] RBP: 0000000000000000 R08: 00007f8036200060 R09: 0000556813af9f8c [21398682.192347] R10: 0000000000000003 R11: 00000000861c4acb R12: 0000556813af9f80 [21398682.201251] R13: 0000000000000fb1 R14: 0000556813af9f80 R15: 00007f8b97ad7418 [21398682.208818] FS: 000055681462a480 GS: 0000000000000000 [21398688.469808] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398693.037605] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398702.194713] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398710.043239] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398720.138552] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.118726] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.189979] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.646165] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398727.364473] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398730.909567] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398732.822003] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398738.484195] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398753.504467] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398755.454272] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.693842] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.876725] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c070 di:ffffffffff600000 [21398761.144052] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398766.354293] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398766.948637] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398770.526159] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398772.258971] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.267631] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.936585] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398777.605674] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398785.006056] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398787.272278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398790.315248] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398795.006207] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398802.709150] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398803.152280] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398806.960399] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.442765] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398813.543113] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.588291] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398816.108351] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e070 di:ffffffffff600000 [21398819.510701] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398822.086794] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398825.279353] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398827.875294] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398833.471502] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398834.007493] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398838.257933] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.568493] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.736517] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398844.289394] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398844.478750] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398845.084800] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398847.776510] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398852.854948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398853.662208] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398855.796453] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.306851] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.992590] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398860.047102] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398867.837647] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398868.157084] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398869.159569] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.276511] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.516084] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398872.871370] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398880.544066] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad93f858 ax:0 si:56036391d062 di:ffffffffff600000 [21398882.615843] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398889.278068] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398891.327216] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d070 di:ffffffffff600000 [21398898.351531] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398899.643748] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398900.387933] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398905.131201] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398906.568340] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398907.062596] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398908.887368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398910.039620] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398918.651580] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398922.763615] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398926.051639] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398926.965741] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398931.233754] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398933.516824] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398938.282766] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398938.510930] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398941.718603] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398951.421801] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398955.367753] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398964.774783] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.270411] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.793308] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.486799] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.748600] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398973.815991] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398973.974935] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398977.339076] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398981.906985] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398987.076348] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398989.808064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398998.778280] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.038186] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.609367] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399007.952091] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399014.293434] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.195113] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.993219] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399022.538759] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399023.539016] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d070 di:ffffffffff600000 [21399024.064283] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399032.398231] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399038.736236] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399040.711896] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.141077] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.320658] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.365757] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.528291] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399054.209238] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399057.839233] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.242500] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399059.305399] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.835945] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399060.302776] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399062.273940] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399062.412432] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.348920] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.836985] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399068.992600] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399069.248037] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399077.389152] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399086.551390] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399087.302079] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399089.269778] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399090.747161] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399093.678934] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399104.558244] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399105.486050] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399107.430062] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399110.506404] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399130.767649] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399134.325405] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399134.630746] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399136.972718] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399137.143270] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399139.500776] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.308162] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.436491] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399149.607720] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399151.351347] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399153.803069] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399154.225697] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.047011] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.833942] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399165.845832] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399173.464281] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399177.155108] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399180.613675] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399186.980096] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399189.987004] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399190.754030] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399191.095139] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399192.116478] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399196.294677] potentially unexpected fatal signal 5. [21399196.299912] CPU: 28 PID: 885408 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399196.311911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399196.321541] RIP: 0033:0x7fffffffe062 [21399196.325616] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399196.345046] RSP: 002b:000000c00079fb90 EFLAGS: 00000297 [21399196.350665] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399196.358215] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399196.365800] RBP: 000000c00079fc28 R08: 0000000000000000 R09: 0000000000000000 [21399196.374738] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00079fc18 [21399196.383691] R13: 000000c0006b5f20 R14: 000000c000183dc0 R15: 00000000000d5f38 [21399196.392621] FS: 000000c00013b098 GS: 0000000000000000 [21399200.924914] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399201.041167] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399203.423036] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399212.866385] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399217.630931] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399218.390790] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.650383] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.915711] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399221.518377] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399223.339394] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.488421] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f456858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.998793] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399227.546945] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2097 di:ffffffffff600000 [21399229.460700] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399234.888808] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399236.072167] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399240.012586] exe[956779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9966f4ab9 cs:33 sp:7ea3b8555858 ax:0 si:55c99674e062 di:ffffffffff600000 [21399240.663828] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399249.645510] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399253.931457] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399254.731181] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399260.717195] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399261.115293] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399268.721351] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399270.122457] potentially unexpected fatal signal 11. [21399270.127758] CPU: 26 PID: 951648 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399270.139748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399270.149372] RIP: 0033:0x5557bcd52a80 [21399270.153350] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21399270.172558] RSP: 002b:00007f8d9e0d4440 EFLAGS: 00010246 [21399270.178223] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005557bcd52e0d [21399270.185811] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00005557bd9b4760 [21399270.194743] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21399270.203702] R10: 00005557bd9b4750 R11: 0000000000000246 R12: 0000000000000000 [21399270.212626] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21399270.221553] FS: 00005557bd9b4480 GS: 0000000000000000 [21399276.420819] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399278.667253] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.685345] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.851553] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399280.137711] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.695975] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.940461] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.616527] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.667318] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399302.127576] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399302.964924] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399306.096773] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399307.520031] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399308.341015] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399317.260377] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399319.791665] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399321.164678] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399322.882547] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399323.140915] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3070 di:ffffffffff600000 [21399323.875742] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399324.072451] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399325.346682] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399329.463261] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399335.923837] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399336.311887] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebdb858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399344.961236] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399347.269115] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399349.967714] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399355.310746] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399370.633200] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399372.575499] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399393.829970] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399394.009671] exe[905356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399395.887831] exe[928043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399410.451276] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399417.878270] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399418.189927] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399428.562115] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399431.170662] exe[915411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399431.903956] exe[905597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399435.570559] exe[905565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399445.928136] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399447.329820] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399457.831724] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399460.681308] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399465.454483] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399471.470256] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399471.957576] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399481.118974] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399482.331198] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399484.263582] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399488.709041] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d097 di:ffffffffff600000 [21399491.094927] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399494.307349] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399495.569879] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399501.295848] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399508.951979] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399511.721391] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399517.796815] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399519.663252] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d070 di:ffffffffff600000 [21399524.464590] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399525.817562] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399531.992311] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399534.946173] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399535.794097] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399538.995823] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399541.298332] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399542.939719] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399543.525277] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.064117] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.611028] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399549.323477] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399552.156071] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399559.043889] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399569.932242] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399580.245121] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399582.416356] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba097 di:ffffffffff600000 [21399582.692839] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399585.863069] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399595.342932] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399601.139307] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399603.729357] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399611.049638] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399613.219724] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399616.521352] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399625.870233] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399627.339355] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399628.622866] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399629.820018] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399630.096202] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399633.755013] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399638.321565] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399639.606616] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399642.078994] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399645.440263] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399648.464012] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399653.127322] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399661.414583] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399665.892639] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399667.731240] potentially unexpected fatal signal 5. [21399667.736591] CPU: 48 PID: 943669 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399667.748584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399667.758195] RIP: 0033:0x7fffffffe062 [21399667.762158] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399667.781400] RSP: 002b:000000c0001dfb90 EFLAGS: 00000297 [21399667.787068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399667.796019] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399667.804946] RBP: 000000c0001dfc28 R08: 0000000000000000 R09: 0000000000000000 [21399667.813874] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001dfc18 [21399667.822803] R13: 000000c0001cdf20 R14: 000000c0002d2540 R15: 00000000000e602b [21399667.830365] FS: 000000c000580098 GS: 0000000000000000 [21399670.736599] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399672.299353] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b55888858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.175869] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.338143] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399680.790774] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.258589] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.695687] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399696.346278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399696.424588] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399697.722008] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399699.115785] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6097 di:ffffffffff600000 [21399700.269625] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399709.360394] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399711.609643] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399714.276681] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399717.935817] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.258943] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.913226] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399730.481543] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399731.830888] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399734.760199] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.828482] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.877164] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399738.159386] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399747.593790] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399748.864602] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399749.389031] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399755.306022] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399760.273045] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399761.678984] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399762.194726] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399769.639869] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.176304] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.568845] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399775.876698] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399780.700260] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399781.439600] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29070 di:ffffffffff600000 [21399781.574301] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399781.889933] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399784.328506] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399788.282433] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399800.444940] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399810.764150] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399810.872863] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399811.258678] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399813.396152] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399823.666158] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399824.943269] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399825.002685] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727097 di:ffffffffff600000 [21399825.785587] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399827.998037] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399831.811778] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399832.496978] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736097 di:ffffffffff600000 [21399833.890697] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399841.854827] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399842.557399] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399847.198660] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399848.680239] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399849.719862] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399850.761088] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399852.118759] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399852.869143] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399854.091810] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399855.394587] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399857.283340] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399860.654064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399867.652385] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399868.959124] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399871.210482] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399879.120138] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399882.745559] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399886.157885] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399891.386825] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399902.067359] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399912.170315] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399912.238663] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.103314] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.209832] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399929.912955] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399929.968328] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399931.265499] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399934.705360] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399935.210167] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399944.679296] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399945.836845] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399949.510426] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399949.617116] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399952.777859] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399953.117078] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.580339] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.976693] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.757684] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.846057] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399958.660140] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5097 di:ffffffffff600000 [21399961.334210] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399962.566470] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399963.181402] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399968.101729] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399969.550254] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399971.611650] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399976.495031] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399978.395878] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399980.162700] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399983.441542] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.490085] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.918294] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399992.365538] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399996.829233] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21400006.028020] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30097 di:ffffffffff600000 [21400006.386534] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400006.436553] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400010.090497] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.048368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.682588] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.049570] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.367599] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.497971] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400025.498886] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400027.014174] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.553012] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.944828] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400034.182832] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400036.973661] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400039.319684] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400107.653737] exe[959279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce0cacb237 cs:33 sp:7edbf24d5ef8 ax:2f700000 si:55ce0cb392f7 di:ffffffffff600000 [21400267.948866] potentially unexpected fatal signal 11. [21400267.954192] CPU: 82 PID: 980016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400267.966192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400267.975839] RIP: 0033:0x55fa6b33e0e9 [21400267.979819] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21400267.999085] RSP: 002b:00007f894adaf448 EFLAGS: 00010213 [21400268.004733] RAX: 0000000000000016 RBX: 000055fa6b3883b9 RCX: 000055fa6b33e0d7 [21400268.012291] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f894adb05c0 [21400268.019860] RBP: 00007f894adb059c R08: 0000000027927554 R09: 00000000000000c8 [21400268.029415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f894adb05c0 [21400268.038331] R13: 000055fa6b3883b9 R14: 0000000000018912 R15: 0000000000000002 [21400268.045910] FS: 000055fa6bf9b480 GS: 0000000000000000 [21400358.896744] exe[963136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558de269ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400359.036532] exe[961057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c262addb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400919.035079] potentially unexpected fatal signal 5. [21400919.040305] CPU: 48 PID: 995945 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400919.052327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400919.061978] RIP: 0033:0x7fffffffe062 [21400919.066018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21400919.086641] RSP: 002b:000000c0004cdb90 EFLAGS: 00000297 [21400919.093604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21400919.102531] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000555d07c00000 [21400919.111559] RBP: 000000c0004cdc28 R08: 0000000000000000 R09: 0000000000000000 [21400919.120474] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004cdc18 [21400919.129433] R13: 000000c0004f2ab0 R14: 000000c0004ada40 R15: 00000000000f2a59 [21400919.138346] FS: 000000c000180098 GS: 0000000000000000 [21401651.886459] exe[988289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e64d9ab9 cs:33 sp:7f53882d6858 ax:0 si:5589e6533062 di:ffffffffff600000 [21401950.865701] potentially unexpected fatal signal 5. [21401950.870946] CPU: 30 PID: 948115 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21401950.882962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21401950.892637] RIP: 0033:0x7fffffffe062 [21401950.896637] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21401950.917247] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [21401950.924235] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21401950.933191] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21401950.942095] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [21401950.951037] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [21401950.959929] R13: 000000c0005d3f50 R14: 000000c0001656c0 R15: 00000000000e4c60 [21401950.968874] FS: 000000c00013b098 GS: 0000000000000000 [21402267.266628] exe[928606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6abc2aab9 cs:33 sp:7f011d6f7ef8 ax:0 si:20000100 di:ffffffffff600000 [21402894.686778] exe[30428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b014ec1ab9 cs:33 sp:7fabd77fe858 ax:0 si:55b014f1b062 di:ffffffffff600000 [21402979.388559] exe[30319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e4e10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80800000 [21403385.838442] exe[40126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc43c9ab9 cs:33 sp:7f88a3b75858 ax:0 si:560fc4423062 di:ffffffffff600000 [21404179.602119] exe[981064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563962c30ab9 cs:33 sp:7f8e9e0baef8 ax:0 si:20000100 di:ffffffffff600000 [21404468.042989] potentially unexpected fatal signal 11. [21404468.048308] CPU: 11 PID: 39799 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.060392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.070041] RIP: 0033:0x56451ecab0d0 [21404468.074091] Code: 68 05 00 00 00 e9 70 ff ff ff ff 25 8a 3f 15 00 68 18 00 00 00 e9 60 ff ff ff ff 25 82 3f 15 00 68 04 00 00 00 e9 50 ff ff ff 25 7a 3f 15 00 68 03 00 00 00 e9 40 ff ff ff ff 25 72 3f 15 00 [21404468.093328] RSP: 002b:00007feeb4061d78 EFLAGS: 00010246 [21404468.100893] RAX: 00007feeb4062480 RBX: 00007feeb40622e0 RCX: 0000000000000000 [21404468.109813] RDX: 00007feeb4062460 RSI: 0000000000000025 RDI: 000056451ed50390 [21404468.118817] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.127801] R10: 0000000000000000 R11: 0000000000000246 R12: 000056451ed50390 [21404468.137074] R13: 00007feeb4062460 R14: 0000000000000000 R15: 00007feeb40622e0 [21404468.145984] FS: 000056451f962480 GS: 0000000000000000 [21404468.166362] potentially unexpected fatal signal 11. [21404468.173256] CPU: 75 PID: 46770 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.186581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.197641] RIP: 0033:0x55dd5d726a1f [21404468.203080] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21404468.223654] RSP: 002b:00007f96ce12ed78 EFLAGS: 00010283 [21404468.230713] RAX: 0000000000000390 RBX: 00007f96ce12f2e0 RCX: 0000000000000000 [21404468.239683] RDX: 00007f96ce12f460 RSI: 0000000000000025 RDI: 000055dd5d786390 [21404468.248621] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.257566] R10: 0000000000000000 R11: 0000000000000246 R12: 000055dd5d786390 [21404468.266491] R13: 00007f96ce12f460 R14: 0000000000000000 R15: 00007f96ce12f2e0 [21404468.275462] FS: 000055dd5e398480 GS: 0000000000000000 [21404584.235595] potentially unexpected fatal signal 5. [21404584.240865] CPU: 82 PID: 66986 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404584.252794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404584.262434] RIP: 0033:0x7fffffffe062 [21404584.266472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21404584.285669] RSP: 002b:000000c0004a7b90 EFLAGS: 00000297 [21404584.291344] RAX: 0000563b2a8f9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21404584.300259] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000563b2a8f9000 [21404584.309268] RBP: 000000c0004a7c28 R08: 0000000000000009 R09: 000000000d2a5000 [21404584.318194] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0004a7c18 [21404584.327116] R13: 000000c000300f60 R14: 000000c000516540 R15: 000000000000ff63 [21404584.336066] FS: 000000c0004da098 GS: 0000000000000000 [21405224.403174] exe[72601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d1dbaab9 cs:33 sp:7f81d8c3fef8 ax:0 si:200013c0 di:ffffffffff600000 [21405505.198744] exe[71092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.350332] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.430998] exe[70529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.467104] exe[71643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377bc858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.470001] exe[70642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.590081] exe[72792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.695080] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.910677] exe[72607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.994240] exe[70639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405506.075811] exe[70772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405671.605990] potentially unexpected fatal signal 5. [21405671.611224] CPU: 20 PID: 71114 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21405671.623132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21405671.632781] RIP: 0033:0x7fffffffe062 [21405671.636809] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21405671.656007] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [21405671.663037] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21405671.670588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21405671.678139] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [21405671.685678] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [21405671.693331] R13: 000000c00002ab10 R14: 000000c000165a40 R15: 00000000000112ac [21405671.702265] FS: 000000c000180098 GS: 0000000000000000 [21406247.479852] warn_bad_vsyscall: 1 callbacks suppressed [21406247.479857] exe[61396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a0d745db1 cs:33 sp:ffffffffff600010 ax:0 si:ffffffffff600010 di:0 [21406672.952160] exe[109753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5927a6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:e8902000 [21406828.467490] exe[80436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a2365237 cs:33 sp:7ea7c4160ef8 ax:2f700000 si:55e2a23d32f7 di:ffffffffff600000 [21406828.550975] exe[74205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fc2c8a237 cs:33 sp:7ec91270aef8 ax:2f700000 si:557fc2cf82f7 di:ffffffffff600000 [21407145.638672] potentially unexpected fatal signal 5. [21407145.643918] CPU: 20 PID: 117093 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21407145.655893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21407145.665526] RIP: 0033:0x7fffffffe062 [21407145.669556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21407145.690119] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21407145.697155] RAX: 000055b7f414a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21407145.706062] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000055b7f414a000 [21407145.714973] RBP: 000000c0005fbc28 R08: 0000000000000009 R09: 000000000b0da000 [21407145.723881] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005fbc18 [21407145.732799] R13: 000000c00063ff50 R14: 000000c0004ae700 R15: 000000000001bf17 [21407145.741700] FS: 0000000001f6c6b0 GS: 0000000000000000 [21407309.151218] exe[93818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631cc65bab9 cs:33 sp:7f56ce496858 ax:0 si:5631cc6b5097 di:ffffffffff600000 [21407504.435163] exe[80267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b9755237 cs:33 sp:7fe0fc55eef8 ax:2f700000 si:55c5b97c32f7 di:ffffffffff600000 [21407609.119472] exe[74196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169a068ab9 cs:33 sp:7eb34fbfe858 ax:0 si:56169a0c2097 di:ffffffffff600000 [21407609.185560] exe[79066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a21cab9 cs:33 sp:7ecb9a4ae858 ax:0 si:55f03a276097 di:ffffffffff600000 [21408173.940746] exe[144391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abfdfe2ab9 cs:33 sp:7ebf70245ef8 ax:0 si:20006dc0 di:ffffffffff600000 [21408233.874309] exe[108817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a41c6ab9 cs:33 sp:7f76f606e858 ax:0 si:5623a4220062 di:ffffffffff600000 [21408238.236050] exe[152198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581b2b6fab9 cs:33 sp:7fe655250858 ax:0 si:5581b2bc9062 di:ffffffffff600000 [21409098.156763] potentially unexpected fatal signal 5. [21409098.161987] CPU: 11 PID: 163726 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.173956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.183568] RIP: 0033:0x7fffffffe062 [21409098.187566] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409098.206771] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21409098.213816] RAX: 000055b2570a1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409098.222708] RDX: 0000000000000003 RSI: 000000000015f000 RDI: 000055b2570a1000 [21409098.231691] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000e258000 [21409098.240563] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21409098.249493] R13: 000000c000181008 R14: 000000c00058a380 R15: 00000000000152f5 [21409098.258406] FS: 00007f44d4ff96c0 GS: 0000000000000000 [21409098.366349] potentially unexpected fatal signal 11. [21409098.372055] CPU: 55 PID: 87102 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.385354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.396356] RIP: 0033:0x55a52f4900e9 [21409098.401710] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21409098.422284] RSP: 002b:00007f4b50abd448 EFLAGS: 00010213 [21409098.429359] RAX: 0000000000000016 RBX: 000055a52f4da3b9 RCX: 000055a52f4900d7 [21409098.438345] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f4b50abe5c0 [21409098.447262] RBP: 00007f4b50abe59c R08: 0000000028f1e7f8 R09: 0000000000001ab4 [21409098.456179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b50abe5c0 [21409098.465161] R13: 000055a52f4da3b9 R14: 000000000036ed1d R15: 0000000000000002 [21409098.474045] FS: 000055a5300ed480 GS: 0000000000000000 [21409178.283661] potentially unexpected fatal signal 5. [21409178.288914] CPU: 72 PID: 129276 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409178.300910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409178.310532] RIP: 0033:0x7fffffffe062 [21409178.314511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409178.333725] RSP: 002b:000000c000567b90 EFLAGS: 00000297 [21409178.339364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409178.346909] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21409178.354503] RBP: 000000c000567c28 R08: 0000000000000000 R09: 0000000000000000 [21409178.362046] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000567c18 [21409178.369606] R13: 000000c0005703c0 R14: 000000c0001c36c0 R15: 0000000000015df7 [21409178.377190] FS: 0000000001f6c6b0 GS: 0000000000000000 [21410695.578703] exe[209437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b195ebcab9 cs:33 sp:7f844f463ef8 ax:0 si:20000140 di:ffffffffff600000 [21410745.179272] exe[215759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8ef29fab9 cs:33 sp:7f7ddc9feef8 ax:0 si:20000140 di:ffffffffff600000 [21410847.804242] exe[217676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d5cdb6ab9 cs:33 sp:7ea0051ecef8 ax:0 si:20000140 di:ffffffffff600000 [21410918.586677] exe[225895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b67ec8bab9 cs:33 sp:7ff69cdfeef8 ax:0 si:20000140 di:ffffffffff600000 [21410939.443332] exe[231251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f94bdab9 cs:33 sp:7f6dcbd44ef8 ax:0 si:20000140 di:ffffffffff600000 [21410963.291288] exe[228003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e0399ab9 cs:33 sp:7ee7e0fa2ef8 ax:0 si:20000140 di:ffffffffff600000 [21410977.914153] exe[234939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4ada35ab9 cs:33 sp:7ff625524ef8 ax:0 si:20000140 di:ffffffffff600000 [21411015.800054] exe[231292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639d0a9aab9 cs:33 sp:7fec5dc80ef8 ax:0 si:20000140 di:ffffffffff600000 [21411079.323173] exe[236966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642e4282ab9 cs:33 sp:7fce88b80ef8 ax:0 si:20000140 di:ffffffffff600000 [21412580.277588] exe[237259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629192e4237 cs:33 sp:7eac6eea6ef8 ax:2f700000 si:5629193522f7 di:ffffffffff600000 [21413091.444697] exe[271381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e8a450ab9 cs:33 sp:7effb33feef8 ax:0 si:20000140 di:ffffffffff600000 [21413094.547093] exe[272360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f3a9a1ab9 cs:33 sp:7f26beb25858 ax:0 si:558f3a9fb062 di:ffffffffff600000 [21413677.566332] potentially unexpected fatal signal 5. [21413677.571569] CPU: 27 PID: 283136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21413677.583551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21413677.593215] RIP: 0033:0x7fffffffe062 [21413677.597206] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21413677.616461] RSP: 002b:000000c000605b90 EFLAGS: 00000297 [21413677.622093] RAX: 000055f510639000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21413677.629653] RDX: 0000000000000001 RSI: 00000000001c7000 RDI: 000055f510639000 [21413677.638585] RBP: 000000c000605c28 R08: 0000000000000009 R09: 0000000014b94000 [21413677.647527] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000605c18 [21413677.656441] R13: 000000c0005fe150 R14: 000000c00017c8c0 R15: 0000000000043406 [21413677.664021] FS: 0000000001f6c6b0 GS: 0000000000000000 [21413874.031603] exe[227076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a7c081237 cs:33 sp:7ed56a10eef8 ax:2f700000 si:563a7c0ef2f7 di:ffffffffff600000 [21414181.873992] potentially unexpected fatal signal 5. [21414181.879201] CPU: 93 PID: 230861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21414181.891197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21414181.900818] RIP: 0033:0x7fffffffe062 [21414181.904788] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21414181.923967] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21414181.929583] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21414181.937128] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000056252a200000 [21414181.944723] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21414181.953634] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21414181.961221] R13: 000000c00017c008 R14: 000000c000588540 R15: 0000000000037ab8 [21414181.970154] FS: 00007feeb4b5a6c0 GS: 0000000000000000 [21414226.844684] exe[234963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563733e07237 cs:33 sp:7f69d93faef8 ax:2f700000 si:563733e752f7 di:ffffffffff600000 [21414374.531922] exe[290459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3e9963ab9 cs:33 sp:7fb827593ef8 ax:0 si:20000140 di:ffffffffff600000 [21414467.498144] exe[300889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a855fa8ab9 cs:33 sp:7f4a31072858 ax:0 si:55a856002062 di:ffffffffff600000 [21414819.731107] exe[313252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b4bc0ab9 cs:33 sp:7eeb93c37ef8 ax:0 si:20000040 di:ffffffffff600000 [21415079.281734] exe[327751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcaae4ab9 cs:33 sp:7f9e03a34858 ax:0 si:555bcab3e097 di:ffffffffff600000 [21415470.366210] exe[299675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56495b2e3237 cs:33 sp:7eca0fe3def8 ax:2f700000 si:56495b3512f7 di:ffffffffff600000 [21415688.076592] exe[311738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564057a6fab9 cs:33 sp:7ec9287feef8 ax:0 si:20000140 di:ffffffffff600000 [21415914.905283] exe[272401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e08999ab9 cs:33 sp:7f4d913c5ef8 ax:0 si:20000140 di:ffffffffff600000 [21416086.539575] exe[343301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6b353ab9 cs:33 sp:7f361c279858 ax:0 si:558d6b3ad097 di:ffffffffff600000 [21416313.855746] exe[334477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648d88aab9 cs:33 sp:7fe1398a0ef8 ax:0 si:20000040 di:ffffffffff600000 [21416476.302322] exe[299449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f41ca43ab9 cs:33 sp:7ec7eb74a858 ax:0 si:55f41ca9d070 di:ffffffffff600000 [21416992.346108] exe[343445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b011ad237 cs:33 sp:7fc51cd48ef8 ax:2f700000 si:555b0121b2f7 di:ffffffffff600000 [21416995.013634] exe[289231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef52f3e237 cs:33 sp:7f82bfee5ef8 ax:2f700000 si:55ef52fac2f7 di:ffffffffff600000 [21417004.315615] exe[361033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4a783d237 cs:33 sp:7f9c19decef8 ax:2f700000 si:55e4a78ab2f7 di:ffffffffff600000 [21417052.468372] exe[343142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56153fba7ab9 cs:33 sp:7fd13f3ec858 ax:0 si:56153fc01062 di:ffffffffff600000 [21417053.386610] exe[348835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562422cb4ab9 cs:33 sp:7f00818ec858 ax:0 si:562422d0e062 di:ffffffffff600000 [21417279.378515] exe[355136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56319d6c2237 cs:33 sp:7f663831fef8 ax:2f700000 si:56319d7302f7 di:ffffffffff600000 [21417282.068540] exe[359128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476ba3a237 cs:33 sp:7fc09bddbef8 ax:2f700000 si:56476baa82f7 di:ffffffffff600000 [21417354.242153] exe[309352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564824e0f237 cs:33 sp:7f4641071ef8 ax:2f700000 si:564824e7d2f7 di:ffffffffff600000 [21417358.958207] exe[298270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2506b237 cs:33 sp:7ebc3c70fef8 ax:2f700000 si:564e250d92f7 di:ffffffffff600000 [21417367.533780] exe[343241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc91188237 cs:33 sp:7f31d5a32ef8 ax:2f700000 si:55fc911f62f7 di:ffffffffff600000 [21417378.708841] exe[323581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a631963237 cs:33 sp:7ff60a738ef8 ax:2f700000 si:55a6319d12f7 di:ffffffffff600000 [21417394.174444] exe[343585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4d139237 cs:33 sp:7ed3ddde9ef8 ax:2f700000 si:55af4d1a72f7 di:ffffffffff600000 [21417446.157077] exe[317577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626fb3d9237 cs:33 sp:7ec69d503ef8 ax:2f700000 si:5626fb4472f7 di:ffffffffff600000 [21417645.408545] exe[337956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547af11ab9 cs:33 sp:7f414cd6e858 ax:0 si:56547af6b062 di:ffffffffff600000 [21417665.879520] potentially unexpected fatal signal 5. [21417665.884749] CPU: 41 PID: 355852 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417665.896750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417665.906417] RIP: 0033:0x7fffffffe062 [21417665.910395] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417665.929576] RSP: 002b:000000c0005cdb90 EFLAGS: 00000297 [21417665.935249] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417665.944151] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417665.951861] RBP: 000000c0005cdc28 R08: 0000000000000000 R09: 0000000000000000 [21417665.960783] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005cdc18 [21417665.968364] R13: 000000c0005e23c0 R14: 000000c000164a80 R15: 0000000000056cc2 [21417665.977303] FS: 0000000001f6c6b0 GS: 0000000000000000 [21417672.128457] potentially unexpected fatal signal 5. [21417672.133695] CPU: 94 PID: 356651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417672.145678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417672.155405] RIP: 0033:0x7fffffffe062 [21417672.159470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417672.180022] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21417672.187098] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417672.194717] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417672.203644] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21417672.212532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21417672.221459] R13: 000000c000030b10 R14: 000000c0004cddc0 R15: 0000000000056cc3 [21417672.230396] FS: 000000c000580098 GS: 0000000000000000 [21417795.857646] exe[372952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c1b74237 cs:33 sp:7fa71c89bef8 ax:2f700000 si:55e0c1be22f7 di:ffffffffff600000 [21417811.018308] exe[322365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a13dd237 cs:33 sp:7fd4ed19aef8 ax:2f700000 si:55d1a144b2f7 di:ffffffffff600000 [21418869.563407] potentially unexpected fatal signal 5. [21418869.568635] CPU: 84 PID: 400098 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418869.580633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418869.590266] RIP: 0033:0x7fffffffe062 [21418869.594253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418869.613440] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21418869.619084] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21418869.626670] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21418869.635703] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21418869.644638] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21418869.653678] R13: 000000c000030b10 R14: 000000c000492380 R15: 000000000005aaaa [21418869.662619] FS: 0000000001f6c6b0 GS: 0000000000000000 [21418882.881935] potentially unexpected fatal signal 11. [21418882.887258] CPU: 72 PID: 375225 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.899263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.908973] RIP: 0033:0x556abcfd4d97 [21418882.913013] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21418882.933675] RSP: 002b:00007fd6c974bc90 EFLAGS: 00010206 [21418882.935443] potentially unexpected fatal signal 5. [21418882.939296] RAX: 00007fd6c974c500 RBX: 00007fd6c974c1f0 RCX: 0000000000000000 [21418882.945894] CPU: 6 PID: 372495 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.945897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.945905] RIP: 0033:0x7fffffffe062 [21418882.945908] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418882.945909] RSP: 002b:000000c0005f9b90 EFLAGS: 00000297 [21418882.945911] RAX: 000000000006311e RBX: 0000000000000000 RCX: 00007fffffffe05a [21418882.945912] RDX: 0000000000000000 RSI: 000000c0005fa000 RDI: 0000000000012f00 [21418882.945913] RBP: 000000c0005f9c28 R08: 000000c000609a50 R09: 0000000000000000 [21418882.945914] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f9c18 [21418882.945915] R13: 000000c000601f50 R14: 000000c0004c6a80 R15: 000000000005aab0 [21418882.945920] FS: 000000c000180098 GS: 0000000000000000 [21418882.954792] RDX: 00007fd6c974c370 RSI: 0000556abd0573d8 RDI: 00007fd6c974c1f0 [21418882.954794] RBP: 00007fd6c974c2e0 R08: 0000000000000000 R09: 0000000000000000 [21418882.954795] R10: 0000000000001000 R11: 0000000000000293 R12: 0000556abd0573d8 [21418882.954796] R13: 00007fd6c974c370 R14: 0000000000000000 R15: 00007fd6c974c1f0 [21418882.954798] FS: 0000556abdc6a480 GS: 0000000000000000 [21418920.255201] exe[387465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639567da237 cs:33 sp:7fe1f9554ef8 ax:2f700000 si:5639568482f7 di:ffffffffff600000 [21419227.581174] exe[413105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f6c104ab9 cs:33 sp:7f64497afef8 ax:0 si:20000040 di:ffffffffff600000 [21419227.714228] exe[390319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c763cbab9 cs:33 sp:7fd90e2feef8 ax:0 si:20000040 di:ffffffffff600000 [21419496.098609] exe[399043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563659024ab9 cs:33 sp:7fe944867858 ax:0 si:56365907e097 di:ffffffffff600000 [21419627.711405] exe[410343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651cffdc237 cs:33 sp:7f98a7d88ef8 ax:2f700000 si:5651d004a2f7 di:ffffffffff600000 [21419952.928000] exe[382306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560619adc237 cs:33 sp:7f801e926ef8 ax:2f700000 si:560619b4a2f7 di:ffffffffff600000 [21420135.989010] exe[379783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee7e53ab9 cs:33 sp:7ff75390d858 ax:0 si:560ee7ead062 di:ffffffffff600000 [21420149.162911] exe[428734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d5b17ab9 cs:33 sp:7f0de753a858 ax:0 si:55f8d5b71062 di:ffffffffff600000 [21420165.434399] exe[392340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557601ea6ab9 cs:33 sp:7fb25bd89858 ax:0 si:557601f00062 di:ffffffffff600000 [21420182.749924] exe[439583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56311a977ab9 cs:33 sp:7f629cdf6858 ax:0 si:56311a9d1062 di:ffffffffff600000 [21420186.574670] exe[272414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146968cab9 cs:33 sp:7f365b6e1858 ax:0 si:5614696e6062 di:ffffffffff600000 [21420196.519938] exe[405618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583eed66ab9 cs:33 sp:7f60ca22a858 ax:0 si:5583eedc0062 di:ffffffffff600000 [21420204.480305] exe[399868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608e9f55ab9 cs:33 sp:7ed736ce9858 ax:0 si:5608e9faf062 di:ffffffffff600000 [21420232.163961] exe[432620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd834f9ab9 cs:33 sp:7eada6122858 ax:0 si:55bd83553062 di:ffffffffff600000 [21420329.551403] exe[429279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7f475ab9 cs:33 sp:7f354a725858 ax:0 si:55da7f4cf062 di:ffffffffff600000 [21420329.964186] exe[375874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557189982ab9 cs:33 sp:7fd2faada858 ax:0 si:5571899dc062 di:ffffffffff600000 [21420334.991102] exe[427890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563048d35ab9 cs:33 sp:7fd4a2c88858 ax:0 si:563048d8f062 di:ffffffffff600000 [21420349.544016] potentially unexpected fatal signal 5. [21420349.549265] CPU: 66 PID: 441220 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21420349.561260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21420349.570947] RIP: 0033:0x7fffffffe062 [21420349.574942] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21420349.595512] RSP: 002b:000000c000609b90 EFLAGS: 00000297 [21420349.602546] RAX: 0000557bf2c00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21420349.611481] RDX: 0000000000000001 RSI: 00000000000ef000 RDI: 0000557bf2c00000 [21420349.620409] RBP: 000000c000609c28 R08: 0000000000000009 R09: 0000000015b46000 [21420349.629368] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000609c18 [21420349.638329] R13: 000000c00040ee10 R14: 000000c000228540 R15: 000000000006a54e [21420349.645870] FS: 000000c00013a898 GS: 0000000000000000 [21420406.153110] exe[431787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565476397ab9 cs:33 sp:7ebd7759d858 ax:0 si:5654763f1062 di:ffffffffff600000 [21420479.492378] exe[443288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55805818aab9 cs:33 sp:7ef02d731858 ax:0 si:5580581e4062 di:ffffffffff600000 [21420659.373746] exe[442359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564a0308ab9 cs:33 sp:7ef018e96858 ax:0 si:5564a0362070 di:ffffffffff600000 [21421168.683021] exe[456523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56442ee92ab9 cs:33 sp:7f2a5a725ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.836524] exe[455536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.878803] exe[455534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421667.104325] exe[472591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615d9d47ab9 cs:33 sp:7f627e1f7858 ax:0 si:5615d9da1062 di:ffffffffff600000 [21421935.874941] exe[473074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eec7bcab9 cs:33 sp:7fa9107a7858 ax:0 si:563eec816062 di:ffffffffff600000 [21422389.181534] potentially unexpected fatal signal 5. [21422389.186781] CPU: 75 PID: 476143 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422389.198767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422389.208385] RIP: 0033:0x7fffffffe062 [21422389.212380] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422389.231586] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [21422389.237305] RAX: 00007fb37088a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422389.244877] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007fb37088a000 [21422389.253818] RBP: 000000c0005f1c28 R08: 0000000000000009 R09: 00000000045e0000 [21422389.262744] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005f1c18 [21422389.271675] R13: 000000c0005f9f50 R14: 000000c000521dc0 R15: 0000000000070eab [21422389.280603] FS: 000000c000180098 GS: 0000000000000000 [21422714.122087] potentially unexpected fatal signal 5. [21422714.127525] CPU: 46 PID: 475747 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422714.139553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422714.149183] RIP: 0033:0x7fffffffe062 [21422714.153174] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422714.172440] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21422714.179472] RAX: 0000563cb8b07000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422714.188406] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 0000563cb8b07000 [21422714.195965] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000c6ff000 [21422714.204894] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21422714.213825] R13: 0000000002883b00 R14: 000000c000478700 R15: 0000000000072300 [21422714.222794] FS: 0000000003ce43c0 GS: 0000000000000000 [21422781.815126] exe[480206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cca865fab9 cs:33 sp:7fa5b5798ef8 ax:0 si:20000100 di:ffffffffff600000 [21422781.862979] exe[473398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559370016ab9 cs:33 sp:7fea99afcef8 ax:0 si:20000100 di:ffffffffff600000 [21422782.432156] exe[501469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555858d47ab9 cs:33 sp:7f9ef4501ef8 ax:0 si:20000100 di:ffffffffff600000 [21422798.792530] exe[495270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d155300ab9 cs:33 sp:7f3b4d1feef8 ax:0 si:20000100 di:ffffffffff600000 [21422800.168510] exe[501598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e93e360ab9 cs:33 sp:7ee4e6dfeef8 ax:0 si:20000100 di:ffffffffff600000 [21422886.598314] exe[492672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561375d88ab9 cs:33 sp:7f8c0c350858 ax:0 si:561375de2097 di:ffffffffff600000 [21423064.075030] exe[500036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580178e6ab9 cs:33 sp:7eab8c981ef8 ax:0 si:20000100 di:ffffffffff600000 [21423115.423770] exe[507029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56125d61bab9 cs:33 sp:7fda9b15def8 ax:0 si:20000100 di:ffffffffff600000 [21423245.610238] exe[492162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa9c9bab9 cs:33 sp:7f8f23e9eef8 ax:0 si:20000100 di:ffffffffff600000 [21423253.973916] exe[503545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6c256ab9 cs:33 sp:7ead26e64ef8 ax:0 si:20000100 di:ffffffffff600000 [21423257.872556] exe[515379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e5fe17ab9 cs:33 sp:7f96765bcef8 ax:0 si:20000100 di:ffffffffff600000 [21423259.150903] exe[494752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f579554ab9 cs:33 sp:7f04f1882ef8 ax:0 si:20000100 di:ffffffffff600000 [21423260.857545] exe[515178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556ba768ab9 cs:33 sp:7f7be64ceef8 ax:0 si:20000100 di:ffffffffff600000 [21423774.494340] exe[533990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561211dc1ab9 cs:33 sp:7ff80f9feef8 ax:0 si:20000100 di:ffffffffff600000 [21423788.333423] exe[453563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1b1d8ab9 cs:33 sp:7fb2138ab858 ax:0 si:558d1b232097 di:ffffffffff600000 [21424176.137134] exe[543495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d064b99237 cs:33 sp:7eac176f5ef8 ax:2f700000 si:55d064c072f7 di:ffffffffff600000 [21424359.943496] exe[539219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6f9d14ab9 cs:33 sp:7ef3b70ff858 ax:0 si:55b6f9d6e062 di:ffffffffff600000 [21424737.360543] potentially unexpected fatal signal 11. [21424737.365844] CPU: 50 PID: 535063 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.371332] potentially unexpected fatal signal 11. [21424737.377836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383129] CPU: 15 PID: 531887 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.383131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383136] RIP: 0033:0x55821dacb37b [21424737.383139] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21424737.383140] RSP: 002b:00007fa94f4d0310 EFLAGS: 00010246 [21424737.383141] RAX: 00007fa94f4d0470 RBX: 00007fa94f4d0470 RCX: 0000000000000000 [21424737.383142] RDX: 00007f7d64c000a8 RSI: 00007fa94f4d04d0 RDI: 00007fa94f4d04f0 [21424737.383142] RBP: 0000000000000000 R08: 00007f7d64c000a8 R09: 000055821dc3ff8c [21424737.383143] R10: 0000000000000004 R11: 00000000861c4adb R12: 000055821dc3ff80 [21424737.383144] R13: 0000000000000af9 R14: 000055821dc3ff80 R15: 00007fa94f4d0418 [21424737.383144] FS: 000055821e770480 GS: 0000000000000000 [21424737.494775] RIP: 0033:0x556cd89cc6ac [21424737.500170] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21424737.520729] RSP: 002b:00007f7d130ae308 EFLAGS: 00010206 [21424737.527710] RAX: 0000000020000100 RBX: 00007f7d130ae418 RCX: 00007fad42400000 [21424737.536646] RDX: 0000000000000013 RSI: 00007fad42400020 RDI: 0000000020000100 [21424737.545567] RBP: 0000000000000001 R08: 00007fad42800000 R09: 000000000000083c [21424737.553101] R10: 00ab42c8fa2b88ab R11: 00000000861c4adb R12: 00007fad42400000 [21424737.562021] R13: fffffffffffffffe R14: 00007fad42400000 R15: 00007fad42400008 [21424737.570958] FS: 0000556cd964a480 GS: 0000000000000000 [21424814.428219] exe[484275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c97c069ab9 cs:33 sp:7f7e21294858 ax:0 si:55c97c0c3097 di:ffffffffff600000 [21424879.096426] exe[553983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e3d8b0ab9 cs:33 sp:7ed196e35ef8 ax:0 si:20000100 di:ffffffffff600000 [21424909.191034] exe[533584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e069feab9 cs:33 sp:7f71852b9858 ax:0 si:555e06a58062 di:ffffffffff600000 [21424977.742936] exe[554425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ce7185ab9 cs:33 sp:7f3da09bbef8 ax:0 si:20000100 di:ffffffffff600000 [21425077.834799] potentially unexpected fatal signal 5. [21425077.840013] CPU: 46 PID: 472772 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425077.851998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425077.861649] RIP: 0033:0x7fffffffe062 [21425077.865630] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425077.884864] RSP: 002b:000000c0007b7b90 EFLAGS: 00000297 [21425077.891873] RAX: 000056453acd9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425077.900803] RDX: 0000000000000003 RSI: 0000000000127000 RDI: 000056453acd9000 [21425077.909718] RBP: 000000c0007b7c28 R08: 0000000000000009 R09: 00000000104bc000 [21425077.918695] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0007b7c18 [21425077.927568] R13: 000000c0007c0b10 R14: 000000c0001b16c0 R15: 00000000000727c8 [21425077.936467] FS: 000000c000180098 GS: 0000000000000000 [21425179.152800] exe[481605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bf37d5ab9 cs:33 sp:7fd617363ef8 ax:0 si:20001080 di:ffffffffff600000 [21425260.659314] exe[565057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602369a4ab9 cs:33 sp:7ee53a0d2858 ax:0 si:5602369fe062 di:ffffffffff600000 [21425510.766958] potentially unexpected fatal signal 5. [21425510.772176] CPU: 26 PID: 569353 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425510.784159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425510.793829] RIP: 0033:0x7fffffffe062 [21425510.797817] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425510.817044] RSP: 002b:000000c0007fbbe8 EFLAGS: 00000297 [21425510.822738] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425510.831649] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21425510.839189] RBP: 000000c0007fbc80 R08: 0000000000000000 R09: 0000000000000000 [21425510.848259] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007fbc70 [21425510.857207] R13: 000000c00043b000 R14: 000000c000496fc0 R15: 0000000000074fc4 [21425510.866111] FS: 000000c00013a898 GS: 0000000000000000 [21425669.438140] exe[538951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425672.977026] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425673.088074] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319e94858 ax:0 si:561713c1d062 di:ffffffffff600000 [21426112.590278] potentially unexpected fatal signal 5. [21426112.595488] CPU: 95 PID: 544897 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21426112.607494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21426112.617283] RIP: 0033:0x7fffffffe062 [21426112.621259] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21426112.640544] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21426112.646224] RAX: 00007f81ef359000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21426112.655140] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f81ef359000 [21426112.664066] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000baec000 [21426112.673030] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21426112.681944] R13: 0000000002883b00 R14: 000000c000582700 R15: 0000000000081dfa [21426112.690890] FS: 00000000052e33c0 GS: 0000000000000000 [21426378.945349] exe[589220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5f9c41db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426378.996648] exe[586911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426379.008138] exe[589115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426828.608820] exe[581221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579927f3ab9 cs:33 sp:7f1bb05d1858 ax:0 si:55799284d062 di:ffffffffff600000 [21427735.979112] exe[594404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739392bab9 cs:33 sp:7ec64745f858 ax:0 si:557393985097 di:ffffffffff600000 [21427737.253852] potentially unexpected fatal signal 5. [21427737.259095] CPU: 90 PID: 542877 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21427737.271095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21427737.280736] RIP: 0033:0x7fffffffe062 [21427737.284763] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21427737.304013] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [21427737.311022] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21427737.319957] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21427737.328889] RBP: 000000c000209c28 R08: 0000000000000000 R09: 0000000000000000 [21427737.338169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000209c18 [21427737.347110] R13: 000000c0001b0b10 R14: 000000c00015ea80 R15: 0000000000084622 [21427737.356043] FS: 000000c00013b098 GS: 0000000000000000 [21428569.550553] potentially unexpected fatal signal 11. [21428569.555874] CPU: 25 PID: 608073 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428569.567878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428569.577520] RIP: 0033:0x564960a78a1f [21428569.581521] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21428569.600827] RSP: 002b:00007f7d1eb7dd78 EFLAGS: 00010283 [21428569.606476] RAX: 0000000000000390 RBX: 00007f7d1eb7e2e0 RCX: 0000000000000000 [21428569.614075] RDX: 00007f7d1eb7e460 RSI: 0000000000000025 RDI: 0000564960ad8390 [21428569.623087] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21428569.630629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000564960ad8390 [21428569.639573] R13: 00007f7d1eb7e460 R14: 0000000000000000 R15: 00007f7d1eb7e2e0 [21428569.648536] FS: 00005649616ea480 GS: 0000000000000000 [21428694.433657] potentially unexpected fatal signal 5. [21428694.439009] CPU: 24 PID: 629512 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.447321] potentially unexpected fatal signal 11. [21428694.450994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456298] CPU: 42 PID: 625503 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.456300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456305] RIP: 0033:0x7fadfe9ed20b [21428694.456308] Code: 48 89 16 48 69 d2 00 ca 9a 3b 49 29 d0 4c 89 46 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 48 89 fe 48 8d 0d f5 dd ff ff <48> 8b 39 83 e7 fe 48 8b 59 08 4c 8b 41 18 4c 8b 51 10 4c 8b 59 20 [21428694.456310] RSP: 002b:00007f7e572fb2d0 EFLAGS: 00010202 [21428694.456312] RAX: 0000000000000002 RBX: 0000000000000003 RCX: 00007fadfe9eb000 [21428694.456313] RDX: 0000001b2c220004 RSI: 00007f7e572fb2f0 RDI: 00007f7e572fb2f0 [21428694.456314] RBP: 0000000000000001 R08: 0000001b2c260000 R09: 0000000000000000 [21428694.456315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21428694.456316] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21428694.456317] FS: 00005584115ea480 GS: 0000000000000000 [21428694.561033] RIP: 0033:0x7fffffffe062 [21428694.565046] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21428694.585621] RSP: 002b:000000c0005dbb90 EFLAGS: 00000297 [21428694.592643] RAX: 00007f438d0b5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21428694.601586] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f438d0b5000 [21428694.610508] RBP: 000000c0005dbc28 R08: 0000000000000009 R09: 0000000006df9000 [21428694.619458] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005dbc18 [21428694.628371] R13: 000000c0005e5f50 R14: 000000c000160fc0 R15: 00000000000988da [21428694.637276] FS: 0000000001f6c6b0 GS: 0000000000000000 [21429188.677114] exe[642538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67de227ef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.785521] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.805062] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.824531] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.844626] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.864681] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.886689] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.910230] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.931177] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.951547] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429933.425603] warn_bad_vsyscall: 24 callbacks suppressed [21429933.425607] exe[640758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a86f9cab9 cs:33 sp:7edce0bd4ef8 ax:0 si:20010000 di:ffffffffff600000 [21431590.769269] exe[680470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db8d4a9ab9 cs:33 sp:7f1740045ef8 ax:0 si:200001c0 di:ffffffffff600000 [21431751.762947] potentially unexpected fatal signal 5. [21431751.768195] CPU: 86 PID: 699136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431751.780200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431751.789870] RIP: 0033:0x7fffffffe062 [21431751.793870] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431751.814493] RSP: 002b:000000c0005e3b90 EFLAGS: 00000297 [21431751.821453] RAX: 00007fb2af491000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431751.830398] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2af491000 [21431751.839336] RBP: 000000c0005e3c28 R08: 0000000000000009 R09: 000000000b5db000 [21431751.848256] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005e3c18 [21431751.857184] R13: 000000c0003b1f50 R14: 000000c0001a7a40 R15: 00000000000a8b80 [21431751.866089] FS: 000000c00013a898 GS: 0000000000000000 [21431964.683880] potentially unexpected fatal signal 5. [21431964.689105] CPU: 29 PID: 676257 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431964.701096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431964.710759] RIP: 0033:0x7fffffffe062 [21431964.714818] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431964.735345] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21431964.742402] RAX: 0000001b31e20000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431964.751341] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b31e20000 [21431964.760268] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000001ea00000 [21431964.769209] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21431964.778148] R13: 000000c000143808 R14: 000000c0002f08c0 R15: 0000000000099f66 [21431964.787118] FS: 00007fd3a4f9d6c0 GS: 0000000000000000 [21432163.247809] exe[710159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557031b55ab9 cs:33 sp:7fbcd7b06858 ax:0 si:557031baf062 di:ffffffffff600000 [21432389.667880] exe[710626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647dc726ab9 cs:33 sp:7f7cf6f92858 ax:0 si:5647dc780062 di:ffffffffff600000 [21432428.881541] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432428.949789] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432439.221265] exe[710668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558368e0aab9 cs:33 sp:7fd6c8fc7ef8 ax:0 si:20002f00 di:ffffffffff600000 [21432899.802297] exe[720179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3083bdab9 cs:33 sp:7ebf2be27858 ax:0 si:55a308417062 di:ffffffffff600000 [21434471.207008] potentially unexpected fatal signal 5. [21434471.212251] CPU: 9 PID: 743711 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21434471.224157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21434471.233797] RIP: 0033:0x7fffffffe062 [21434471.237783] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21434471.257076] RSP: 002b:000000c000177b90 EFLAGS: 00000297 [21434471.264011] RAX: 00000000000baa3d RBX: 0000000000000000 RCX: 00007fffffffe05a [21434471.272922] RDX: 0000000000000000 RSI: 000000c000178000 RDI: 0000000000012f00 [21434471.281823] RBP: 000000c000177c28 R08: 000000c000612100 R09: 0000000000000000 [21434471.289447] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000177c18 [21434471.298355] R13: 000000c000154b10 R14: 000000c000520fc0 R15: 00000000000b590e [21434471.307349] FS: 000000c00013a898 GS: 0000000000000000 [21434898.249079] exe[754112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca1540ab9 cs:33 sp:7f896d102858 ax:0 si:563ca159a062 di:ffffffffff600000 [21434912.779819] exe[729417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f57e2fab9 cs:33 sp:7ea2e2d84858 ax:0 si:564f57e89097 di:ffffffffff600000 [21435018.256422] exe[742742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e86f8f237 cs:33 sp:7fc1a6660ef8 ax:2f700000 si:562e86ffd2f7 di:ffffffffff600000 [21435027.261075] exe[752755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e522a1e237 cs:33 sp:7fb6dc3feef8 ax:2f700000 si:55e522a8c2f7 di:ffffffffff600000 [21435058.934676] exe[712756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fad20c237 cs:33 sp:7f7970d92ef8 ax:2f700000 si:560fad27a2f7 di:ffffffffff600000 [21435061.086039] exe[759052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613f4023237 cs:33 sp:7f3491affef8 ax:2f700000 si:5613f40912f7 di:ffffffffff600000 [21435062.680374] exe[733013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f219d4237 cs:33 sp:7fa7a8352ef8 ax:2f700000 si:562f21a422f7 di:ffffffffff600000 [21435070.802628] exe[738348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab78188237 cs:33 sp:7f4913b50ef8 ax:2f700000 si:55ab781f62f7 di:ffffffffff600000 [21435089.543566] exe[738731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581275bf237 cs:33 sp:7ff20788fef8 ax:2f700000 si:55812762d2f7 di:ffffffffff600000 [21435101.538703] exe[758396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c200e3a237 cs:33 sp:7eb1e4e94ef8 ax:2f700000 si:55c200ea82f7 di:ffffffffff600000 [21435117.794990] exe[768312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558126b73237 cs:33 sp:7f7090944ef8 ax:2f700000 si:558126be12f7 di:ffffffffff600000 [21435141.841988] exe[717389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55919af3ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435141.990599] exe[733100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56055e446db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435178.642760] exe[735334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628a58b4ab9 cs:33 sp:7fed11b93858 ax:0 si:5628a590e062 di:ffffffffff600000 [21435556.812886] exe[757440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9c8779ab9 cs:33 sp:7ff0bd9fe858 ax:0 si:55a9c87d3062 di:ffffffffff600000 [21435636.093884] exe[737891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625376f9237 cs:33 sp:7fbca8296ef8 ax:2f700000 si:5625377672f7 di:ffffffffff600000 [21435658.773234] exe[739338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55768aea1ab9 cs:33 sp:7fe8f7c66ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435720.148295] exe[782278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab177aaab9 cs:33 sp:7ebf11d06ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435725.082334] exe[780474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f95af03ab9 cs:33 sp:7fa4e8ffeef8 ax:0 si:20000b40 di:ffffffffff600000 [21435726.709609] exe[719358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acf2e9dab9 cs:33 sp:7f17766f3ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435733.259669] exe[750485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572632aaab9 cs:33 sp:7f7dc6b41ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435735.097883] exe[776852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b02ff2ab9 cs:33 sp:7f0c19acbef8 ax:0 si:20000b40 di:ffffffffff600000 [21435757.531361] exe[783013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9154ab9 cs:33 sp:7ed5913a0ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435766.395683] exe[778549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fb0f1fab9 cs:33 sp:7f1783447ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435815.586089] exe[783059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9150237 cs:33 sp:7ed5913a0ef8 ax:2f700000 si:5633c91be2f7 di:ffffffffff600000 [21435994.083734] exe[787496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561230c35ab9 cs:33 sp:7feca3d04ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436134.849853] exe[759518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d82a08ab9 cs:33 sp:7effd1f0bef8 ax:0 si:20000b40 di:ffffffffff600000 [21436227.287630] exe[776519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562427370ab9 cs:33 sp:7fabb3144ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436347.050890] potentially unexpected fatal signal 5. [21436347.056127] CPU: 7 PID: 726699 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21436347.068133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21436347.077789] RIP: 0033:0x7fffffffe062 [21436347.081792] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21436347.101013] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21436347.106656] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21436347.115605] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21436347.124497] RBP: 000000c0007b5c80 R08: 0000000000000000 R09: 0000000000000000 [21436347.133407] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007b5c70 [21436347.142309] R13: 000000c0007c0000 R14: 000000c00058ca80 R15: 00000000000b152f [21436347.151227] FS: 000000c000180898 GS: 0000000000000000 [21436452.039827] exe[797561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff2dab9 cs:33 sp:7f6ff9e2def8 ax:0 si:20000b40 di:ffffffffff600000 [21436462.866410] exe[785171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff29237 cs:33 sp:7f6ff9e2def8 ax:2f700000 si:55decff972f7 di:ffffffffff600000 [21436596.434022] exe[786694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bade2b9ab9 cs:33 sp:7ecdf30e7ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436862.244475] exe[807416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3dfd9d237 cs:33 sp:7ef2ceda4ef8 ax:2f700000 si:55b3dfe0b2f7 di:ffffffffff600000 [21437376.184571] potentially unexpected fatal signal 5. [21437376.189790] CPU: 81 PID: 776579 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21437376.201754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21437376.211389] RIP: 0033:0x7fffffffe062 [21437376.215405] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21437376.234642] RSP: 002b:000000c000775be8 EFLAGS: 00000297 [21437376.240324] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21437376.247900] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21437376.255445] RBP: 000000c000775c80 R08: 0000000000000000 R09: 0000000000000000 [21437376.264405] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000775c70 [21437376.273314] R13: 000000c0004cd800 R14: 000000c00037d6c0 R15: 00000000000b823c [21437376.282282] FS: 000000c00048c098 GS: 0000000000000000 [21437433.745115] exe[815747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aebb92dab9 cs:33 sp:7ea1ac068ef8 ax:0 si:20000b40 di:ffffffffff600000 [21437448.265841] exe[815707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c79ad237 cs:33 sp:7ecdade21ef8 ax:2f700000 si:55a1c7a1b2f7 di:ffffffffff600000 [21438032.466280] potentially unexpected fatal signal 11. [21438032.471576] CPU: 23 PID: 825418 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438032.483821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438032.493479] RIP: 0033:0x5591a892669b [21438032.497482] Code: fa 10 73 2d 83 fa 08 73 46 83 fa 04 73 16 83 fa 01 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 <89> 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 c5 fa 7f 07 c5 [21438032.518074] RSP: 002b:00007f725b6fc308 EFLAGS: 00010202 [21438032.523716] RAX: 00000000200001c0 RBX: 00007f725b6fc418 RCX: 00000000aaaaaaaa [21438032.531283] RDX: 0000000000000005 RSI: 00000000aaaaaaaa RDI: 00000000200001c0 [21438032.540193] RBP: 0000000000000001 R08: 00007f714ca00000 R09: 0000000000000660 [21438032.547761] R10: 00ab5dfe1fe97b85 R11: 00000000861c4ac9 R12: 00007f714c600000 [21438032.555334] R13: fffffffffffffffe R14: 00007f714c600000 R15: 00007f714c600008 [21438032.562987] FS: 00005591a95a4480 GS: 0000000000000000 [21438064.081998] potentially unexpected fatal signal 5. [21438064.087253] CPU: 47 PID: 815735 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438064.099263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438064.108911] RIP: 0033:0x7fffffffe062 [21438064.112957] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21438064.133565] RSP: 002b:000000c000651b90 EFLAGS: 00000297 [21438064.140571] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21438064.149492] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000560c09000000 [21438064.158570] RBP: 000000c000651c28 R08: 0000000000000000 R09: 0000000000000000 [21438064.167499] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000651c18 [21438064.176459] R13: 000000c000674ab0 R14: 000000c000247a40 R15: 00000000000c54f4 [21438064.185413] FS: 000000c000180098 GS: 0000000000000000 [21438235.776629] potentially unexpected fatal signal 11. [21438235.781942] CPU: 28 PID: 826989 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438235.793947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438235.803557] RIP: 0033:0x55ea73e76a80 [21438235.807513] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21438235.826690] RSP: 002b:00007ff5164cc440 EFLAGS: 00010246 [21438235.832298] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055ea73e76e0d [21438235.839854] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055ea74ad8760 [21438235.847410] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21438235.854981] R10: 000055ea74ad8750 R11: 0000000000000246 R12: 0000000000000000 [21438235.862521] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21438235.870049] FS: 000055ea74ad8480 GS: 0000000000000000 [21438263.019582] exe[829702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638742caab9 cs:33 sp:7fc5dea3def8 ax:0 si:20000b40 di:ffffffffff600000 [21438278.626485] exe[814739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563296cf2237 cs:33 sp:7f498b4dcef8 ax:2f700000 si:563296d602f7 di:ffffffffff600000 [21439959.504740] potentially unexpected fatal signal 5. [21439959.510003] CPU: 9 PID: 895163 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21439959.521896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21439959.531652] RIP: 0033:0x7fffffffe062 [21439959.535674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21439959.554911] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21439959.561887] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21439959.570830] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21439959.579751] RBP: 000000c00076bc80 R08: 0000000000000000 R09: 0000000000000000 [21439959.588666] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00076bc70 [21439959.597592] R13: 000000c00077a000 R14: 000000c0004b1a40 R15: 00000000000c265c [21439959.606512] FS: 000000c00013a898 GS: 0000000000000000 [21440506.641205] exe[906202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ced093cab9 cs:33 sp:7f1024cb1858 ax:0 si:55ced0996097 di:ffffffffff600000 [21440929.410111] exe[906118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614939eeab9 cs:33 sp:7fa270ede858 ax:0 si:561493a48062 di:ffffffffff600000 [21441741.040609] exe[899030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559abe6b7ab9 cs:33 sp:7f9d2831f858 ax:0 si:559abe711070 di:ffffffffff600000 [21441801.531426] exe[930335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464edd8ab9 cs:33 sp:7ed6db245858 ax:0 si:56464ee32070 di:ffffffffff600000 [21441867.132921] exe[900006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563005357237 cs:33 sp:7efe11ca1ef8 ax:2f700000 si:5630053c52f7 di:ffffffffff600000 [21441924.439739] exe[900681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3097 di:ffffffffff600000 [21441968.182112] exe[918729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3070 di:ffffffffff600000 [21442141.932482] exe[941550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88c533ab9 cs:33 sp:7ff4c3bbaef8 ax:0 si:20000b40 di:ffffffffff600000 [21442183.243140] potentially unexpected fatal signal 5. [21442183.248371] CPU: 5 PID: 897702 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21442183.260256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21442183.269983] RIP: 0033:0x7fffffffe062 [21442183.274069] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21442183.294644] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21442183.301673] RAX: 0000562103400000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21442183.310620] RDX: 0000000000000001 RSI: 00000000000c6000 RDI: 0000562103400000 [21442183.319535] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000015e6a000 [21442183.328477] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21442183.337423] R13: 0000000002883b00 R14: 000000c000261340 R15: 00000000000d83f2 [21442183.346355] FS: 00000000056d63c0 GS: 0000000000000000 [21442276.464039] exe[937687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563deeb82237 cs:33 sp:7ff3e3626ef8 ax:2f700000 si:563deebf02f7 di:ffffffffff600000 [21443247.854800] potentially unexpected fatal signal 5. [21443247.860022] CPU: 87 PID: 960703 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21443247.872037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21443247.881703] RIP: 0033:0x7fffffffe062 [21443247.885749] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21443247.905003] RSP: 002b:000000c0005ddb90 EFLAGS: 00000297 [21443247.912026] RAX: 000055d4a3ddc000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21443247.920977] RDX: 0000000000000005 RSI: 00000000000a3000 RDI: 000055d4a3ddc000 [21443247.929945] RBP: 000000c0005ddc28 R08: 000000000000001d R09: 0000000000025000 [21443247.938889] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005ddc18 [21443247.947861] R13: 000000c000604ab0 R14: 000000c0001a2540 R15: 00000000000ea2f8 [21443247.956837] FS: 000000c0004c4098 GS: 0000000000000000 [21443319.546280] exe[963762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a272b05ab9 cs:33 sp:7f70190fc858 ax:0 si:55a272b5f062 di:ffffffffff600000 [21443590.793684] exe[940494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df4e07ab9 cs:33 sp:7f98ef5c2858 ax:0 si:559df4e61062 di:ffffffffff600000 [21443590.892110] exe[938734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443590.928779] exe[950791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443744.166654] exe[837833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f75f9fab9 cs:33 sp:7efe9862d858 ax:0 si:563f75ff9062 di:ffffffffff600000 [21444759.685018] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.788450] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.871641] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.957795] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.027836] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.102763] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.180507] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.254623] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.339473] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.439215] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.745687] warn_bad_vsyscall: 119 callbacks suppressed [21444764.745691] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.829242] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.880001] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.930499] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.033109] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.161342] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.227547] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.290090] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.366607] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.437303] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.771003] warn_bad_vsyscall: 162 callbacks suppressed [21444769.771007] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfae7858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.831043] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.989792] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.155493] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.176230] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.373775] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.452276] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.571678] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.662426] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.705979] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444774.839250] warn_bad_vsyscall: 22 callbacks suppressed [21444774.839254] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444774.917700] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.007565] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.103870] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.180498] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.250561] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.325031] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.351860] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfac6858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.446972] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.534307] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.140380] warn_bad_vsyscall: 72 callbacks suppressed [21444780.140384] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.643337] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.947124] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444784.632292] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444785.386823] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444792.865757] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444793.551179] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444794.857777] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444795.272022] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444796.751398] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444800.120920] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444801.450170] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444804.767331] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444805.633435] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.772372] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.921237] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444811.297593] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444812.146654] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444813.508582] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444814.929121] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444819.248469] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444824.585881] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444827.871681] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444832.360581] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444834.925364] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.288823] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.720001] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444841.688511] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.617356] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.690034] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444851.187230] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444853.140443] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444854.978943] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444855.997434] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.846154] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.956772] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444865.048334] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444867.699730] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444870.008061] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444874.057095] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444874.584649] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444878.150838] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.187996] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.592827] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861070 di:ffffffffff600000 [21444888.747586] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444890.457520] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444891.294252] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444893.971964] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444896.397298] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444902.556293] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444904.197522] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.677291] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.784817] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444906.703025] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444917.894799] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444928.650542] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444937.061576] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444939.873384] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444943.278042] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444950.506046] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444956.631679] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444958.608427] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444965.379337] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444966.588096] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444971.015726] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444972.464198] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444978.505399] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444982.026980] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444983.360867] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444986.978698] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444992.675657] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.165519] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.503074] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444998.928894] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.399798] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.661551] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531097 di:ffffffffff600000 [21445015.325564] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445017.454777] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445019.945854] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445025.910525] exe[957023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.083519] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.301379] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.365566] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.559238] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445046.974609] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531070 di:ffffffffff600000 [21445047.901825] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445052.095269] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445054.571345] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445060.673513] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445068.266639] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.231625] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.779294] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.831508] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445079.233360] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b097 di:ffffffffff600000 [21445081.128574] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.161127] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.914812] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445086.016119] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445090.878336] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445097.681485] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445102.543209] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445104.966329] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445110.226832] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445114.088409] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445116.798978] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff38898c858 ax:0 si:563a810da062 di:ffffffffff600000 [21445118.746297] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445126.363396] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebb3858 ax:0 si:555673e01062 di:ffffffffff600000 [21445129.789237] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.298837] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.946721] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445136.356780] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445140.476028] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55853a7f6ab9 cs:33 sp:7fe4f74ca858 ax:0 si:55853a850062 di:ffffffffff600000 [21445144.730796] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611d5740ab9 cs:33 sp:7ff45e779858 ax:0 si:5611d579a070 di:ffffffffff600000 [21445148.028348] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445148.790663] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445152.325550] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445154.790652] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445156.052088] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445157.741556] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.391485] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.739901] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445161.428544] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445173.223042] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445173.594048] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445178.199774] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc845dfe858 ax:0 si:556c04023062 di:ffffffffff600000 [21445181.218769] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445183.023651] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445184.355158] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445188.022808] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445189.127364] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445192.258056] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445193.061695] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445197.889603] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445200.301619] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445202.763703] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445207.380242] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023097 di:ffffffffff600000 [21445212.537971] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445220.899130] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445224.604790] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445226.330275] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445229.587615] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.145301] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.916690] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445238.332376] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445240.003174] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445244.800071] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445252.622244] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445252.839739] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.156479] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.344846] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.710821] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.770559] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445260.357515] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445261.260396] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445262.268465] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445265.664065] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445267.031408] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445270.603396] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445280.492226] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445291.428186] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.706553] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.761657] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6097 di:ffffffffff600000 [21445293.297774] potentially unexpected fatal signal 5. [21445293.303025] CPU: 45 PID: 980394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21445293.315033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21445293.324690] RIP: 0033:0x7fffffffe062 [21445293.328690] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21445293.347937] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [21445293.354945] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21445293.362524] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21445293.371428] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [21445293.380368] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00002bc18 [21445293.389391] R13: 000000c000331f20 R14: 000000c0004a5880 R15: 00000000000e3608 [21445293.398275] FS: 000000c00047e098 GS: 0000000000000000 [21445298.698236] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445312.450965] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445319.934972] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445320.623469] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445322.344040] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445322.851138] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445324.902121] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445326.332009] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445329.060107] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445332.696951] exe[5993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445332.778180] exe[8270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445333.380151] exe[9095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445334.730615] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445335.552590] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445341.447239] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445352.481836] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445373.333280] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445374.513228] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445375.420796] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12070 di:ffffffffff600000 [21445377.734758] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445383.851003] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445384.291148] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.485928] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.637748] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445392.972332] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445401.691244] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445403.610793] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445408.086576] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.296386] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.390719] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.637394] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445414.276789] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51741858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445416.954944] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445420.283379] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040070 di:ffffffffff600000 [21445421.888092] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445425.103348] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.478434] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.915067] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445440.279176] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445444.426181] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445445.430466] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445446.103854] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445449.378881] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445452.324233] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.152912] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.506655] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445454.531178] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445456.649265] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.405107] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.747278] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445463.497766] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec532858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445465.932667] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445468.014560] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.357804] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.824410] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445474.191417] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445474.690410] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445475.419937] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445480.449668] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e3809dab9 cs:33 sp:7f21ee779858 ax:0 si:563e380f7062 di:ffffffffff600000 [21445489.626684] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.471870] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.957406] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445493.670957] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce84a3ab9 cs:33 sp:7f15a998f858 ax:0 si:55fce84fd062 di:ffffffffff600000 [21445510.318045] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445510.530251] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445513.575315] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445515.944344] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.114859] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.227701] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.417928] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.896972] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.240395] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.289894] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.739748] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445524.601943] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445526.765728] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445528.840735] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445531.101086] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445534.919354] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445537.911447] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445540.810846] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445547.137370] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445548.456107] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445550.616270] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445555.719420] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445557.608202] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445571.989529] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.730693] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.782182] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.380165] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.976456] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445575.440647] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445577.076717] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445577.124137] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445578.944960] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445586.631588] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445592.262472] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445606.583570] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445611.591671] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445615.962245] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445616.622804] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445621.256455] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445627.369382] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445629.884683] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445633.085867] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7aa858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445634.161560] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445638.196216] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445640.718018] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445641.234792] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445646.716123] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.320269] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.968227] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445650.701018] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445651.990887] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445652.569758] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445654.950020] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445656.099429] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445657.461786] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445666.423388] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445668.641084] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445670.229840] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445676.931016] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445677.071672] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445692.131653] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445700.127714] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445706.043938] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445715.492611] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.617799] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.905056] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445719.125360] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24097 di:ffffffffff600000 [21445723.226831] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445724.327624] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445727.014260] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445727.334147] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445730.242432] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445736.359701] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445742.212894] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445749.894875] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.063639] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.548472] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445752.071678] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445753.696048] exe[992339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4d1eab9 cs:33 sp:7f7aef1c5858 ax:0 si:5612b4d78070 di:ffffffffff600000 [21445753.851474] exe[993503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cd4b40ab9 cs:33 sp:7fdc5e3a8858 ax:0 si:562cd4b9a070 di:ffffffffff600000 [21445753.968181] exe[993657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.005129] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.037758] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.069914] exe[993483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445764.549150] warn_bad_vsyscall: 53 callbacks suppressed [21445764.549153] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445764.992101] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445769.355907] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445769.686753] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445771.956228] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445774.717978] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445783.613648] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445784.559157] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445789.453117] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445789.682993] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445790.389406] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445792.681618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.019841] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.676499] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445799.488275] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445800.893573] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445802.821225] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.400839] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.492549] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445809.911687] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.190618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.252565] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445820.215245] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445822.755904] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445837.243941] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.601113] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.772389] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445849.364312] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445866.630843] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.189417] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.326705] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445875.619873] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445877.437862] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445891.892716] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445894.632615] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445903.139034] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445907.349482] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445912.966079] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445915.390092] exe[975041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559287e71ab9 cs:33 sp:7ebefdb8bef8 ax:0 si:20000040 di:ffffffffff600000 [21445923.564337] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445923.621637] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445928.760191] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445935.813587] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445943.472902] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445957.613048] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445958.348242] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445965.673905] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445968.011572] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445969.194893] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445981.004158] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445984.446826] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445987.354963] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.430634] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.588337] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445988.275306] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445991.227962] exe[14505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4fc9d6237 cs:33 sp:7fb3db97def8 ax:2f700000 si:55c4fca442f7 di:ffffffffff600000 [21445994.428433] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445998.827036] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445998.942082] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445999.493291] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446005.631028] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446010.118455] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446011.395855] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446012.112688] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446013.771033] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446016.685515] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.026346] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.628704] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446025.547663] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446030.896060] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446034.115619] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446039.988186] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446052.045116] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446055.957256] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446056.492658] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446059.232830] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446069.887004] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446073.301104] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.145896] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.310813] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446080.736650] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446083.229851] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446088.237648] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446091.879414] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446095.729502] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446098.522121] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446099.516786] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8a3858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446197.718660] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446198.511944] exe[966039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db9991cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a0040000 [21446208.726128] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.516308] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.986750] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446217.271828] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a097 di:ffffffffff600000 [21446221.418781] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446231.747967] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446244.735122] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446251.091003] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446253.795886] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446257.619944] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e097 di:ffffffffff600000 [21446259.808765] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446260.287816] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446272.305879] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446273.451184] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446274.196385] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446277.660781] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446279.499654] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446285.029421] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446287.214019] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446289.786912] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446298.503266] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446300.730450] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446304.124472] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446328.652395] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446333.672163] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec097 di:ffffffffff600000 [21446339.050167] exe[959405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446342.754732] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4f37fab9 cs:33 sp:7f1711f86858 ax:0 si:557b4f3d9062 di:ffffffffff600000 [21446355.441686] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9b1b3ab9 cs:33 sp:7fb4600fa858 ax:0 si:555d9b20d062 di:ffffffffff600000 [21446356.801248] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446358.879935] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446359.683149] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446365.884476] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446366.050240] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.847894] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.922860] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446379.074947] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446385.962092] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446386.184050] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446386.806333] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446387.425707] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446391.344316] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446394.619546] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446400.789725] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446400.842952] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446406.750719] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446410.385036] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446412.205864] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446413.935473] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446418.015251] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446983.840910] exe[24076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f4bb16ab9 cs:33 sp:7edc3ced7ef8 ax:0 si:200001c0 di:ffffffffff600000 [21447481.641149] exe[26590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d12723ab9 cs:33 sp:7ede07fc7858 ax:0 si:559d1277d062 di:ffffffffff600000 [21447487.779471] exe[49042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f84acbab9 cs:33 sp:7eeb669df858 ax:0 si:561f84b25062 di:ffffffffff600000 [21447556.264537] exe[45380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f79d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447556.362445] exe[45479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dcf10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447804.810843] exe[68090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447804.908178] exe[45023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447804.987976] exe[49166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.031762] exe[68288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559215d3eab9 cs:33 sp:7f62094e1858 ax:0 si:559215d98097 di:ffffffffff600000 [21447805.139075] exe[33136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447805.242166] exe[68364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.405505] exe[49083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef086aab9 cs:33 sp:7f715c98b858 ax:0 si:557ef08c4097 di:ffffffffff600000 [21447805.540221] exe[68285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39062 di:ffffffffff600000 [21447990.996286] exe[70744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577b0cd6ab9 cs:33 sp:7f6919eb6ef8 ax:0 si:20002340 di:ffffffffff600000 [21447991.363192] exe[75684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632a65afab9 cs:33 sp:7f2e591feef8 ax:0 si:20002340 di:ffffffffff600000 [21448041.536408] potentially unexpected fatal signal 5. [21448041.541641] CPU: 30 PID: 80640 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.553580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.563252] RIP: 0033:0x7fffffffe062 [21448041.567286] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448041.575629] potentially unexpected fatal signal 11. [21448041.587913] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21448041.593211] CPU: 78 PID: 75653 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.593212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.593215] RIP: 0033:0x5606400ce6ac [21448041.593218] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21448041.593219] RSP: 002b:00007f5d26bdb308 EFLAGS: 00010206 [21448041.598836] RAX: 00007f9498215000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448041.598837] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f9498215000 [21448041.598837] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000041fe000 [21448041.598838] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21448041.598839] R13: 000000c000178808 R14: 000000c0004b3c00 R15: 0000000000012055 [21448041.598840] FS: 00007f3143fff6c0 GS: 0000000000000000 [21448041.699881] RAX: 0000000020000300 RBX: 00007f5d26bdb418 RCX: 00007f3680a00000 [21448041.707437] RDX: 0000000000000013 RSI: 00007f3680a00020 RDI: 0000000020000300 [21448041.716339] RBP: 0000000000000001 R08: 00007f3680e00000 R09: 0000000000000188 [21448041.725263] R10: 00ab72794e84070c R11: 00000000861c4a91 R12: 00007f3680a00000 [21448041.734185] R13: fffffffffffffffe R14: 00007f3680a00000 R15: 00007f3680a00008 [21448041.743104] FS: 0000560640d4c480 GS: 0000000000000000 [21448079.551197] potentially unexpected fatal signal 11. [21448079.556536] CPU: 47 PID: 73160 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448079.568434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448079.578070] RIP: 0033:0x5600822ab939 [21448079.582041] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21448079.601255] RSP: 002b:00007f3f8af82440 EFLAGS: 00010206 [21448079.606944] RAX: 0000000000000147 RBX: 0000000000000000 RCX: 00005600822abdd3 [21448079.615934] RDX: 0000000000000147 RSI: 0000000000000000 RDI: 0000000001200011 [21448079.624897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21448079.633843] R10: 0000560082f0d750 R11: 0000000000000246 R12: 0000000000000147 [21448079.642755] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21448079.651670] FS: 0000560082f0d480 GS: 0000000000000000 [21448142.862707] exe[53476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c40d0ab9 cs:33 sp:7ecedf1feef8 ax:0 si:20002340 di:ffffffffff600000 [21448149.802562] exe[53561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93eba7ab9 cs:33 sp:7ed727fdbef8 ax:0 si:20002340 di:ffffffffff600000 [21448203.817495] exe[83585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641788daab9 cs:33 sp:7fee94d66ef8 ax:0 si:20001180 di:ffffffffff600000 [21448232.473098] exe[83465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eebc403ab9 cs:33 sp:7f0aab8ccef8 ax:0 si:20002340 di:ffffffffff600000 [21448233.545483] exe[14014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556199d11ab9 cs:33 sp:7f3034bfeef8 ax:0 si:20002340 di:ffffffffff600000 [21448235.446700] exe[60971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f446bbab9 cs:33 sp:7fd8a5b84ef8 ax:0 si:20002340 di:ffffffffff600000 [21448251.754946] exe[90183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd70d33ab9 cs:33 sp:7efca399fef8 ax:0 si:20002340 di:ffffffffff600000 [21448294.917060] exe[92485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55918d21eab9 cs:33 sp:7f4b894f0ef8 ax:0 si:20002340 di:ffffffffff600000 [21448345.356696] exe[95188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ad39ab9 cs:33 sp:7eb9532dfef8 ax:0 si:20002340 di:ffffffffff600000 [21448423.166017] exe[91824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a6aca9ab9 cs:33 sp:7ff63595eef8 ax:0 si:20002240 di:ffffffffff600000 [21448546.744563] exe[100705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56404ab50ab9 cs:33 sp:7f661bfd6ef8 ax:0 si:20002340 di:ffffffffff600000 [21448911.587611] potentially unexpected fatal signal 5. [21448911.592838] CPU: 31 PID: 60810 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.604726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.614333] RIP: 0033:0x7fffffffe062 [21448911.618295] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.637514] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.643205] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448911.650749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21448911.659687] RBP: 000000c000553c28 R08: 0000000000000000 R09: 0000000000000000 [21448911.668905] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000553c18 [21448911.677807] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448911.686745] FS: 000000c000180898 GS: 0000000000000000 [21448911.940149] potentially unexpected fatal signal 5. [21448911.945383] CPU: 14 PID: 8130 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.957209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.966899] RIP: 0033:0x7fffffffe062 [21448911.970882] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.990092] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.997126] RAX: 000000000001b4db RBX: 0000000000000000 RCX: 00007fffffffe05a [21448912.004698] RDX: 0000000000000000 RSI: 000000c000554000 RDI: 0000000000012f00 [21448912.013644] RBP: 000000c000553c28 R08: 000000c00055a2e0 R09: 0000000000000000 [21448912.022578] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000553c18 [21448912.031546] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448912.040482] FS: 000000c000180898 GS: 0000000000000000 [21448943.731044] exe[108824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4dd463ab9 cs:33 sp:7f30d2c83ef8 ax:0 si:20002340 di:ffffffffff600000 [21449044.520442] exe[105882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588eef65ab9 cs:33 sp:7f2ed2105858 ax:0 si:5588eefbf070 di:ffffffffff600000 [21449053.615099] exe[991268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556623419ab9 cs:33 sp:7fb739ce3ef8 ax:0 si:20002340 di:ffffffffff600000 [21449317.532790] exe[81936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.685224] exe[84190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562336f9ab9 cs:33 sp:7fac431a6858 ax:0 si:556233753097 di:ffffffffff600000 [21449317.698966] exe[82785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.813087] exe[105113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.929349] exe[82442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e097 di:ffffffffff600000 [21449318.092061] exe[105091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449318.210423] exe[104422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e062 di:ffffffffff600000 [21449585.710504] exe[124975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5a89bdab9 cs:33 sp:7eefae34def8 ax:0 si:20002340 di:ffffffffff600000 [21449797.733840] exe[89795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560127b8cab9 cs:33 sp:7fc40b790ef8 ax:0 si:20000800 di:ffffffffff600000 [21450018.251903] exe[108224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f1ff64ab9 cs:33 sp:7ed7af6daef8 ax:0 si:20002280 di:ffffffffff600000 [21450160.422392] exe[39838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370d369ab9 cs:33 sp:7f40c7a57ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.589605] exe[131437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.622086] exe[76745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450421.448398] exe[108372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450421.957225] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450451.773435] exe[139817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2ed15ab9 cs:33 sp:7f226d987858 ax:0 si:562f2ed6f062 di:ffffffffff600000 [21450548.798590] exe[146816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562463594ab9 cs:33 sp:7f9a1a163858 ax:0 si:5624635ee062 di:ffffffffff600000 [21450846.563279] exe[99118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c8f1e6ab9 cs:33 sp:7eabe5a8a858 ax:0 si:556c8f240062 di:ffffffffff600000 [21451174.354726] exe[81661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561500b1aab9 cs:33 sp:7f7dfeffe858 ax:0 si:561500b74062 di:ffffffffff600000 [21451174.512873] exe[100407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eedd21ab9 cs:33 sp:7ff14e304858 ax:0 si:564eedd7b062 di:ffffffffff600000 [21451345.299799] exe[108469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.720121] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.759670] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.795169] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.834305] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.870415] exe[113009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.907890] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.946869] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.982038] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451346.014160] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451427.289290] potentially unexpected fatal signal 11. [21451427.294633] CPU: 0 PID: 145474 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451427.306524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451427.316334] RIP: 0033:0x55ec2eec51ef [21451427.320381] Code: 00 00 00 e9 33 0c 05 00 0f 1f 00 e9 3b f8 ff ff 0f 1f 00 81 fa 00 01 00 00 74 d6 8b 57 10 83 e2 7f 83 fa 01 0f 85 92 00 00 00 <64> 8b 04 25 d0 02 00 00 39 47 08 75 30 8b 47 04 83 f8 ff 0f 84 bc [21451427.339701] RSP: 002b:00007f2b6c89f150 EFLAGS: 00010246 [21451427.346663] RAX: 0000000000000000 RBX: 000055ec2fb4e7f0 RCX: 000055ec2fb4e7d0 [21451427.355626] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000055ec2eff0f20 [21451427.364542] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [21451427.373512] R10: 0000000000021000 R11: 0000000000000010 R12: 00007f2b6c89f470 [21451427.382414] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [21451427.391351] FS: 000055ec2fb4d480 GS: 0000000000000000 [21451450.941030] warn_bad_vsyscall: 13 callbacks suppressed [21451450.941034] exe[82819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6ee0b1ab9 cs:33 sp:7fe40077b858 ax:0 si:55c6ee10b062 di:ffffffffff600000 [21451451.080867] exe[82424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5fda91ab9 cs:33 sp:7fd5c4e34858 ax:0 si:55f5fdaeb062 di:ffffffffff600000 [21451723.104775] potentially unexpected fatal signal 5. [21451723.110064] CPU: 8 PID: 140157 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451723.121970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451723.131602] RIP: 0033:0x7fffffffe062 [21451723.135590] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21451723.154816] RSP: 002b:000000c00051fb90 EFLAGS: 00000297 [21451723.160495] RAX: 0000560022cbb000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21451723.169428] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000560022cbb000 [21451723.178408] RBP: 000000c00051fc28 R08: 0000000000000009 R09: 000000000eeca000 [21451723.187327] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00051fc18 [21451723.196328] R13: 000000c0006c0150 R14: 000000c000172c40 R15: 0000000000021e97 [21451723.205247] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452267.679193] potentially unexpected fatal signal 5. [21452267.684431] CPU: 53 PID: 197184 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452267.696403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452267.706032] RIP: 0033:0x7fffffffe062 [21452267.710009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452267.729271] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21452267.736273] RAX: 000055b277603000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452267.745215] RDX: 0000000000000003 RSI: 00000000000b9000 RDI: 000055b277603000 [21452267.754131] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000017846000 [21452267.763057] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21452267.771985] R13: 000000c000143008 R14: 000000c0001fe8c0 R15: 000000000002fa54 [21452267.780900] FS: 00007f159a19e6c0 GS: 0000000000000000 [21452468.159193] potentially unexpected fatal signal 5. [21452468.164418] CPU: 19 PID: 165360 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452468.176405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452468.186044] RIP: 0033:0x7fffffffe062 [21452468.190016] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452468.209398] RSP: 002b:000000c0005cfb90 EFLAGS: 00000297 [21452468.216341] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452468.225292] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452468.234229] RBP: 000000c0005cfc28 R08: 0000000000000000 R09: 0000000000000000 [21452468.242055] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005cfc18 [21452468.250978] R13: 000000c0005d8b10 R14: 000000c000168700 R15: 00000000000283f3 [21452468.259957] FS: 000000c00013b098 GS: 0000000000000000 [21452478.300026] potentially unexpected fatal signal 5. [21452478.305253] CPU: 73 PID: 173701 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452478.317255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452478.326943] RIP: 0033:0x7fffffffe062 [21452478.330964] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452478.351551] RSP: 002b:000000c000645b90 EFLAGS: 00000297 [21452478.358565] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452478.367466] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452478.375003] RBP: 000000c000645c28 R08: 0000000000000000 R09: 0000000000000000 [21452478.383965] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000645c18 [21452478.392937] R13: 000000c000574990 R14: 000000c000518700 R15: 0000000000029ee5 [21452478.401850] FS: 000000c00013a898 GS: 0000000000000000 [21452549.148066] potentially unexpected fatal signal 5. [21452549.153287] CPU: 64 PID: 208050 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452549.165256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452549.174896] RIP: 0033:0x7fffffffe062 [21452549.178893] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452549.198078] RSP: 002b:000000c00063fb90 EFLAGS: 00000297 [21452549.203724] RAX: 000056450fe79000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452549.211325] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 000056450fe79000 [21452549.220243] RBP: 000000c00063fc28 R08: 0000000000000009 R09: 000000001d314000 [21452549.229221] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00063fc18 [21452549.238149] R13: 000000c00016e6f0 R14: 000000c00046d6c0 R15: 0000000000032589 [21452549.247061] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452921.656857] exe[175762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1a22ab9 cs:33 sp:7f9102aefef8 ax:0 si:200020c0 di:ffffffffff600000 [21453766.501683] potentially unexpected fatal signal 5. [21453766.506906] CPU: 1 PID: 234052 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21453766.518797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21453766.528439] RIP: 0033:0x7fffffffe062 [21453766.532443] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21453766.551630] RSP: 002b:000000c000635b90 EFLAGS: 00000297 [21453766.557247] RAX: 00007f09bd033000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21453766.566174] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f09bd033000 [21453766.575123] RBP: 000000c000635c28 R08: 0000000000000009 R09: 000000000ba82000 [21453766.584046] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000635c18 [21453766.592970] R13: 000000c00063df50 R14: 000000c000528a80 R15: 0000000000038d89 [21453766.601914] FS: 000000c00013a898 GS: 0000000000000000 [21453885.538095] exe[193302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c141e4bab9 cs:33 sp:7f4bc67b1858 ax:0 si:55c141ea5062 di:ffffffffff600000 [21453926.740056] exe[244983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55782ab5dab9 cs:33 sp:7f911c7cf858 ax:0 si:55782abb7062 di:ffffffffff600000 [21453926.878261] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ee858 ax:0 si:563261096062 di:ffffffffff600000 [21453926.920773] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ac858 ax:0 si:563261096062 di:ffffffffff600000 [21454125.554702] exe[252512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019188c237 cs:33 sp:7f044616aef8 ax:2f700000 si:5601918fa2f7 di:ffffffffff600000 [21454289.936490] exe[254568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fe7a1ab9 cs:33 sp:7f99d7e41858 ax:0 si:5624fe7fb062 di:ffffffffff600000 [21454421.038312] exe[185490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9cbdcab9 cs:33 sp:7ed17925b858 ax:0 si:55eb9cc36062 di:ffffffffff600000 [21454524.053375] exe[260691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454524.226734] exe[260197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.339878] exe[260304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.433650] exe[261887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.438807] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.707563] exe[260673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.877490] exe[260394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.989904] exe[260311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1afb64ab9 cs:33 sp:7f1987fb4858 ax:0 si:55e1afbbe062 di:ffffffffff600000 [21454525.106822] exe[260718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454527.268639] exe[260316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454672.580477] warn_bad_vsyscall: 1 callbacks suppressed [21454672.580486] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.671718] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.773413] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.870160] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.984607] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.093042] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.343804] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.502958] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.623689] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.945005] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.622286] warn_bad_vsyscall: 38 callbacks suppressed [21454677.622289] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.649306] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.797837] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.924303] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.033247] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.147541] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.243578] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.365198] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.366559] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.734316] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454682.725313] warn_bad_vsyscall: 110 callbacks suppressed [21454682.725318] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454682.854399] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.340519] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.468246] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.597270] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.704896] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.854189] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.965811] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454684.065528] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454684.142715] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.786376] warn_bad_vsyscall: 41 callbacks suppressed [21454687.786380] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.878404] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454687.964450] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454688.059011] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.139467] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.258420] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.372343] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.462994] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.603797] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.629959] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.814259] warn_bad_vsyscall: 101 callbacks suppressed [21454692.814263] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.982278] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.075832] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.186846] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.289633] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.315779] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.432820] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.554328] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.555912] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbaa858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.662706] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454703.286388] warn_bad_vsyscall: 65 callbacks suppressed [21454703.286392] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454714.254956] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454720.956406] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454723.784515] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454729.460866] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.533072] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.950996] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454740.815666] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.353885] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.865771] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454748.197216] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454750.830160] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454753.204914] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454753.453123] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454760.155279] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320097 di:ffffffffff600000 [21454761.088939] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454762.176865] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454766.253097] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454770.056364] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454775.976498] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454784.363973] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454791.081015] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454795.338769] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.152832] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.835586] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.853774] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.912408] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.283261] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.407491] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454805.714772] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454816.461537] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454821.067549] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454825.301874] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454838.800653] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454839.522411] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454853.269546] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454856.821693] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454857.163577] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.154674] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.258545] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454869.435932] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454870.431232] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454880.007912] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454888.879181] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454890.119239] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454891.913923] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454892.878024] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454897.149573] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454899.451558] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454903.522908] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454908.436793] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454909.546162] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454915.414130] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454920.724451] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454922.263618] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454925.150933] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454931.595224] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454935.444256] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454937.335030] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454938.062634] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454938.253807] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454939.094683] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454945.980467] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454947.685408] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454955.929818] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588062 di:ffffffffff600000 [21454957.106591] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588097 di:ffffffffff600000 [21454961.440587] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.555639] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.733943] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4097 di:ffffffffff600000 [21454975.626983] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454978.283843] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.415851] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.894727] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454986.182028] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21454987.023053] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454989.684589] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454991.165438] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454997.033758] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455000.415990] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455002.358861] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455013.494354] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.602736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.729393] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455035.204155] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455036.456375] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455038.102573] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455046.099565] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455051.117778] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa070 di:ffffffffff600000 [21455054.756211] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455058.958891] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455060.631627] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455063.652702] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455067.052887] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455068.605314] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455070.486133] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455071.601968] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455071.666713] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455082.985936] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455083.589062] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455087.903179] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455090.783586] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455099.350284] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455102.124766] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455115.361282] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455118.778260] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455119.585109] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455120.744777] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455124.502346] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455127.077113] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455129.774803] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455134.524468] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455137.241007] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455151.651115] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455152.253216] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455153.366354] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455155.229796] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2070 di:ffffffffff600000 [21455158.687434] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455161.507899] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455165.032147] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455167.184284] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.099538] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.401736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455169.634895] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455179.867172] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455193.872123] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455201.622707] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455203.960413] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455214.821327] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455215.163111] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455219.403074] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455225.110631] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455231.821414] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455233.587400] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455244.997718] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.320983] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.379397] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.230669] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.518412] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.935542] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455274.465274] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455276.626872] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455277.282208] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455279.595154] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455280.145748] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455286.229144] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455290.507873] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455291.778256] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455293.176860] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455303.307164] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.363844] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.682574] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455307.275079] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455309.241817] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dc059cab9 cs:33 sp:7f782e79a858 ax:0 si:562dc05f6062 di:ffffffffff600000 [21455311.129886] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455322.860148] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c097 di:ffffffffff600000 [21455332.589722] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455332.700931] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455334.339658] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455337.645000] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455339.687680] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455347.975800] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455353.540316] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455361.261161] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455364.920682] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455367.889612] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455369.798717] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455380.530402] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455383.340410] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455386.700812] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455388.035247] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.502494] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.846054] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455393.899065] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455397.882514] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455398.304499] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455399.487090] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455400.015083] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455401.175928] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455402.510494] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.104031] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.456675] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455409.959752] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455411.741970] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455420.695502] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455420.886275] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455421.977215] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455422.480950] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455424.616833] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455426.514731] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455427.906277] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455428.885023] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455429.688117] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455430.181407] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.620573] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.887496] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455436.831722] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455440.163203] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455444.356958] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e070 di:ffffffffff600000 [21455447.715063] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455451.872533] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455453.367796] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455456.529530] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455458.269051] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455458.907214] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455464.483039] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455471.610323] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455479.155044] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455482.641860] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455484.878898] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455489.117478] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587f5f5cab9 cs:33 sp:7fb178cf3858 ax:0 si:5587f5fb6062 di:ffffffffff600000 [21455494.241499] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455500.248834] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455501.843485] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455502.688126] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455508.247012] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455508.378730] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455512.119932] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455513.946981] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455518.676302] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455519.224262] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455536.874916] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455538.183411] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199070 di:ffffffffff600000 [21455540.907737] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455554.070102] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455556.597971] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455566.166792] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.356169] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.741223] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455569.553311] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455572.950611] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399097 di:ffffffffff600000 [21455574.231556] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455577.045483] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.011335] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.324463] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455586.419520] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455599.164433] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455599.663806] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455600.370593] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455601.617755] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455602.568034] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455603.932952] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf097 di:ffffffffff600000 [21455611.900772] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455613.037794] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455624.475093] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455625.938343] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455626.770998] exe[262790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eca2a2ab9 cs:33 sp:7f94696b4ef8 ax:0 si:20000140 di:ffffffffff600000 [21455626.909133] exe[236204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c15b8f2ab9 cs:33 sp:7f7908ba0ef8 ax:0 si:20000140 di:ffffffffff600000 [21455627.685288] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455630.058756] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455630.102857] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557097 di:ffffffffff600000 [21455631.690925] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455631.839303] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455634.586555] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455636.119592] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455638.399557] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455640.161047] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455641.979261] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455642.611888] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455643.231970] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455644.065895] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455650.578375] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455655.559316] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.102114] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.549752] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455662.275653] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455666.501867] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455667.977274] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455674.753406] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455676.371178] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455685.906028] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455693.267970] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455696.630499] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455701.477095] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d097 di:ffffffffff600000 [21455709.992418] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455711.360715] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455712.164761] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455713.490919] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455714.065206] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455721.056465] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455725.704028] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455727.826709] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.520361] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.880799] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455739.712038] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455740.658732] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455742.184305] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455749.813084] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455753.426205] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455760.077282] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455761.980566] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455762.980724] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455765.412714] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.605899] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.794929] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455768.810620] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455777.444820] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6097 di:ffffffffff600000 [21455777.567378] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455782.478847] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455788.240306] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ce5bb7ab9 cs:33 sp:7fb59ad64858 ax:0 si:558ce5c11062 di:ffffffffff600000 [21455805.186522] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455807.413415] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455813.042457] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202097 di:ffffffffff600000 [21455815.027260] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455817.074043] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.606700] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.882974] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455825.572639] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c8f10ab9 cs:33 sp:7f5fd4c6b858 ax:0 si:55f3c8f6a062 di:ffffffffff600000 [21455834.668963] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515df14ab9 cs:33 sp:7f2c3b52f858 ax:0 si:56515df6e062 di:ffffffffff600000 [21455850.728499] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455851.441178] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455854.377874] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455862.232590] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455865.672576] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455869.961062] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455870.133984] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455870.240747] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455871.369073] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455879.085834] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455881.447717] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21456118.721770] potentially unexpected fatal signal 11. [21456118.727094] CPU: 30 PID: 280467 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21456118.739098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21456118.748734] RIP: 0033:0x55d7c59cee48 [21456118.752705] Code: 8b 54 15 10 48 39 15 d7 e8 c4 00 0f 82 c6 01 00 00 4c 8b 80 78 04 00 00 49 39 d6 48 8b 0c 24 4c 0f 42 f2 48 8b b0 70 04 00 00 <66> 0f 6f 05 20 81 06 00 4c 89 c2 48 c1 e2 04 4c 8d 5e 01 48 01 ca [21456118.771891] RSP: 002b:00007f8aed372170 EFLAGS: 00010246 [21456118.777557] RAX: 000055d7c5ac80c0 RBX: 000055d7c66257f0 RCX: 000055d7c66257f0 [21456118.785112] RDX: 0000000000000000 RSI: 0000000000000148 RDI: 0000000000000001 [21456118.794059] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [21456118.803014] R10: 0000000000021000 R11: 0000000000000010 R12: 0000000000000001 [21456118.811941] R13: 000055d7c661db60 R14: 0000000000000000 R15: 0000000000000001 [21456118.820883] FS: 000055d7c6624480 GS: 0000000000000000 [21456368.022678] exe[292956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868026ab9 cs:33 sp:7f2b44340858 ax:0 si:556868080062 di:ffffffffff600000 [21456494.905253] exe[289384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456495.370778] exe[289369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456495.418194] exe[262400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.608351] exe[290038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.800773] exe[298034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456498.466626] exe[272159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456499.006290] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.143136] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.333939] exe[298563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456503.638016] exe[262196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456503.883772] exe[276612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f35d858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.112958] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.340089] exe[289392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.539187] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.759838] exe[265386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456504.978607] exe[272995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456505.261093] exe[262943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456508.402863] warn_bad_vsyscall: 6 callbacks suppressed [21456508.402867] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.537669] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.546984] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.679746] exe[260202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.847149] exe[298575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456509.043512] exe[289494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456509.230462] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.266566] exe[277017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.328375] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.369582] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456513.441233] warn_bad_vsyscall: 81 callbacks suppressed [21456513.441236] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b097 di:ffffffffff600000 [21456513.549367] exe[290024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187097 di:ffffffffff600000 [21456513.845149] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.013889] exe[262209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456514.178607] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.319553] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.466224] exe[289378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456514.651231] exe[261001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.688730] exe[297845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.874248] exe[289310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456518.596191] warn_bad_vsyscall: 25 callbacks suppressed [21456518.596195] exe[260381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.739075] exe[265289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456518.906730] exe[289485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.951481] exe[289653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.136672] exe[298568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.261055] exe[282634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa2d858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.376198] exe[272988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456519.485841] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456519.596218] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.747608] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456523.701767] warn_bad_vsyscall: 32 callbacks suppressed [21456523.701771] exe[297849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704097 di:ffffffffff600000 [21456523.851927] exe[278227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456523.968029] exe[260293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456524.138529] exe[260326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.293183] exe[272441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456524.487610] exe[289916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.636601] exe[272066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456524.898325] exe[260181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456525.111467] exe[289337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456525.144268] exe[289678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.735258] warn_bad_vsyscall: 54 callbacks suppressed [21456528.735261] exe[266467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.857051] exe[262407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456528.989301] exe[305450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.258166] exe[298720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.305603] exe[262431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.492372] exe[282638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.639379] exe[262462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.702267] exe[262425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.838656] exe[281364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b070 di:ffffffffff600000 [21456529.982536] exe[261855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187070 di:ffffffffff600000 [21456533.833300] warn_bad_vsyscall: 26 callbacks suppressed [21456533.833304] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456533.974542] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.002319] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.030287] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.057690] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.085170] exe[260397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.113883] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.143265] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.169860] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.196693] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456576.862970] warn_bad_vsyscall: 60 callbacks suppressed [21456576.862973] exe[304276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593c2c4eab9 cs:33 sp:7faf15832858 ax:0 si:5593c2ca8062 di:ffffffffff600000 [21456577.038604] exe[281314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2e71f9ab9 cs:33 sp:7fd2ea4fa858 ax:0 si:55f2e7253062 di:ffffffffff600000 [21456778.595862] exe[312068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd60affab9 cs:33 sp:7f99faf12ef8 ax:0 si:20001600 di:ffffffffff600000 [21457156.932066] potentially unexpected fatal signal 5. [21457156.937297] CPU: 66 PID: 308290 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457156.949328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457156.958973] RIP: 0033:0x7fffffffe062 [21457156.962988] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457156.982203] RSP: 002b:000000c0005c5b90 EFLAGS: 00000297 [21457156.989227] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457156.996784] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000556685a00000 [21457157.004354] RBP: 000000c0005c5c28 R08: 0000000000000000 R09: 0000000000000000 [21457157.013301] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c5c18 [21457157.022242] R13: 000000c0005c9f50 R14: 000000c0005281c0 R15: 000000000004a9d9 [21457157.031159] FS: 0000000001f6c6b0 GS: 0000000000000000 [21457350.981244] exe[314203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4eba0aab9 cs:33 sp:7f4b38ad3ef8 ax:0 si:20002340 di:ffffffffff600000 [21457840.978269] potentially unexpected fatal signal 5. [21457840.983500] CPU: 40 PID: 300043 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457840.995498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457841.005209] RIP: 0033:0x7fffffffe062 [21457841.010578] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457841.031187] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21457841.038224] RAX: 00007fb2b8bb0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457841.047153] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2b8bb0000 [21457841.056096] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000a915000 [21457841.065031] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21457841.073966] R13: 0000000002883b00 R14: 000000c0002fd500 R15: 0000000000049000 [21457841.082902] FS: 000000000463f3c0 GS: 0000000000000000 [21458571.829891] potentially unexpected fatal signal 5. [21458571.835121] CPU: 33 PID: 351394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21458571.847148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21458571.856777] RIP: 0033:0x7fffffffe062 [21458571.860810] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21458571.880147] RSP: 002b:000000c0006afb90 EFLAGS: 00000297 [21458571.887161] RAX: 0000564ea5e00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21458571.896117] RDX: 0000000000000003 RSI: 0000000000196000 RDI: 0000564ea5e00000 [21458571.905100] RBP: 000000c0006afc28 R08: 0000000000000009 R09: 000000000a248000 [21458571.914067] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0006afc18 [21458571.923015] R13: 000000c0006b7620 R14: 000000c000007c00 R15: 0000000000055934 [21458571.931987] FS: 000000c00013b098 GS: 0000000000000000 [21458972.601295] exe[353364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e3e519ab9 cs:33 sp:7f57c6abd858 ax:0 si:555e3e573062 di:ffffffffff600000 [21459088.679755] exe[347574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e88afab9 cs:33 sp:7f21018a4ef8 ax:0 si:20000040 di:ffffffffff600000 [21459597.368617] exe[327770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21a1c6237 cs:33 sp:7ee82d39fef8 ax:2f700000 si:55a21a2342f7 di:ffffffffff600000 [21460278.285743] exe[339917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55764e71cab9 cs:33 sp:7fdf6c512858 ax:0 si:55764e776097 di:ffffffffff600000 [21460671.403584] exe[377114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c4c49f237 cs:33 sp:7f27dc2a7ef8 ax:2f700000 si:558c4c50d2f7 di:ffffffffff600000 [21461089.227994] exe[420544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55672df6dab9 cs:33 sp:7f4699cb4858 ax:0 si:55672dfc7070 di:ffffffffff600000 [21461274.972092] exe[423796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e202a8ab9 cs:33 sp:7fef9d91def8 ax:0 si:20000b00 di:ffffffffff600000 [21461459.019602] exe[396466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7d1a66ab9 cs:33 sp:7f2e13aad858 ax:0 si:55d7d1ac0062 di:ffffffffff600000 [21461495.056352] exe[344611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bf6d19ab9 cs:33 sp:7f4a3a92eef8 ax:0 si:20000240 di:ffffffffff600000 [21461495.216417] exe[396962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d5eb93ab9 cs:33 sp:7f0c034d7ef8 ax:0 si:20000240 di:ffffffffff600000 [21461525.259533] exe[416934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7c37aab9 cs:33 sp:7f1428487858 ax:0 si:559b7c3d4070 di:ffffffffff600000 [21461631.466325] potentially unexpected fatal signal 5. [21461631.471581] CPU: 9 PID: 343536 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21461631.483578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21461631.493219] RIP: 0033:0x7fffffffe062 [21461631.497243] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21461631.517838] RSP: 002b:000000c000395be8 EFLAGS: 00000297 [21461631.523514] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21461631.531165] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21461631.538718] RBP: 000000c000395c80 R08: 0000000000000000 R09: 0000000000000000 [21461631.546266] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000395c70 [21461631.553813] R13: 000000c0004a2000 R14: 000000c000007340 R15: 0000000000052e7b [21461631.561361] FS: 000000c000510098 GS: 0000000000000000 [21461882.371487] exe[403778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560d205eab9 cs:33 sp:7fcb61180858 ax:0 si:5560d20b8097 di:ffffffffff600000 [21462027.546570] exe[432030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a88979ab9 cs:33 sp:7ec07bfe3858 ax:0 si:562a889d3062 di:ffffffffff600000 [21462400.064490] potentially unexpected fatal signal 5. [21462400.069762] CPU: 91 PID: 413916 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462400.081743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462400.091378] RIP: 0033:0x7fffffffe062 [21462400.095371] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462400.114583] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462400.120216] RAX: 00007ff3de963000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462400.127820] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007ff3de963000 [21462400.135401] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000b3ef000 [21462400.144331] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21462400.153281] R13: 000000c000200008 R14: 000000c0002028c0 R15: 00000000000645cd [21462400.162222] FS: 00007fb88f7fe6c0 GS: 0000000000000000 [21462419.648958] potentially unexpected fatal signal 5. [21462419.654207] CPU: 80 PID: 450647 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462419.666237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462419.675869] RIP: 0033:0x7fffffffe062 [21462419.679856] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462419.699052] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462419.704743] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462419.713675] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055ffe0400000 [21462419.722596] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21462419.731532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21462419.740450] R13: 000000c000143008 R14: 000000c000429a40 R15: 000000000006dbce [21462419.749346] FS: 00007f8083fff6c0 GS: 0000000000000000 [21462500.503105] potentially unexpected fatal signal 5. [21462500.508330] CPU: 2 PID: 408775 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462500.520233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462500.529866] RIP: 0033:0x7fffffffe062 [21462500.533841] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462500.553017] RSP: 002b:000000c00016fb90 EFLAGS: 00000297 [21462500.558696] RAX: 000055acd50d1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462500.567600] RDX: 0000000000000001 RSI: 0000000000054000 RDI: 000055acd50d1000 [21462500.576550] RBP: 000000c00016fc28 R08: 0000000000000009 R09: 000000000cb7f000 [21462500.585501] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00016fc18 [21462500.594474] R13: 000000c000167f20 R14: 000000c00015d340 R15: 0000000000063841 [21462500.603441] FS: 000000c000180898 GS: 0000000000000000 [21462554.601170] exe[455149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d2cc78ab9 cs:33 sp:7f26b9e7a858 ax:0 si:558d2ccd2062 di:ffffffffff600000 [21463728.603384] potentially unexpected fatal signal 5. [21463728.608621] CPU: 10 PID: 461475 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21463728.620590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21463728.630236] RIP: 0033:0x7fffffffe062 [21463728.634282] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21463728.654885] RSP: 002b:000000c0006c1b90 EFLAGS: 00000297 [21463728.661863] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21463728.670825] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000561707200000 [21463728.679754] RBP: 000000c0006c1c28 R08: 0000000000000000 R09: 0000000000000000 [21463728.688662] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006c1c18 [21463728.697606] R13: 000000c0004357d0 R14: 000000c00047d880 R15: 000000000006f840 [21463728.706564] FS: 000000c00013b098 GS: 0000000000000000 [21463918.363665] exe[498331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37d1aaab9 cs:33 sp:7faae6ff0858 ax:0 si:55e37d204062 di:ffffffffff600000 [21464978.895311] exe[513103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565e578b237 cs:33 sp:7ee19ecf6ef8 ax:2f700000 si:5565e57f92f7 di:ffffffffff600000 [21465814.712561] exe[532275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581817deab9 cs:33 sp:7f7372e73858 ax:0 si:558181838062 di:ffffffffff600000 [21465970.933597] exe[531225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56275ec32ab9 cs:33 sp:7fb8148e7858 ax:0 si:56275ec8c062 di:ffffffffff600000 [21465998.713880] exe[530024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ef52dab9 cs:33 sp:7fb51ad60858 ax:0 si:5575ef587062 di:ffffffffff600000 [21466073.649116] exe[489951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55850896a6a2 cs:33 sp:7f793ead4f98 ax:7f793ead4fb0 si:ffffffffff600000 di:7f793ead4fb0 [21466214.704919] exe[512754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634298ce237 cs:33 sp:7ea8b58b3ef8 ax:2f700000 si:56342993c2f7 di:ffffffffff600000 [21467351.746990] potentially unexpected fatal signal 5. [21467351.752328] CPU: 67 PID: 493396 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467351.764322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467351.773934] RIP: 0033:0x7fffffffe062 [21467351.777897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467351.797143] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467351.802824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467351.811731] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21467351.820668] RBP: 000000c0002c1c28 R08: 0000000000000000 R09: 0000000000000000 [21467351.829589] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002c1c18 [21467351.838487] R13: 000000c000432150 R14: 000000c0004d6a80 R15: 0000000000078237 [21467351.847425] FS: 000000c00013b898 GS: 0000000000000000 [21467364.667673] exe[520501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc06efbab9 cs:33 sp:7f303b88b858 ax:0 si:55bc06f55062 di:ffffffffff600000 [21467469.112354] exe[561975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556feb65e237 cs:33 sp:7f41d63aaef8 ax:2f700000 si:556feb6cc2f7 di:ffffffffff600000 [21467749.282585] potentially unexpected fatal signal 5. [21467749.287818] CPU: 24 PID: 554176 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.299863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.309507] RIP: 0033:0x7fffffffe062 [21467749.313506] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.332713] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.338351] RAX: 00007fa409800000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.345893] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 00007fa409800000 [21467749.353432] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000021a00000 [21467749.360223] potentially unexpected fatal signal 5. [21467749.360989] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.366181] CPU: 39 PID: 560755 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.366185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.373719] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.373721] FS: 000000c00013b098 GS: 0000000000000000 [21467749.408585] RIP: 0033:0x7fffffffe062 [21467749.413949] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.433154] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.440241] RAX: 0000558eeee11000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.449180] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000558eeee11000 [21467749.458129] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000014a9b000 [21467749.467042] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.475991] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.484910] FS: 000000c00013b098 GS: 0000000000000000 [21467759.095320] exe[570907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d255a9adb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f006faf7fb0 [21467760.423716] exe[520433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625160dbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2b1c924fb0 [21467763.640219] exe[559748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c91627db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f54467fefb0 [21467842.868358] exe[577457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398add9237 cs:33 sp:7ec359a47ef8 ax:2f700000 si:56398ae472f7 di:ffffffffff600000 [21467866.934382] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739bbf8db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7efddcc3ffb0 [21467886.984744] exe[576231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee683cbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f6ae76ecfb0 [21467890.678766] exe[576497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605b6f1cdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fd8be6acfb0 [21467892.542036] exe[576023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1b1db3db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7eef2a7e2fb0 [21467899.102611] exe[574692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a1e1b6db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fb40c7fefb0 [21467899.244024] exe[574672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e2533db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f304e5c2fb0 [21467904.440820] exe[559762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581f3792db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed9d844afb0 [21467918.653559] exe[535838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a09259edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed8df9dbfb0 [21468226.191778] exe[512974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cde925aab9 cs:33 sp:7eb9254d5858 ax:0 si:55cde92b4062 di:ffffffffff600000 [21468246.434472] exe[592923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614c89f0ab9 cs:33 sp:7ece0823eef8 ax:0 si:20002780 di:ffffffffff600000 [21468599.402746] exe[533564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14e08ddb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2261f17fb0 [21468710.682821] exe[595403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebd1687ab9 cs:33 sp:7ecea8dfeef8 ax:0 si:200000c0 di:ffffffffff600000 [21469178.740239] exe[553398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469178.847277] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.890347] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0a9858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.899337] exe[555134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afb5d21ab9 cs:33 sp:7fd254341858 ax:0 si:55afb5d7b062 di:ffffffffff600000 [21469179.063525] exe[552157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469179.236431] exe[552242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469179.386465] exe[587752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469179.551832] exe[552188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469297.758573] potentially unexpected fatal signal 5. [21469297.763809] CPU: 78 PID: 608449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469297.775843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469297.785468] RIP: 0033:0x7fffffffe062 [21469297.789441] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469297.808598] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469297.814206] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469297.821729] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469297.829250] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469297.836772] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469297.844286] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469297.851826] FS: 000000c00013b098 GS: 0000000000000000 [21469298.163765] potentially unexpected fatal signal 5. [21469298.168991] CPU: 41 PID: 602132 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.180980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.190676] RIP: 0033:0x7fffffffe062 [21469298.194636] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.213831] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.219866] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.227452] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.236394] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.243954] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21469298.252900] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.261834] FS: 000000c00013b098 GS: 0000000000000000 [21469298.598127] potentially unexpected fatal signal 5. [21469298.603348] CPU: 78 PID: 618111 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.615334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.617411] potentially unexpected fatal signal 5. [21469298.625001] RIP: 0033:0x7fffffffe062 [21469298.625006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630286] CPU: 25 PID: 604302 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.630288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.630294] RIP: 0033:0x7fffffffe062 [21469298.630298] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630299] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.630302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.630302] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.630304] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.630304] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.630305] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.630306] FS: 000000c00013b098 GS: 0000000000000000 [21469298.757094] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.762778] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.771718] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.780660] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.789618] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.798584] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.807504] FS: 000000c00013b098 GS: 0000000000000000 [21469574.669749] potentially unexpected fatal signal 11. [21469574.675076] CPU: 32 PID: 620584 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469574.687178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469574.696819] RIP: 0033:0x564aa86f1c25 [21469574.700813] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21469574.720112] RSP: 002b:00007f3f689e4440 EFLAGS: 00010246 [21469574.725790] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000564aa86f1e0d [21469574.733364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21469574.740950] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000564aa9352320 [21469574.748536] R10: 0000564aa9353480 R11: 0000564aa9352320 R12: 0000000000000000 [21469574.756110] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21469574.763681] FS: 0000564aa9353480 GS: 0000000000000000 [21470980.613558] potentially unexpected fatal signal 5. [21470980.618804] CPU: 89 PID: 655177 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21470980.630782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21470980.640410] RIP: 0033:0x7fffffffe062 [21470980.644376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21470980.663560] RSP: 002b:000000c0005d9b90 EFLAGS: 00000297 [21470980.669251] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21470980.678162] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007f6afe600000 [21470980.687125] RBP: 000000c0005d9c28 R08: 0000000000000000 R09: 0000000000000000 [21470980.694685] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005d9c18 [21470980.703643] R13: 000000c000296f60 R14: 000000c000498e00 R15: 000000000009ed0e [21470980.712558] FS: 000000c00013b098 GS: 0000000000000000 [21471310.267546] exe[632672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acda42fab9 cs:33 sp:7f04176f0858 ax:0 si:55acda489062 di:ffffffffff600000 [21471753.283716] exe[679113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776f0caab9 cs:33 sp:7fe5489ea858 ax:0 si:55776f124062 di:ffffffffff600000 [21471761.906531] exe[594577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558308062ab9 cs:33 sp:7f2e6bfacef8 ax:0 si:20000100 di:ffffffffff600000 [21471762.104739] exe[594663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2d81e3ab9 cs:33 sp:7f42fd486ef8 ax:0 si:20000100 di:ffffffffff600000 [21472111.523931] exe[623095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a646ed237 cs:33 sp:7fc3e4737ef8 ax:2f700000 si:563a6475b2f7 di:ffffffffff600000 [21472569.034266] exe[689624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.308129] exe[690338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472569.555031] exe[689413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.807115] exe[688626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472570.054573] exe[672615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472570.231706] exe[690344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f097 di:ffffffffff600000 [21472570.484629] exe[690352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e062 di:ffffffffff600000 [21472571.749834] exe[689805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472684.647192] exe[684550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f062 di:ffffffffff600000 [21472684.800694] exe[670931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b18da7ab9 cs:33 sp:7f6b6e842858 ax:0 si:562b18e01062 di:ffffffffff600000 [21472727.258715] exe[694910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636eea98ab9 cs:33 sp:7f2d5b6e4ef8 ax:0 si:20000980 di:ffffffffff600000 [21472832.318082] exe[679524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556287e96ab9 cs:33 sp:7ecd6a756ef8 ax:0 si:20002780 di:ffffffffff600000 [21472917.771566] potentially unexpected fatal signal 5. [21472917.776782] CPU: 89 PID: 621861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.788766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.798417] RIP: 0033:0x7fffffffe062 [21472917.800096] potentially unexpected fatal signal 5. [21472917.802400] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.807814] CPU: 29 PID: 661226 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.807816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.807820] RIP: 0033:0x7fffffffe062 [21472917.807824] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.827032] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.827034] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.827035] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472917.827035] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472917.827036] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.827036] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.827037] FS: 000000c000180898 GS: 0000000000000000 [21472917.837444] potentially unexpected fatal signal 5. [21472917.840387] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.850027] CPU: 94 PID: 697815 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.850029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.850033] RIP: 0033:0x7fffffffe062 [21472917.850035] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.850036] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.855365] RAX: 0000561133622000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.855366] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000561133622000 [21472917.855366] RBP: 000000c0004e7c28 R08: 0000000000000009 R09: 0000000000dfc000 [21472917.855367] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.855367] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.855368] FS: 000000c000180898 GS: 0000000000000000 [21472918.041108] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472918.048674] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472918.057581] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472918.065169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472918.074097] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472918.083027] FS: 000000c000180898 GS: 0000000000000000 [21473050.901525] exe[675123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb0359ab9 cs:33 sp:7eff9c3fd858 ax:0 si:556fb03b3062 di:ffffffffff600000 [21473051.090358] exe[707647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b863faab9 cs:33 sp:7f375bd07858 ax:0 si:557b86454062 di:ffffffffff600000 [21473161.005410] exe[706242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56188ba59ab9 cs:33 sp:7f5da51af858 ax:0 si:56188bab3062 di:ffffffffff600000 [21473273.199113] potentially unexpected fatal signal 5. [21473273.204361] CPU: 45 PID: 641771 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21473273.216341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21473273.226010] RIP: 0033:0x7fffffffe062 [21473273.230031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21473273.254833] RSP: 002b:000000c0007e9be8 EFLAGS: 00000297 [21473273.261825] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21473273.270749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21473273.279737] RBP: 000000c0007e9c80 R08: 0000000000000000 R09: 0000000000000000 [21473273.288645] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0007e9c70 [21473273.297597] R13: 000000c000709000 R14: 000000c0004508c0 R15: 0000000000099c66 [21473273.306549] FS: 000000c000181098 GS: 0000000000000000 [21473639.198103] exe[713242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f99343237 cs:33 sp:7facd3edbef8 ax:2f700000 si:556f993b12f7 di:ffffffffff600000 [21473639.309251] exe[719280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584975a6237 cs:33 sp:7f54d430def8 ax:2f700000 si:5584976142f7 di:ffffffffff600000 [21474433.226169] potentially unexpected fatal signal 11. [21474433.231508] CPU: 47 PID: 732070 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474433.243494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474433.253144] RIP: 0033:0x55ababf92939 [21474433.257194] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474433.276444] RSP: 002b:00007faacfe42440 EFLAGS: 00010206 [21474433.283894] RAX: 00000000000000ac RBX: 0000000000000000 RCX: 000055ababf92dd3 [21474433.292879] RDX: 00000000000000ac RSI: 0000000000000000 RDI: 0000000001200011 [21474433.301848] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474433.310787] R10: 000055abacbf4750 R11: 0000000000000246 R12: 00000000000000ac [21474433.319760] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474433.328713] FS: 000055abacbf4480 GS: 0000000000000000 [21474486.052660] exe[724386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e48931bab9 cs:33 sp:7f9d7503c858 ax:0 si:55e489375070 di:ffffffffff600000 [21474522.088569] exe[727745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f7a82ab9 cs:33 sp:7fda66dbf858 ax:0 si:5568f7adc062 di:ffffffffff600000 [21474832.760128] exe[747400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594970afab9 cs:33 sp:7fbe7b3a0858 ax:0 si:559497109070 di:ffffffffff600000 [21474857.677082] exe[692971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619cf693ab9 cs:33 sp:7fdf7ee49858 ax:0 si:5619cf6ed062 di:ffffffffff600000 [21474879.155450] potentially unexpected fatal signal 11. [21474879.160783] CPU: 9 PID: 747410 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474879.172687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474879.182332] RIP: 0033:0x56223dc70939 [21474879.186369] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474879.205574] RSP: 002b:00007fbd2884b440 EFLAGS: 00010202 [21474879.212684] RAX: 00000000000002b9 RBX: 0000000000000000 RCX: 000056223dc70dd3 [21474879.220206] RDX: 00000000000002b9 RSI: 0000000000000000 RDI: 0000000001200011 [21474879.227745] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474879.236670] R10: 000056223e8d2750 R11: 0000000000000246 R12: 00000000000002b9 [21474879.245643] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474879.254548] FS: 000056223e8d2480 GS: 0000000000000000 [21474970.540643] potentially unexpected fatal signal 11. [21474970.545979] CPU: 93 PID: 743608 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474970.557964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474970.567624] RIP: 0033:0x559dac617ae7 [21474970.571663] Code: 54 10 00 01 00 00 00 48 c7 05 71 54 10 00 00 00 00 00 c7 05 57 54 10 00 01 00 00 00 0f 11 05 c0 54 10 00 0f 11 05 39 54 10 00 <64> 4c 8b 14 25 10 00 00 00 48 85 c0 74 52 48 89 c2 48 83 e2 fe a8 [21474970.590863] RSP: 002b:00007fe06f67d440 EFLAGS: 00010202 [21474970.597914] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000559dac617e0d [21474970.605494] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000559dad279760 [21474970.614429] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000559dad278320 [21474970.623350] R10: 0000559dad279750 R11: 0000559dad278320 R12: 0000000000000000 [21474970.630910] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21474970.639841] FS: 0000559dad279480 GS: 0000000000000000 [21475909.194964] exe[773601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a39eadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21475909.561124] exe[747828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560474c7bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21476127.975264] exe[771443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bd617edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f90c6aecfb0 [21476783.706034] exe[794571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5df63cab9 cs:33 sp:7f8ed6ab1ef8 ax:0 si:20003700 di:ffffffffff600000 [21477144.587669] exe[804852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dcaf42ab9 cs:33 sp:7eb087e4def8 ax:0 si:20000280 di:ffffffffff600000 [21477156.677327] exe[791612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b82e17ab9 cs:33 sp:7ebff14f8858 ax:0 si:559b82e71062 di:ffffffffff600000 [21477165.321006] exe[744296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591ec74fab9 cs:33 sp:7faa65eecef8 ax:0 si:20000280 di:ffffffffff600000 [21477189.114957] exe[745613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cc5e5dab9 cs:33 sp:7fbd89ad3858 ax:0 si:556cc5eb7062 di:ffffffffff600000 [21477542.320802] exe[782266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb9a348ab9 cs:33 sp:7f3271423858 ax:0 si:55cb9a3a2062 di:ffffffffff600000 [21477544.431619] exe[784210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7f1154ab9 cs:33 sp:7f87ef6f6858 ax:0 si:55b7f11ae062 di:ffffffffff600000 [21477548.287765] exe[761064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b1ab9 cs:33 sp:7f0e195fc858 ax:0 si:563ec320b062 di:ffffffffff600000 [21477549.352357] exe[780574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ed757bab9 cs:33 sp:7fb2b8aac858 ax:0 si:558ed75d5062 di:ffffffffff600000 [21477549.607344] exe[808166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56141b2fbab9 cs:33 sp:7eceea3db858 ax:0 si:56141b355062 di:ffffffffff600000 [21477551.490360] exe[806743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e54051ab9 cs:33 sp:7f7f4c46c858 ax:0 si:558e540ab062 di:ffffffffff600000 [21477554.129888] exe[793703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fb3d42ab9 cs:33 sp:7ee0876e8858 ax:0 si:563fb3d9c062 di:ffffffffff600000 [21477656.470322] exe[782858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea247c7ab9 cs:33 sp:7fbe55948858 ax:0 si:55ea24821062 di:ffffffffff600000 [21477660.861385] exe[760596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745aee5ab9 cs:33 sp:7f1756f33858 ax:0 si:55745af3f062 di:ffffffffff600000 [21477664.663480] exe[809737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fb07b8ab9 cs:33 sp:7f213effe858 ax:0 si:555fb0812062 di:ffffffffff600000 [21477665.350795] exe[796310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc68005ab9 cs:33 sp:7f7989ca3ef8 ax:0 si:20000280 di:ffffffffff600000 [21477700.557299] exe[810118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cbef4ab9 cs:33 sp:7ef66b5a1ef8 ax:0 si:20003e80 di:ffffffffff600000 [21477919.026029] exe[806393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565142328237 cs:33 sp:7ed0f5243ef8 ax:2f700000 si:5651423962f7 di:ffffffffff600000 [21478171.460680] exe[809767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce1302d237 cs:33 sp:7ed796effef8 ax:2f700000 si:55ce1309b2f7 di:ffffffffff600000 [21478384.056987] exe[824026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56095dcd1ab9 cs:33 sp:7f2096b9b858 ax:0 si:56095dd2b062 di:ffffffffff600000 [21478420.407252] potentially unexpected fatal signal 5. [21478420.412488] CPU: 16 PID: 811262 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478420.424472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478420.434095] RIP: 0033:0x7fffffffe062 [21478420.438078] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478420.457284] RSP: 002b:000000c0004d3b90 EFLAGS: 00000297 [21478420.462951] RAX: 0000001b2c020000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478420.470502] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b2c020000 [21478420.478074] RBP: 000000c0004d3c28 R08: 0000000000000009 R09: 000000001de00000 [21478420.485617] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004d3c18 [21478420.494536] R13: 000000c0004dcb10 R14: 000000c00050a380 R15: 00000000000c5d8a [21478420.503654] FS: 000000c000478098 GS: 0000000000000000 [21478510.223216] potentially unexpected fatal signal 5. [21478510.228464] CPU: 31 PID: 792294 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478510.240476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478510.250181] RIP: 0033:0x7fffffffe062 [21478510.254179] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478510.273408] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21478510.280428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478510.289402] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478510.298318] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21478510.307259] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21478510.316229] R13: 0000000002883b00 R14: 000000c000183180 R15: 00000000000b6d3d [21478510.325169] FS: 0000000004b153c0 GS: 0000000000000000 [21478577.469029] exe[824326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe53ef3ab9 cs:33 sp:7fa3cdb3f858 ax:0 si:55fe53f4d062 di:ffffffffff600000 [21478700.342208] exe[830651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8c7aed6a2 cs:33 sp:7f5b6cf6bf98 ax:7f5b6cf6bfb0 si:ffffffffff600000 di:7f5b6cf6bfb0 [21478872.906529] potentially unexpected fatal signal 5. [21478872.911810] CPU: 63 PID: 810753 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478872.923829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478872.933491] RIP: 0033:0x7fffffffe062 [21478872.937541] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478872.958122] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [21478872.965131] RAX: 00000000000cd2d4 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478872.974040] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [21478872.981610] RBP: 000000c0005fdc28 R08: 000000c00050e100 R09: 0000000000000000 [21478872.989152] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005fdc18 [21478872.996699] R13: 000000c00035ff50 R14: 000000c000501500 R15: 00000000000c5eeb [21478873.004247] FS: 000000c00013b098 GS: 0000000000000000 [21478884.173897] potentially unexpected fatal signal 5. [21478884.179115] CPU: 66 PID: 829817 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478884.191098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478884.200794] RIP: 0033:0x7fffffffe062 [21478884.204767] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478884.225334] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21478884.232345] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478884.241299] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478884.250196] RBP: 000000c0005fbc28 R08: 0000000000000000 R09: 0000000000000000 [21478884.257729] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fbc18 [21478884.266661] R13: 000000c000018b10 R14: 000000c00033f500 R15: 00000000000ca695 [21478884.275592] FS: 000000c000180898 GS: 0000000000000000 [21479052.894729] exe[805774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c9517ab9 cs:33 sp:7efbab512858 ax:0 si:5569c9571062 di:ffffffffff600000 [21479161.680204] exe[816693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55567124eab9 cs:33 sp:7ff98fb24ef8 ax:0 si:20001400 di:ffffffffff600000 [21479250.728328] potentially unexpected fatal signal 5. [21479250.733567] CPU: 18 PID: 847524 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479250.745571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479250.755218] RIP: 0033:0x7fffffffe062 [21479250.759278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21479250.779877] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21479250.786884] RAX: 0000562b4c097000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21479250.795796] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000562b4c097000 [21479250.804752] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000013743000 [21479250.813641] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21479250.822596] R13: 000000c000180808 R14: 000000c000512540 R15: 00000000000cec0b [21479250.831524] FS: 00007f0184bbf6c0 GS: 0000000000000000 [21479337.250524] potentially unexpected fatal signal 11. [21479337.255835] CPU: 29 PID: 851022 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479337.267814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479337.277450] RIP: 0033:0x558de0e8dc25 [21479337.281422] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21479337.300642] RSP: 002b:00007f74c4800440 EFLAGS: 00010246 [21479337.306271] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000558de0e8de0d [21479337.313914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21479337.322786] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000558de1aee320 [21479337.331716] R10: 0000558de1aef480 R11: 0000558de1aee320 R12: 0000000000000000 [21479337.340732] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21479337.349670] FS: 0000558de1aef480 GS: 0000000000000000 [21479649.942904] potentially unexpected fatal signal 11. [21479649.948222] CPU: 94 PID: 842697 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479649.960207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479649.969834] RIP: 0033:0x5593fc59437b [21479649.973849] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21479649.993047] RSP: 002b:00007fe5bfc60310 EFLAGS: 00010246 [21479650.000106] RAX: 00007fe5bfc60470 RBX: 00007fe5bfc60470 RCX: 0000000000000000 [21479650.009030] RDX: 00007fec7c0000a8 RSI: 00007fe5bfc604e0 RDI: 00007fe5bfc604f0 [21479650.016578] RBP: 0000000000000000 R08: 00007fec7c0000a8 R09: 00005593fc708f8c [21479650.025522] R10: 0000000000000006 R11: 00000000861c4adf R12: 00005593fc708f80 [21479650.034458] R13: 0000000000000ff4 R14: 00005593fc708f80 R15: 00007fe5bfc60418 [21479650.043391] FS: 00005593fd239480 GS: 0000000000000000 [21479699.397909] exe[859624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623330aaab9 cs:33 sp:7ea5cf5ec858 ax:0 si:562333104062 di:ffffffffff600000 [21480023.529021] exe[865602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2a9a66db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20000 [21480243.333785] potentially unexpected fatal signal 5. [21480243.339027] CPU: 1 PID: 801895 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480243.350926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480243.360596] RIP: 0033:0x7fffffffe062 [21480243.364610] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480243.385199] RSP: 002b:000000c000619b90 EFLAGS: 00000297 [21480243.392215] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480243.401117] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480243.410032] RBP: 000000c000619c28 R08: 0000000000000000 R09: 0000000000000000 [21480243.418937] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000619c18 [21480243.427866] R13: 000000c00027f3e0 R14: 000000c00047cfc0 R15: 00000000000c2cbf [21480243.436880] FS: 0000000001f6c6b0 GS: 0000000000000000 [21480244.143323] potentially unexpected fatal signal 5. [21480244.148538] CPU: 70 PID: 881452 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480244.160506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480244.170154] RIP: 0033:0x7fffffffe062 [21480244.174145] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480244.193378] RSP: 002b:000000c0006bdb90 EFLAGS: 00000297 [21480244.200354] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480244.209243] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480244.218167] RBP: 000000c0006bdc28 R08: 0000000000000000 R09: 0000000000000000 [21480244.227081] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006bdc18 [21480244.235993] R13: 000000c0006d12f0 R14: 000000c000582700 R15: 00000000000d6880 [21480244.244903] FS: 0000000001f6c6b0 GS: 0000000000000000 [21481121.618219] potentially unexpected fatal signal 11. [21481121.623525] CPU: 17 PID: 902823 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.635530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.645154] RIP: 0033:0x562def94d0e9 [21481121.649162] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21481121.668331] RSP: 002b:00007f0a074b9448 EFLAGS: 00010213 [21481121.673970] RAX: 0000000000000016 RBX: 0000562def9973b9 RCX: 0000562def94d0d7 [21481121.681498] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f0a074ba5c0 [21481121.689070] RBP: 00007f0a074ba59c R08: 000000000ff9287e R09: 000000000000064a [21481121.696600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a074ba5c0 [21481121.704150] R13: 0000562def9973b9 R14: 00000000000c4511 R15: 0000000000000001 [21481121.711687] FS: 0000562df05aa480 GS: 0000000000000000 [21481121.740008] potentially unexpected fatal signal 5. [21481121.746288] CPU: 0 PID: 872651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.758220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.767921] RIP: 0033:0x7fffffffe062 [21481121.771910] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21481121.792490] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21481121.798119] RAX: 000055baa24c3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21481121.805681] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055baa24c3000 [21481121.813230] RBP: 000000c0007b5c80 R08: 0000000000000009 R09: 00000000015ff000 [21481121.820813] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0007b5c70 [21481121.828377] R13: 000000c0007c8000 R14: 000000c000600700 R15: 00000000000d33d0 [21481121.835944] FS: 0000000002207a30 GS: 0000000000000000 [21482335.349100] exe[1044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.506353] exe[986244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.513247] exe[992689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.587041] exe[995596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.603431] exe[985950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482335.655893] exe[992148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.717672] exe[985974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482590.318033] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.466654] exe[998500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.589375] exe[989500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.600870] exe[16739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.727136] exe[998442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.729617] exe[980723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.844729] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482693.531235] exe[16690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5a95cddb1 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:6104a600 [21482845.725119] exe[9897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae682ec237 cs:33 sp:7f3a88091ef8 ax:2f700000 si:55ae6835a2f7 di:ffffffffff600000 [21482851.027934] exe[984448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555efcd3aab9 cs:33 sp:7eafe8581ef8 ax:0 si:200001c0 di:ffffffffff600000 [21483101.697538] exe[3885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605293b0237 cs:33 sp:7f73e722aef8 ax:2f700000 si:56052941e2f7 di:ffffffffff600000 [21484774.127790] potentially unexpected fatal signal 5. [21484774.133075] CPU: 86 PID: 10961 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21484774.145027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21484774.154682] RIP: 0033:0x7fffffffe062 [21484774.158733] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21484774.179289] RSP: 002b:000000c000765be8 EFLAGS: 00000297 [21484774.186327] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21484774.195265] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21484774.204186] RBP: 000000c000765c80 R08: 0000000000000000 R09: 0000000000000000 [21484774.213108] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000765c70 [21484774.222155] R13: 000000c000772800 R14: 000000c0003f2fc0 R15: 00000000000ee3eb [21484774.231057] FS: 000000c000180098 GS: 0000000000000000 [21484775.493485] exe[987631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561befba7ab9 cs:33 sp:7f6e4f687858 ax:0 si:561befc01062 di:ffffffffff600000 [21484775.641069] exe[40620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21484775.773756] exe[988558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56492487cab9 cs:33 sp:7f85b465f858 ax:0 si:5649248d6062 di:ffffffffff600000 [21484775.899887] exe[988584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21485248.883548] exe[72235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bee897eab9 cs:33 sp:7fd5b25db858 ax:0 si:55bee89d8062 di:ffffffffff600000 [21485597.395702] exe[76974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a82a8ab9 cs:33 sp:7ff9f9428858 ax:0 si:55c3a8302097 di:ffffffffff600000 [21486064.276064] exe[69844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d7b35237 cs:33 sp:7f6772a78ef8 ax:2f700000 si:5603d7ba32f7 di:ffffffffff600000 [21486082.220054] exe[66011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b47f646237 cs:33 sp:7eb15db77ef8 ax:2f700000 si:55b47f6b42f7 di:ffffffffff600000 [21486082.854751] exe[80182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f758499237 cs:33 sp:7f96898e4ef8 ax:2f700000 si:55f7585072f7 di:ffffffffff600000 [21486086.027070] exe[37063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adeec17237 cs:33 sp:7f4916f9bef8 ax:2f700000 si:55adeec852f7 di:ffffffffff600000 [21486132.261857] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486140.595878] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614d2fc9ab9 cs:33 sp:7eeb438bf858 ax:0 si:5614d3023062 di:ffffffffff600000 [21486148.783739] exe[63461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fcfd28ab9 cs:33 sp:7eef636b6858 ax:0 si:560fcfd82062 di:ffffffffff600000 [21486148.899957] exe[73499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486378.537877] exe[993887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c75533237 cs:33 sp:7f67f3c8fef8 ax:2f700000 si:556c755a12f7 di:ffffffffff600000 [21486383.062786] exe[12601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564e0d65237 cs:33 sp:7fe4788ecef8 ax:2f700000 si:5564e0dd32f7 di:ffffffffff600000 [21486670.442980] exe[34914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeffb3c237 cs:33 sp:7fc2fc50bef8 ax:2f700000 si:55eeffbaa2f7 di:ffffffffff600000 [21486831.201722] exe[71317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573e3201ab9 cs:33 sp:7fed18084858 ax:0 si:5573e325b062 di:ffffffffff600000 [21486855.593161] exe[37602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2868e237 cs:33 sp:7eb24b84eef8 ax:2f700000 si:558c286fc2f7 di:ffffffffff600000 [21487075.384724] exe[53227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565345b1fab9 cs:33 sp:7f9a71770858 ax:0 si:565345b79062 di:ffffffffff600000 [21487161.886037] exe[77175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9fea9d237 cs:33 sp:7ff3e4381ef8 ax:2f700000 si:55c9feb0b2f7 di:ffffffffff600000 [21487269.246050] exe[92835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621941d9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:204000 [21487388.893924] exe[53398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55611e3fe237 cs:33 sp:7feb32bd8ef8 ax:2f700000 si:55611e46c2f7 di:ffffffffff600000 [21487638.813995] exe[80263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487638.917690] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.023233] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.124740] exe[58123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487950.793970] exe[54996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487950.984434] exe[60085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563189fccab9 cs:33 sp:7eb0db991858 ax:0 si:56318a026062 di:ffffffffff600000 [21487951.192313] exe[61555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487951.432673] exe[57336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557781fe3ab9 cs:33 sp:7eb77f99a858 ax:0 si:55778203d062 di:ffffffffff600000 [21488296.011217] exe[18729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf2009c237 cs:33 sp:7f793364cef8 ax:2f700000 si:55cf2010a2f7 di:ffffffffff600000 [21488377.315044] potentially unexpected fatal signal 5. [21488377.320267] CPU: 54 PID: 52185 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21488377.332195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21488377.341873] RIP: 0033:0x7fffffffe062 [21488377.345952] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21488377.366513] RSP: 002b:000000c0007cdbe8 EFLAGS: 00000297 [21488377.373527] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21488377.382455] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21488377.391400] RBP: 000000c0007cdc80 R08: 0000000000000000 R09: 0000000000000000 [21488377.400301] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007cdc70 [21488377.409225] R13: 000000c0006c8800 R14: 000000c00049ce00 R15: 000000000000b8c5 [21488377.418157] FS: 000000c000506898 GS: 0000000000000000 [21488398.951114] exe[29524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa88cd237 cs:33 sp:7f4469d25ef8 ax:2f700000 si:561aa893b2f7 di:ffffffffff600000 [21488471.536086] exe[100303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570afed9237 cs:33 sp:7f363c7feef8 ax:2f700000 si:5570aff472f7 di:ffffffffff600000 [21488537.040749] exe[32841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac3fe22237 cs:33 sp:7ec240b4cef8 ax:2f700000 si:55ac3fe902f7 di:ffffffffff600000 [21488578.931164] exe[110043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e86547237 cs:33 sp:7fa978300ef8 ax:2f700000 si:556e865b52f7 di:ffffffffff600000 [21488710.753761] exe[93342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a86158ab9 cs:33 sp:7f7028ae7858 ax:0 si:558a861b2062 di:ffffffffff600000 [21488900.837349] exe[90269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae20703237 cs:33 sp:7ea2749c1ef8 ax:2f700000 si:55ae207712f7 di:ffffffffff600000 [21488917.816802] exe[77022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560844fe5237 cs:33 sp:7f89ab9dbef8 ax:2f700000 si:5608450532f7 di:ffffffffff600000 [21489069.135922] exe[131570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.319302] exe[129038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584097 di:ffffffffff600000 [21489069.345964] exe[129466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.347076] exe[128818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f3436269858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.481343] exe[131568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.641487] exe[128876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c097 di:ffffffffff600000 [21489069.814621] exe[129565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.995248] exe[131933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c062 di:ffffffffff600000 [21489070.171070] exe[134667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde062 di:ffffffffff600000 [21489070.297033] exe[129593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584062 di:ffffffffff600000 [21489171.087511] warn_bad_vsyscall: 10 callbacks suppressed [21489171.087515] exe[124751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56003e4baab9 cs:33 sp:7f7500446858 ax:0 si:56003e514070 di:ffffffffff600000 [21489337.557745] exe[128193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455fb69ab9 cs:33 sp:7ff630647858 ax:0 si:56455fbc3097 di:ffffffffff600000 [21489337.726272] exe[139876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559efccf9ab9 cs:33 sp:7fcacb2cc858 ax:0 si:559efcd53097 di:ffffffffff600000 [21489423.022047] exe[130159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.123977] exe[128580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21489423.199574] exe[112506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.514587] exe[137623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21490182.691201] exe[140306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56384ac0f237 cs:33 sp:7fb24afbcef8 ax:2f700000 si:56384ac7d2f7 di:ffffffffff600000 [21490325.802951] exe[145680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bed410ab9 cs:33 sp:7f70bb52e858 ax:0 si:562bed46a062 di:ffffffffff600000 [21490488.011838] exe[140658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56303e472ab9 cs:33 sp:7fb631ad8858 ax:0 si:56303e4cc062 di:ffffffffff600000 [21490488.170531] exe[143117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d631e5ab9 cs:33 sp:7f14929cb858 ax:0 si:557d6323f062 di:ffffffffff600000 [21490548.100847] exe[145671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593dc258ab9 cs:33 sp:7ee0e6831858 ax:0 si:5593dc2b2097 di:ffffffffff600000 [21490725.790655] potentially unexpected fatal signal 5. [21490725.795898] CPU: 1 PID: 154164 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490725.807785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490725.817440] RIP: 0033:0x7fffffffe062 [21490725.821498] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490725.842198] RSP: 002b:000000c00078fbe8 EFLAGS: 00000297 [21490725.849221] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490725.858134] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490725.867124] RBP: 000000c00078fc80 R08: 0000000000000000 R09: 0000000000000000 [21490725.876065] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00078fc70 [21490725.884983] R13: 00000000162a7ede R14: 000000c000514700 R15: 000000000002581f [21490725.893896] FS: 000000c00013a898 GS: 0000000000000000 [21490738.728767] potentially unexpected fatal signal 5. [21490738.733992] CPU: 4 PID: 154069 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490738.745918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490738.755595] RIP: 0033:0x7fffffffe062 [21490738.759683] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490738.780289] RSP: 002b:000000c000777be8 EFLAGS: 00000297 [21490738.787286] RAX: 0000000000025be1 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490738.796231] RDX: 0000000000000000 RSI: 000000c000778000 RDI: 0000000000012f00 [21490738.805200] RBP: 000000c000777c80 R08: 000000c000a941f0 R09: 0000000000000000 [21490738.814136] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000777c70 [21490738.823087] R13: 000000c000567800 R14: 000000c000530e00 R15: 000000000002595e [21490738.831992] FS: 0000000002207a30 GS: 0000000000000000 [21490834.622698] potentially unexpected fatal signal 5. [21490834.622984] potentially unexpected fatal signal 5. [21490834.623241] potentially unexpected fatal signal 5. [21490834.623246] CPU: 46 PID: 154655 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.623247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.623252] RIP: 0033:0x7fffffffe062 [21490834.623254] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.623255] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.623257] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.623258] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.623259] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.623260] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.623261] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.623262] FS: 000000c000464098 GS: 0000000000000000 [21490834.627587] potentially unexpected fatal signal 5. [21490834.627593] CPU: 2 PID: 154656 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627601] RIP: 0033:0x7fffffffe062 [21490834.627604] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.627605] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.627607] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.627608] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.627609] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.627610] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.627611] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.627611] FS: 000000c000464098 GS: 0000000000000000 [21490834.627942] CPU: 36 PID: 154347 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627949] RIP: 0033:0x7fffffffe062 [21490834.627954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633202] CPU: 3 PID: 154316 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.633203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.633206] RIP: 0033:0x7fffffffe062 [21490834.633210] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633211] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.633213] RAX: 0000000000026844 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.633214] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490834.633215] RBP: 000000c000767c80 R08: 000000c0003a6a60 R09: 0000000000000000 [21490834.633215] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490834.633217] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.633218] FS: 000000c000464098 GS: 0000000000000000 [21490834.999588] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490835.006608] RAX: 0000000000026843 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490835.015547] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490835.024448] RBP: 000000c000767c80 R08: 000000c0003a71e0 R09: 0000000000000000 [21490835.033396] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490835.042322] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490835.051256] FS: 000000c000464098 GS: 0000000000000000 [21490865.452258] exe[121095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f985b77ab9 cs:33 sp:7ea2c65fd858 ax:0 si:55f985bd1062 di:ffffffffff600000 [21491105.882045] exe[136321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e89ccab9 cs:33 sp:7f6927170ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.049563] exe[150088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3886ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.081031] exe[158268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3865ef8 ax:0 si:20000080 di:ffffffffff600000 [21491245.032012] potentially unexpected fatal signal 5. [21491245.037263] CPU: 40 PID: 165169 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491245.049284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491245.058916] RIP: 0033:0x7fffffffe062 [21491245.062891] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491245.082081] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21491245.087927] RAX: 000000000002877f RBX: 0000000000000000 RCX: 00007fffffffe05a [21491245.095557] RDX: 0000000000000000 RSI: 000000c00076c000 RDI: 0000000000012f00 [21491245.104486] RBP: 000000c00076bc80 R08: 000000c0003e82e0 R09: 0000000000000000 [21491245.113455] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00076bc70 [21491245.122411] R13: 000000c0005ff000 R14: 000000c0002afdc0 R15: 0000000000028510 [21491245.131372] FS: 0000000002207a30 GS: 0000000000000000 [21491989.343402] potentially unexpected fatal signal 5. [21491989.348631] CPU: 77 PID: 164449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491989.360657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491989.370302] RIP: 0033:0x7fffffffe062 [21491989.374361] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491989.394993] RSP: 002b:000000c000861be8 EFLAGS: 00000297 [21491989.401995] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21491989.410920] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21491989.419839] RBP: 000000c000861c80 R08: 0000000000000000 R09: 0000000000000000 [21491989.428811] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000861c70 [21491989.437750] R13: 000000c0005b3800 R14: 000000c000511c00 R15: 000000000001a0b1 [21491989.446677] FS: 000000c00013b098 GS: 0000000000000000 [21492010.033828] potentially unexpected fatal signal 5. [21492010.039043] CPU: 73 PID: 115671 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21492010.051022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21492010.060660] RIP: 0033:0x7fffffffe062 [21492010.064619] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21492010.083782] RSP: 002b:000000c00016db90 EFLAGS: 00000297 [21492010.089431] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21492010.096975] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21492010.105886] RBP: 000000c00016dc28 R08: 0000000000000000 R09: 0000000000000000 [21492010.114842] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00016dc18 [21492010.123774] R13: 000000c0001ca150 R14: 000000c00015e540 R15: 000000000001a4e0 [21492010.132747] FS: 000000c000514098 GS: 0000000000000000 [21492152.942086] exe[196851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8787e3237 cs:33 sp:7f8e5b50cef8 ax:2f700000 si:55f8788512f7 di:ffffffffff600000 [21492809.260242] exe[206167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599417c1ab9 cs:33 sp:7ea3893c7858 ax:0 si:55994181b062 di:ffffffffff600000 [21492914.481697] exe[221505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.598202] exe[223922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21492914.700778] exe[186763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.814989] exe[188027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21493264.451346] exe[227341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f7f09ab9 cs:33 sp:7fea169fe858 ax:0 si:5623f7f63097 di:ffffffffff600000