6 executing program 1: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup2(r0, r1) r3 = dup2(r2, r2) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000080)={0x1, 0x10000, 0x5a43}) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="30b7c7dd77158ed6608e0983f635e816368ccac49c0815c0ad78213f4012431ec14150807e80c019dca9d95fc11c94a5ad782495e66e865ee646fc32f0fdbed9da29e44ecf48d6033d36f802a2765f377c2bbda1d1f5c428c9da6f2928da3459e60f755dee6a08870ce0b74cc9774b85fbe1cfe38b9c389cf3056e1efaee4afd2cbc1b87cadf69f9c506f4f85edeee43916f6773944c9fea630d8f9c72512719b634ca3196f2e65dfb275e5888a299a12160461ab17c6e568e7cb8fdaab054813b9a18a2fcdb0355c954ecd643e8611bf22e63", 0xd3}, {&(0x7f00000001c0)="1560f91bd91313875262426d68ed58f3ecfd285501d030361e2a0c259943671ec745c03748364b6499cb42a88e8c8fd19d6cb52a3ec33e8c9ad9cbb3b0bd25918c5810320371968684236960fdc6cc320d44d56cb82ff3ed44efeb68fe52c9271eb9e8074c12c9bd56e334968304d3fbc88b8c8a07db9f1d8e23df042b75705545bdcef0cebed3db3308ef38c9ed9829496d885d43e90f74", 0x98}], 0x2, 0x0, 0x0, 0x400c084}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000300)={'lo\x00', {0x2, 0x4e23, @remote}}) r4 = accept4$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000003c0)) write$binfmt_misc(r3, &(0x7f0000000400)={'syz0', "e0d7a7aa1f1dbc18156eb586c81d2aacc5a74afb6650ea28942351108b8038b4bd9ff287b2a93c304b79e0b9bbd107bbbfed683700b06312ab4283299309b4ad0ea92d8e4e5eddd4"}, 0x4c) getsockname$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) r5 = accept$unix(r2, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) r6 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIOCLEX(r6, 0x5451) accept$inet6(r2, &(0x7f00000005c0), &(0x7f0000000600)=0x1c) r7 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r7, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) r9 = creat(&(0x7f00000006c0)='./file0\x00', 0x101) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, r6) recvmsg(r10, &(0x7f0000001c40)={&(0x7f0000000700)=@xdp, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/34, 0x22}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/68, 0x44}, {&(0x7f0000001880)=""/197, 0xc5}, {&(0x7f0000001980)=""/147, 0x93}, {&(0x7f0000001a40)=""/121, 0x79}], 0x7, &(0x7f0000001b40)=""/198, 0xc6}, 0x2002) r11 = accept4(r9, 0x0, &(0x7f0000001c80), 0xacaceeeb18a711d5) r12 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r12, &(0x7f0000001e40)={&(0x7f0000001cc0)=@rc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d40)=""/91, 0x5b}], 0x1, &(0x7f0000001e00)=""/11, 0xb}, 0x2000) r13 = signalfd4(r1, &(0x7f0000001e80)={[0x80000001]}, 0x8, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r13, 0x40309410, &(0x7f0000001ec0)={0x7ff, 0x5, 0x3, 0xfba, 0x2, [0x4, 0xffffb7be, 0x3, 0x2]}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r9, 0x29, 0x37, &(0x7f0000001f00)={0x1d, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x3f}, @enc_lim={0x4, 0x1, 0x2}]}, 0x18) setsockopt$inet6_mreq(r11, 0x29, 0x7, &(0x7f0000001f40)={@ipv4={'\x00', '\xff\xff', @local}, r8}, 0x14) recvmsg$unix(r7, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001f80)=""/223, 0xdf}, {&(0x7f0000002080)=""/146, 0x92}, {&(0x7f0000002140)=""/153, 0x99}, {&(0x7f0000002200)=""/191, 0xbf}, {&(0x7f00000022c0)=""/216, 0xd8}], 0x5, &(0x7f0000002440)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x10140) D0312 10:47:36.944306 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:36.945197 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:36.958114 465088 usertrap_amd64.go:212] [ 58644: 58644] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:36.958243 465088 usertrap_amd64.go:122] [ 58644: 58644] Allocate a new trap: 0xc00d9fce70 40 D0312 10:47:36.958734 465088 usertrap_amd64.go:225] [ 58644: 58644] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:36.963136 465088 usertrap_amd64.go:212] [ 58646: 58646] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:36.963240 465088 usertrap_amd64.go:122] [ 58646: 58646] Allocate a new trap: 0xc00ce3e150 40 D0312 10:47:36.963704 465088 usertrap_amd64.go:225] [ 58646: 58646] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:36.972179 465088 usertrap_amd64.go:212] [ 58646: 58646] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:36.972292 465088 usertrap_amd64.go:122] [ 58646: 58646] Allocate a new trap: 0xc00ce3e150 41 D0312 10:47:36.972383 465088 usertrap_amd64.go:225] [ 58646: 58646] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:36.973891 465088 usertrap_amd64.go:212] [ 58644: 58644] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:36.973956 465088 usertrap_amd64.go:122] [ 58644: 58644] Allocate a new trap: 0xc00d9fce70 41 D0312 10:47:36.974032 465088 usertrap_amd64.go:225] [ 58644: 58644] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:36.974576 465088 usertrap_amd64.go:212] [ 58645: 58645] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:36.974714 465088 usertrap_amd64.go:122] [ 58645: 58645] Allocate a new trap: 0xc008a24420 40 D0312 10:47:36.975095 465088 usertrap_amd64.go:225] [ 58645: 58645] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:36.976245 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:36.976603 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:36.978602 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:36.979061 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:36.984235 465088 usertrap_amd64.go:212] [ 58645: 58645] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:36.984291 465088 usertrap_amd64.go:122] [ 58645: 58645] Allocate a new trap: 0xc008a24420 41 D0312 10:47:36.984339 465088 usertrap_amd64.go:225] [ 58645: 58645] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:36.992567 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:36.992974 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.003059 465088 usertrap_amd64.go:212] [ 58645: 58645] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:37.003150 465088 usertrap_amd64.go:122] [ 58645: 58645] Allocate a new trap: 0xc008a24420 42 D0312 10:47:37.003246 465088 usertrap_amd64.go:225] [ 58645: 58645] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:37.004143 465088 usertrap_amd64.go:212] [ 58647: 58647] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:37.005001 465088 usertrap_amd64.go:122] [ 58647: 58647] Allocate a new trap: 0xc00d9fcea0 39 D0312 10:47:37.005640 465088 usertrap_amd64.go:225] [ 58647: 58647] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:37.022218 465088 usertrap_amd64.go:212] [ 58644: 58644] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:37.022269 465088 usertrap_amd64.go:122] [ 58644: 58644] Allocate a new trap: 0xc00d9fce70 42 D0312 10:47:37.022325 465088 usertrap_amd64.go:225] [ 58644: 58644] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:37.028404 465088 usertrap_amd64.go:212] [ 58647: 58647] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:37.028492 465088 usertrap_amd64.go:122] [ 58647: 58647] Allocate a new trap: 0xc00d9fcea0 40 D0312 10:47:37.028561 465088 usertrap_amd64.go:225] [ 58647: 58647] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:37.030841 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.031244 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.032011 465088 usertrap_amd64.go:212] [ 58646: 58646] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:37.032197 465088 usertrap_amd64.go:122] [ 58646: 58646] Allocate a new trap: 0xc00ce3e150 42 D0312 10:47:37.032458 465088 usertrap_amd64.go:225] [ 58646: 58646] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:37.050431 465088 usertrap_amd64.go:212] [ 58647: 58647] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:37.050514 465088 usertrap_amd64.go:122] [ 58647: 58647] Allocate a new trap: 0xc00d9fcea0 41 D0312 10:47:37.050605 465088 usertrap_amd64.go:225] [ 58647: 58647] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:37.107477 465088 usertrap_amd64.go:212] [ 58645: 58648] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:37.107592 465088 usertrap_amd64.go:122] [ 58645: 58648] Allocate a new trap: 0xc008a24420 43 D0312 10:47:37.107658 465088 usertrap_amd64.go:225] [ 58645: 58648] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:37.108510 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.108867 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.110902 465088 usertrap_amd64.go:212] [ 58644: 58644] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:37.111122 465088 usertrap_amd64.go:122] [ 58644: 58644] Allocate a new trap: 0xc00d9fce70 43 D0312 10:47:37.111272 465088 usertrap_amd64.go:225] [ 58644: 58644] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:37.147395 465088 usertrap_amd64.go:212] [ 58644: 58644] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:37.147474 465088 usertrap_amd64.go:122] [ 58644: 58644] Allocate a new trap: 0xc00d9fce70 44 D0312 10:47:37.147535 465088 usertrap_amd64.go:225] [ 58644: 58644] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:37.151640 465088 usertrap_amd64.go:212] [ 58646: 58646] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:37.151723 465088 usertrap_amd64.go:122] [ 58646: 58646] Allocate a new trap: 0xc00ce3e150 43 D0312 10:47:37.151780 465088 usertrap_amd64.go:225] [ 58646: 58646] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:37.152427 465088 task_exit.go:204] [ 58644: 58644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.152699 465088 task_signals.go:204] [ 58644: 58655] Signal 58644, PID: 58655, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.152683 465088 task_signals.go:204] [ 58644: 58654] Signal 58644, PID: 58654, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.152721 465088 task_exit.go:204] [ 58644: 58644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.152903 465088 task_exit.go:204] [ 58644: 58655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.153033 465088 task_signals.go:204] [ 58644: 58649] Signal 58644, PID: 58649, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.153230 465088 task_exit.go:204] [ 58644: 58655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.153272 465088 task_exit.go:204] [ 58644: 58655] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.153373 465088 task_exit.go:204] [ 58644: 58654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.153572 465088 task_exit.go:204] [ 58644: 58654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.153608 465088 task_exit.go:204] [ 58644: 58654] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.153709 465088 task_exit.go:204] [ 58644: 58649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.156643 465088 task_exit.go:204] [ 58644: 58649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.156701 465088 task_exit.go:204] [ 58644: 58649] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.156760 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:37.161673 465088 task_exit.go:204] [ 58644: 58644] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.164554 465088 task_exit.go:204] [ 58646: 58646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.164785 465088 task_signals.go:204] [ 58646: 58656] Signal 58646, PID: 58656, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.164895 465088 task_signals.go:204] [ 58646: 58652] Signal 58646, PID: 58652, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.165067 465088 task_signals.go:204] [ 58646: 58650] Signal 58646, PID: 58650, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.165151 465088 task_signals.go:204] [ 58646: 58653] Signal 58646, PID: 58653, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.165200 465088 task_exit.go:204] [ 58646: 58646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.166647 465088 task_exit.go:204] [ 58646: 58650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.166827 465088 task_exit.go:204] [ 58646: 58650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.166870 465088 task_exit.go:204] [ 58646: 58650] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.166950 465088 task_exit.go:204] [ 58646: 58652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.167113 465088 task_exit.go:204] [ 58646: 58652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.167178 465088 task_exit.go:204] [ 58646: 58652] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.167264 465088 task_exit.go:204] [ 58646: 58656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.167399 465088 task_exit.go:204] [ 58646: 58656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.167454 465088 task_exit.go:204] [ 58646: 58656] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.167517 465088 task_exit.go:204] [ 58646: 58653] Transitioning from exit state TaskExitNone to TaskExitInitiated 10:47:37 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) dup2(0xffffffffffffffff, r0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:37.169898 465088 task_exit.go:204] [ 58646: 58653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.170469 465088 task_exit.go:204] [ 58646: 58653] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.170556 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:37.178148 465088 task_exit.go:204] [ 58646: 58646] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:37 executing program 0: setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=0x40, 0x8, 0x1) setxattr$incfs_size(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), &(0x7f0000000140)=0x4, 0x8, 0x3) (async) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/254, 0xfe) (async) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x20, 0x1) (async) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) (async) r0 = getuid() mount$9p_virtio(&(0x7f0000000340), &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), 0x40001, &(0x7f0000000400)={'trans=virtio,', {[{@access_any}, {@mmap}, {@noextend}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@uname={'uname', 0x3d, 'user.incfs.size\x00'}}, {@access_client}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@flag='nomand'}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@flag='posixacl'}]}}) (async) symlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') (async) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000540)='.pending_reads\x00', 0x400002, 0x43) r2 = accept4(r1, 0x0, &(0x7f0000000580), 0x0) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)=0x0) setresuid(r0, r0, r3) (async) getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)=0x0) (async) socketpair(0x5, 0xafb4fab87bceade, 0x3, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = socket$netlink(0x10, 0x3, 0xe) (async) r8 = openat$cgroup_devices(r1, &(0x7f0000000980)='devices.deny\x00', 0x2, 0x0) (async) statx(r1, &(0x7f00000009c0)='./file0\x00', 0x100, 0x100, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000bc0)={&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000700)="1dfdba0f82a2cb3cb00588d91496edb345848fb41a29530fc4d5413c49e63bdcb2ac709ae5dc3497a090ef5b799e9ca588e79981795b19c7ae42da6c53c20967487665fb080d123aa839d62bd905a095455bc3a270e51b35563c8f98bf00", 0x5e}, {&(0x7f0000000780)="adc36c7bc9939f049d0e7778c7dfc1cd5bfd05c296713c32234656e45281c5f77f5c0f7393d1a25ecd459130911cfab59ed59acd8ff831a5af4c73063514a48f7ed31ce42ff30205c330794a03337ecc6cd53714f7209e85b07c6f2446e00e084343b5fb538985859d92d4e632334e93d79a11d1d3dd138067f3385973530bd84ac8cfdd7f7706f12f0f5bace74d82b5a689c42c3451a1bb", 0x98}], 0x2, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r5}}}, @rights={{0x24, 0x1, 0x1, [r1, r2, r1, r6, r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x18, 0x1, 0x1, [r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r0, r9}}}], 0x98, 0x4004085}, 0x4) (async) lchown(&(0x7f0000000c00)='./file0\x00', r0, r9) (async) openat$cgroup_procs(r1, &(0x7f0000000c40)='cgroup.procs\x00', 0x2, 0x0) (async) lsetxattr$trusted_overlay_redirect(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0), &(0x7f0000000d00)='./file0/file0\x00', 0xe, 0x0) umount2(&(0x7f0000000d40)='./file0/file0\x00', 0x7) (async) bind$inet(r1, &(0x7f0000000d80)={0x2, 0x4e22, @loopback}, 0x10) (async) shutdown(r2, 0x1) (async) r10 = getegid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000001100)=0x0) (async) r12 = geteuid() stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) statx(r1, &(0x7f0000001200)='./file0\x00', 0x2000, 0x800, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000003800)={&(0x7f0000000dc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000e40)="b7e758568ffedf930b422c4f5b2a4d8fee6cab3ae1386b9bce5e3c26fc847c5dfd8c304481f9730b1adb13ef7082d2a07a299d0179303112fa07119febe20c8b9a0b6b3b9e8e32760ecb6e2fd806a85a1887621989805d38ea589f83383749f60a850a3c42b22b4dbac6b67639110b08ebd840c37622a107f87c7bb6f2900a03aefd2f014e338d6293d64e009701cadf62a0ca885413b4db4b3867433bf84569639ee8e2f5924708179a28ee29d85601cfa4e40a706bc621dcc2a33e9c9228eae236d5c7776b771a1380ca7eca6d5be0d5044966f5b65f6cd48d7f9eea6518be8d5855b4ed027d77fb37ed6e871289", 0xef}, {&(0x7f0000000f40)="9f43503641f518dc68230fa75952340e9d782950a4e816ec6225a2cd8260c394fad8be823739075f4d059a24f92a0f65729d69f19317831be0f1cc8548a8914e2eeb5a2b25450a414a4d84bfbd9d1bf55a5608e31b0edc8f04c2e04ab7eea737b2ca5dcd53f1aab7d2fe56345691c14a24258235483ec3935815f282ae578e6b8bf3f267421f0de6e02c85c1829c1b0ca1e5aff8f5afba", 0x97}, {&(0x7f0000001000)="b3fb884b323996345aafab6b1c7c2ac4f4d7f0fe32b75409a84316d29e1cc42ef24c2696ddff4faab2caae711906eb9f78b868167ae4d82c3f24a13a354a3ece4d973213df3a4b3228fff8add3cdbc09a639ebe075071ccd82100149e47f1bb477d9ff22066ab1d8857d5238de1c05c8bec54cbc916ce3c4b38dbf83d35ffa9e3d87f6be859cb8c35e13d207b9df18fbe6b5148f7883da65c42421b01416cbdf017481", 0xa3}], 0x3, &(0x7f0000003700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r3, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, r9}}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, r7, 0xffffffffffffffff]}}], 0xf8, 0x20000044}, 0x20000000) D0312 10:47:37.192039 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.192395 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.192614 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.192892 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.215574 465088 usertrap_amd64.go:212] [ 58645: 58645] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:37.215686 465088 usertrap_amd64.go:122] [ 58645: 58645] Allocate a new trap: 0xc008a24420 44 D0312 10:47:37.215767 465088 usertrap_amd64.go:225] [ 58645: 58645] Apply the binary patch addr 55c5b5e1be1a trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:37.216273 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.220410 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.230525 465088 usertrap_amd64.go:212] [ 58647: 58647] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:37.230589 465088 usertrap_amd64.go:122] [ 58647: 58647] Allocate a new trap: 0xc00d9fcea0 42 D0312 10:47:37.230657 465088 usertrap_amd64.go:225] [ 58647: 58647] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:37.255230 465088 usertrap_amd64.go:212] [ 58659: 58659] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:37.255332 465088 usertrap_amd64.go:122] [ 58659: 58659] Allocate a new trap: 0xc00727dcb0 40 D0312 10:47:37.255929 465088 usertrap_amd64.go:225] [ 58659: 58659] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:37.272700 465088 usertrap_amd64.go:212] [ 58660: 58660] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:37.272808 465088 usertrap_amd64.go:122] [ 58660: 58660] Allocate a new trap: 0xc0092c9ef0 40 D0312 10:47:37.273356 465088 usertrap_amd64.go:225] [ 58660: 58660] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:37.274645 465088 usertrap_amd64.go:212] [ 58659: 58659] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:37.274724 465088 usertrap_amd64.go:122] [ 58659: 58659] Allocate a new trap: 0xc00727dcb0 41 D0312 10:47:37.274823 465088 usertrap_amd64.go:225] [ 58659: 58659] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:37.276239 465088 usertrap_amd64.go:212] [ 58660: 58660] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:37.276297 465088 usertrap_amd64.go:122] [ 58660: 58660] Allocate a new trap: 0xc0092c9ef0 41 D0312 10:47:37.276361 465088 usertrap_amd64.go:225] [ 58660: 58660] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:37.278349 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.279029 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.281301 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.283231 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.308874 465088 usertrap_amd64.go:212] [ 58659: 58659] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:37.308973 465088 usertrap_amd64.go:122] [ 58659: 58659] Allocate a new trap: 0xc00727dcb0 42 D0312 10:47:37.309067 465088 usertrap_amd64.go:225] [ 58659: 58659] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:37.317707 465088 usertrap_amd64.go:212] [ 58660: 58660] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:37.317781 465088 usertrap_amd64.go:122] [ 58660: 58660] Allocate a new trap: 0xc0092c9ef0 42 D0312 10:47:37.317855 465088 usertrap_amd64.go:225] [ 58660: 58660] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:37.334790 465088 usertrap_amd64.go:212] [ 58659: 58659] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:37.334907 465088 usertrap_amd64.go:122] [ 58659: 58659] Allocate a new trap: 0xc00727dcb0 43 D0312 10:47:37.335014 465088 usertrap_amd64.go:225] [ 58659: 58659] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:37.337769 465088 task_exit.go:204] [ 58659: 58659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.337963 465088 task_signals.go:204] [ 58659: 58661] Signal 58659, PID: 58661, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.338085 465088 task_exit.go:204] [ 58659: 58661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.338351 465088 task_exit.go:204] [ 58659: 58659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.341619 465088 task_exit.go:204] [ 58659: 58661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.341712 465088 task_exit.go:204] [ 58659: 58661] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.341817 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:37.342579 465088 task_exit.go:204] [ 58659: 58659] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:37 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) dup2(0xffffffffffffffff, r0) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:37.367568 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.367996 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.383877 465088 usertrap_amd64.go:212] [ 58660: 58660] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:37.383989 465088 usertrap_amd64.go:122] [ 58660: 58660] Allocate a new trap: 0xc0092c9ef0 43 D0312 10:47:37.384105 465088 usertrap_amd64.go:225] [ 58660: 58660] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:37.387026 465088 task_exit.go:204] [ 58660: 58660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.387322 465088 task_signals.go:204] [ 58660: 58662] Signal 58660, PID: 58662, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.387369 465088 task_signals.go:204] [ 58660: 58663] Signal 58660, PID: 58663, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.387482 465088 task_signals.go:204] [ 58660: 58665] Signal 58660, PID: 58665, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.387546 465088 task_exit.go:204] [ 58660: 58660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.388854 465088 task_signals.go:204] [ 58660: 58664] Signal 58660, PID: 58664, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.389089 465088 task_exit.go:204] [ 58660: 58662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.389259 465088 task_exit.go:204] [ 58660: 58662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.389293 465088 task_exit.go:204] [ 58660: 58662] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.391179 465088 task_exit.go:204] [ 58660: 58663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.391340 465088 task_exit.go:204] [ 58660: 58663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.391371 465088 task_exit.go:204] [ 58660: 58663] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.391499 465088 task_exit.go:204] [ 58660: 58665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.391630 465088 task_exit.go:204] [ 58660: 58665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.391660 465088 task_exit.go:204] [ 58660: 58665] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.391794 465088 task_exit.go:204] [ 58660: 58664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.394244 465088 task_exit.go:204] [ 58660: 58664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.394288 465088 task_exit.go:204] [ 58660: 58664] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.394366 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:37.395704 465088 task_exit.go:204] [ 58660: 58660] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:37 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000100)={0x0, 0x9, 0x3}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000500)={r0, 0x80000001, 0xffff}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$getownex(r1, 0x10, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000900)={r0, 0x73c, 0x90000000}) D0312 10:47:37.415241 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.415618 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.457191 465088 usertrap_amd64.go:212] [ 58666: 58666] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:37.457314 465088 usertrap_amd64.go:122] [ 58666: 58666] Allocate a new trap: 0xc002a43200 40 D0312 10:47:37.457805 465088 usertrap_amd64.go:225] [ 58666: 58666] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:37.463470 465088 usertrap_amd64.go:212] [ 58666: 58666] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:37.463597 465088 usertrap_amd64.go:122] [ 58666: 58666] Allocate a new trap: 0xc002a43200 41 D0312 10:47:37.463737 465088 usertrap_amd64.go:225] [ 58666: 58666] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:37.464018 465088 usertrap_amd64.go:212] [ 58667: 58667] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:37.464120 465088 usertrap_amd64.go:122] [ 58667: 58667] Allocate a new trap: 0xc00ce3e3c0 40 D0312 10:47:37.464542 465088 usertrap_amd64.go:225] [ 58667: 58667] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:37.479126 465088 usertrap_amd64.go:212] [ 58667: 58667] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:37.479216 465088 usertrap_amd64.go:122] [ 58667: 58667] Allocate a new trap: 0xc00ce3e3c0 41 D0312 10:47:37.479285 465088 usertrap_amd64.go:225] [ 58667: 58667] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:37.485862 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.488326 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.488722 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.489142 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.515681 465088 usertrap_amd64.go:212] [ 58667: 58667] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:37.515837 465088 usertrap_amd64.go:122] [ 58667: 58667] Allocate a new trap: 0xc00ce3e3c0 42 D0312 10:47:37.515938 465088 usertrap_amd64.go:225] [ 58667: 58667] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:37.521190 465088 usertrap_amd64.go:212] [ 58666: 58666] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:37.521310 465088 usertrap_amd64.go:122] [ 58666: 58666] Allocate a new trap: 0xc002a43200 42 D0312 10:47:37.521402 465088 usertrap_amd64.go:225] [ 58666: 58666] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:37.553834 465088 usertrap_amd64.go:212] [ 58666: 58666] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:37.553921 465088 usertrap_amd64.go:122] [ 58666: 58666] Allocate a new trap: 0xc002a43200 43 D0312 10:47:37.553981 465088 usertrap_amd64.go:225] [ 58666: 58666] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:37.554652 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.554987 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.566910 465088 task_exit.go:204] [ 58666: 58666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.567441 465088 task_exit.go:204] [ 58666: 58666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.568677 465088 task_signals.go:204] [ 58666: 58669] Signal 58666, PID: 58669, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.568812 465088 task_exit.go:204] [ 58666: 58669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.571988 465088 usertrap_amd64.go:212] [ 58667: 58667] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:37.572037 465088 usertrap_amd64.go:122] [ 58667: 58667] Allocate a new trap: 0xc00ce3e3c0 43 D0312 10:47:37.572100 465088 usertrap_amd64.go:225] [ 58667: 58667] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:37.572999 465088 task_exit.go:204] [ 58666: 58669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.573063 465088 task_exit.go:204] [ 58666: 58669] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.573166 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:37.574040 465088 task_exit.go:204] [ 58666: 58666] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.580281 465088 task_exit.go:204] [ 58667: 58667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.580516 465088 task_exit.go:204] [ 58667: 58667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.581641 465088 task_signals.go:204] [ 58667: 58668] Signal 58667, PID: 58668, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.581731 465088 task_exit.go:204] [ 58667: 58668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.584459 465088 task_exit.go:204] [ 58667: 58668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.584503 465088 task_exit.go:204] [ 58667: 58668] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.584583 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:37.585146 465088 task_exit.go:204] [ 58667: 58667] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.597450 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.597986 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.598829 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.600877 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.833975 465088 usertrap_amd64.go:212] [ 58645: 58645] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:37.834070 465088 usertrap_amd64.go:122] [ 58645: 58645] Allocate a new trap: 0xc008a24420 45 D0312 10:47:37.834145 465088 usertrap_amd64.go:225] [ 58645: 58645] Apply the binary patch addr 55c5b5da8fa4 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0312 10:47:37.855039 465088 task_exit.go:204] [ 58645: 58645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.855312 465088 task_exit.go:204] [ 58645: 58645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.855504 465088 task_signals.go:204] [ 58645: 58648] Signal 58645, PID: 58648, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.855619 465088 task_exit.go:204] [ 58645: 58648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.856143 465088 task_exit.go:204] [ 58645: 58648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.856218 465088 task_exit.go:204] [ 58645: 58648] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.856380 465088 task_signals.go:204] [ 58645: 58658] Signal 58645, PID: 58658, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.856506 465088 task_exit.go:204] [ 58645: 58658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.858761 465088 task_exit.go:204] [ 58645: 58658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.858827 465088 task_exit.go:204] [ 58645: 58658] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.858897 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:37.860152 465088 task_exit.go:204] [ 58645: 58645] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.874422 465088 usertrap_amd64.go:212] [ 58647: 58647] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:37.874501 465088 usertrap_amd64.go:122] [ 58647: 58647] Allocate a new trap: 0xc00d9fcea0 43 D0312 10:47:37.874562 465088 usertrap_amd64.go:225] [ 58647: 58647] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:37.886353 465088 task_exit.go:204] [ 58647: 58647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.886595 465088 task_signals.go:204] [ 58647: 58657] Signal 58647, PID: 58657, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.886778 465088 task_exit.go:204] [ 58647: 58647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.887207 465088 task_signals.go:204] [ 58647: 58651] Signal 58647, PID: 58651, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:37.887336 465088 task_exit.go:204] [ 58647: 58651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.887504 465088 task_exit.go:204] [ 58647: 58651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.887586 465088 task_exit.go:204] [ 58647: 58651] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.887818 465088 task_exit.go:204] [ 58647: 58657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:37.890855 465088 task_exit.go:204] [ 58647: 58657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:37.890930 465088 task_exit.go:204] [ 58647: 58657] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:37.891025 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:37.894854 465088 task_exit.go:204] [ 58647: 58647] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup(0xffffffffffffffff) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r6, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r7 = eventfd(0x2) dup2(r4, r7) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:37.902147 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} 10:47:37 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) dup2(0xffffffffffffffff, r0) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:37.906631 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:37 executing program 1: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup2(r0, r1) r3 = dup2(r2, r2) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000080)={0x1, 0x10000, 0x5a43}) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="30b7c7dd77158ed6608e0983f635e816368ccac49c0815c0ad78213f4012431ec14150807e80c019dca9d95fc11c94a5ad782495e66e865ee646fc32f0fdbed9da29e44ecf48d6033d36f802a2765f377c2bbda1d1f5c428c9da6f2928da3459e60f755dee6a08870ce0b74cc9774b85fbe1cfe38b9c389cf3056e1efaee4afd2cbc1b87cadf69f9c506f4f85edeee43916f6773944c9fea630d8f9c72512719b634ca3196f2e65dfb275e5888a299a12160461ab17c6e568e7cb8fdaab054813b9a18a2fcdb0355c954ecd643e8611bf22e63", 0xd3}, {&(0x7f00000001c0)="1560f91bd91313875262426d68ed58f3ecfd285501d030361e2a0c259943671ec745c03748364b6499cb42a88e8c8fd19d6cb52a3ec33e8c9ad9cbb3b0bd25918c5810320371968684236960fdc6cc320d44d56cb82ff3ed44efeb68fe52c9271eb9e8074c12c9bd56e334968304d3fbc88b8c8a07db9f1d8e23df042b75705545bdcef0cebed3db3308ef38c9ed9829496d885d43e90f74", 0x98}], 0x2, 0x0, 0x0, 0x400c084}, 0x0) (async) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000300)={'lo\x00', {0x2, 0x4e23, @remote}}) r4 = accept4$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000003c0)) (async) write$binfmt_misc(r3, &(0x7f0000000400)={'syz0', "e0d7a7aa1f1dbc18156eb586c81d2aacc5a74afb6650ea28942351108b8038b4bd9ff287b2a93c304b79e0b9bbd107bbbfed683700b06312ab4283299309b4ad0ea92d8e4e5eddd4"}, 0x4c) getsockname$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) (async) r5 = accept$unix(r2, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) (async) r6 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIOCLEX(r6, 0x5451) (async) accept$inet6(r2, &(0x7f00000005c0), &(0x7f0000000600)=0x1c) (async) r7 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r7, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) (async) r9 = creat(&(0x7f00000006c0)='./file0\x00', 0x101) (async) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, r6) recvmsg(r10, &(0x7f0000001c40)={&(0x7f0000000700)=@xdp, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/34, 0x22}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/68, 0x44}, {&(0x7f0000001880)=""/197, 0xc5}, {&(0x7f0000001980)=""/147, 0x93}, {&(0x7f0000001a40)=""/121, 0x79}], 0x7, &(0x7f0000001b40)=""/198, 0xc6}, 0x2002) (async) r11 = accept4(r9, 0x0, &(0x7f0000001c80), 0xacaceeeb18a711d5) (async) r12 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r12, &(0x7f0000001e40)={&(0x7f0000001cc0)=@rc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d40)=""/91, 0x5b}], 0x1, &(0x7f0000001e00)=""/11, 0xb}, 0x2000) r13 = signalfd4(r1, &(0x7f0000001e80)={[0x80000001]}, 0x8, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r13, 0x40309410, &(0x7f0000001ec0)={0x7ff, 0x5, 0x3, 0xfba, 0x2, [0x4, 0xffffb7be, 0x3, 0x2]}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r9, 0x29, 0x37, &(0x7f0000001f00)={0x1d, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x3f}, @enc_lim={0x4, 0x1, 0x2}]}, 0x18) (async) setsockopt$inet6_mreq(r11, 0x29, 0x7, &(0x7f0000001f40)={@ipv4={'\x00', '\xff\xff', @local}, r8}, 0x14) (async) recvmsg$unix(r7, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001f80)=""/223, 0xdf}, {&(0x7f0000002080)=""/146, 0x92}, {&(0x7f0000002140)=""/153, 0x99}, {&(0x7f0000002200)=""/191, 0xbf}, {&(0x7f00000022c0)=""/216, 0xd8}], 0x5, &(0x7f0000002440)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x10140) 10:47:37 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000100)={0x0, 0x9, 0x3}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000500)={r0, 0x80000001, 0xffff}) (async) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$getownex(r1, 0x10, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000900)={r0, 0x73c, 0x90000000}) D0312 10:47:37.919706 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:37.924292 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.974293 465088 usertrap_amd64.go:212] [ 58672: 58672] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:37.974424 465088 usertrap_amd64.go:122] [ 58672: 58672] Allocate a new trap: 0xc0075f8ba0 40 D0312 10:47:37.974879 465088 usertrap_amd64.go:225] [ 58672: 58672] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:37.975409 465088 usertrap_amd64.go:212] [ 58673: 58673] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:37.975552 465088 usertrap_amd64.go:122] [ 58673: 58673] Allocate a new trap: 0xc0019c87b0 39 D0312 10:47:37.976159 465088 usertrap_amd64.go:225] [ 58673: 58673] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:37.983944 465088 usertrap_amd64.go:212] [ 58673: 58673] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:37.984021 465088 usertrap_amd64.go:122] [ 58673: 58673] Allocate a new trap: 0xc0019c87b0 40 D0312 10:47:37.984068 465088 usertrap_amd64.go:225] [ 58673: 58673] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:37.987399 465088 usertrap_amd64.go:212] [ 58672: 58672] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:37.987466 465088 usertrap_amd64.go:122] [ 58672: 58672] Allocate a new trap: 0xc0075f8ba0 41 D0312 10:47:37.987521 465088 usertrap_amd64.go:225] [ 58672: 58672] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:37.989191 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.992557 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:37.992714 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:37.993141 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.001971 465088 usertrap_amd64.go:212] [ 58670: 58670] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:38.002060 465088 usertrap_amd64.go:122] [ 58670: 58670] Allocate a new trap: 0xc00ce3e480 40 D0312 10:47:38.004929 465088 usertrap_amd64.go:225] [ 58670: 58670] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:38.018254 465088 usertrap_amd64.go:212] [ 58672: 58672] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:38.018377 465088 usertrap_amd64.go:122] [ 58672: 58672] Allocate a new trap: 0xc0075f8ba0 42 D0312 10:47:38.018501 465088 usertrap_amd64.go:225] [ 58672: 58672] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:38.022887 465088 usertrap_amd64.go:212] [ 58670: 58670] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:38.023041 465088 usertrap_amd64.go:122] [ 58670: 58670] Allocate a new trap: 0xc00ce3e480 41 D0312 10:47:38.023138 465088 usertrap_amd64.go:225] [ 58670: 58670] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:38.035070 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.035534 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.042340 465088 usertrap_amd64.go:212] [ 58673: 58673] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:38.042462 465088 usertrap_amd64.go:122] [ 58673: 58673] Allocate a new trap: 0xc0019c87b0 41 D0312 10:47:38.042539 465088 usertrap_amd64.go:225] [ 58673: 58673] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:38.059296 465088 usertrap_amd64.go:212] [ 58671: 58671] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:38.059393 465088 usertrap_amd64.go:122] [ 58671: 58671] Allocate a new trap: 0xc008a249f0 40 D0312 10:47:38.060744 465088 usertrap_amd64.go:225] [ 58671: 58671] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:38.093566 465088 usertrap_amd64.go:212] [ 58671: 58671] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:38.093650 465088 usertrap_amd64.go:122] [ 58671: 58671] Allocate a new trap: 0xc008a249f0 41 D0312 10:47:38.093747 465088 usertrap_amd64.go:225] [ 58671: 58671] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:38.116837 465088 usertrap_amd64.go:212] [ 58670: 58670] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:38.116989 465088 usertrap_amd64.go:122] [ 58670: 58670] Allocate a new trap: 0xc00ce3e480 42 D0312 10:47:38.117078 465088 usertrap_amd64.go:225] [ 58670: 58670] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:38.140197 465088 usertrap_amd64.go:212] [ 58672: 58676] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:38.140272 465088 usertrap_amd64.go:122] [ 58672: 58676] Allocate a new trap: 0xc0075f8ba0 43 D0312 10:47:38.140357 465088 usertrap_amd64.go:225] [ 58672: 58676] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:38.142093 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.142456 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.146819 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.147206 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.178211 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.178576 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.186499 465088 usertrap_amd64.go:212] [ 58670: 58670] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:38.186648 465088 usertrap_amd64.go:122] [ 58670: 58670] Allocate a new trap: 0xc00ce3e480 43 D0312 10:47:38.186772 465088 usertrap_amd64.go:225] [ 58670: 58670] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:38.191883 465088 usertrap_amd64.go:212] [ 58671: 58671] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:38.191978 465088 usertrap_amd64.go:122] [ 58671: 58671] Allocate a new trap: 0xc008a249f0 42 D0312 10:47:38.192126 465088 usertrap_amd64.go:225] [ 58671: 58671] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:38.197085 465088 task_exit.go:204] [ 58670: 58670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.197299 465088 task_exit.go:204] [ 58670: 58670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.197726 465088 task_signals.go:204] [ 58670: 58677] Signal 58670, PID: 58677, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.197853 465088 task_exit.go:204] [ 58670: 58677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.201197 465088 task_exit.go:204] [ 58670: 58677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.201255 465088 task_exit.go:204] [ 58670: 58677] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.201450 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:38.201631 465088 task_exit.go:204] [ 58670: 58670] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:38 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000100)={0x0, 0x9, 0x3}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000500)={r0, 0x80000001, 0xffff}) (async) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$getownex(r1, 0x10, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000900)={r0, 0x73c, 0x90000000}) D0312 10:47:38.215898 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.216272 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.286111 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.286526 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.295243 465088 usertrap_amd64.go:212] [ 58671: 58671] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:38.295355 465088 usertrap_amd64.go:122] [ 58671: 58671] Allocate a new trap: 0xc008a249f0 43 D0312 10:47:38.295489 465088 usertrap_amd64.go:225] [ 58671: 58671] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:38.299116 465088 usertrap_amd64.go:212] [ 58673: 58673] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:38.299231 465088 usertrap_amd64.go:122] [ 58673: 58673] Allocate a new trap: 0xc0019c87b0 42 D0312 10:47:38.299325 465088 usertrap_amd64.go:225] [ 58673: 58673] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:38.302920 465088 task_exit.go:204] [ 58671: 58671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.303101 465088 task_signals.go:204] [ 58671: 58683] Signal 58671, PID: 58683, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.303148 465088 task_signals.go:204] [ 58671: 58679] Signal 58671, PID: 58679, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.303194 465088 task_exit.go:204] [ 58671: 58683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.303397 465088 task_exit.go:204] [ 58671: 58683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.303453 465088 task_exit.go:204] [ 58671: 58683] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.303748 465088 task_exit.go:204] [ 58671: 58679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.303929 465088 task_exit.go:204] [ 58671: 58671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.306168 465088 task_exit.go:204] [ 58671: 58679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.306210 465088 task_exit.go:204] [ 58671: 58679] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.306271 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:38.307525 465088 task_exit.go:204] [ 58671: 58671] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:38 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) faccessat2(r2, &(0x7f0000000000)='\x00', 0x3, 0x1100) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) D0312 10:47:38.314965 465088 usertrap_amd64.go:212] [ 58672: 58672] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:38.315121 465088 usertrap_amd64.go:122] [ 58672: 58672] Allocate a new trap: 0xc0075f8ba0 44 D0312 10:47:38.315223 465088 usertrap_amd64.go:225] [ 58672: 58672] Apply the binary patch addr 55c5b5e1be1a trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:38.316340 465088 usertrap_amd64.go:212] [ 58682: 58682] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:38.316413 465088 usertrap_amd64.go:122] [ 58682: 58682] Allocate a new trap: 0xc00d9fd1d0 40 D0312 10:47:38.317882 465088 usertrap_amd64.go:225] [ 58682: 58682] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:38.324691 465088 usertrap_amd64.go:212] [ 58682: 58682] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:38.324788 465088 usertrap_amd64.go:122] [ 58682: 58682] Allocate a new trap: 0xc00d9fd1d0 41 D0312 10:47:38.324853 465088 usertrap_amd64.go:225] [ 58682: 58682] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:38.333675 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.335183 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.338039 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.338393 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.358971 465088 usertrap_amd64.go:212] [ 58682: 58682] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:38.359169 465088 usertrap_amd64.go:122] [ 58682: 58682] Allocate a new trap: 0xc00d9fd1d0 42 D0312 10:47:38.359402 465088 usertrap_amd64.go:225] [ 58682: 58682] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:38.417603 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.418050 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.426731 465088 usertrap_amd64.go:212] [ 58682: 58682] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:38.426847 465088 usertrap_amd64.go:122] [ 58682: 58682] Allocate a new trap: 0xc00d9fd1d0 43 D0312 10:47:38.426929 465088 usertrap_amd64.go:225] [ 58682: 58682] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:38.434082 465088 task_exit.go:204] [ 58682: 58682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.434405 465088 task_exit.go:204] [ 58682: 58682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.434560 465088 task_signals.go:204] [ 58682: 58686] Signal 58682, PID: 58686, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.434654 465088 task_exit.go:204] [ 58682: 58686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.436046 465088 task_signals.go:204] [ 58682: 58685] Signal 58682, PID: 58685, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.436102 465088 task_exit.go:204] [ 58682: 58686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.436203 465088 task_exit.go:204] [ 58682: 58686] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.436330 465088 task_exit.go:204] [ 58682: 58685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.438664 465088 task_exit.go:204] [ 58682: 58685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.438753 465088 task_exit.go:204] [ 58682: 58685] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.438889 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:38.439071 465088 task_exit.go:204] [ 58682: 58682] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.439995 465088 usertrap_amd64.go:212] [ 58684: 58684] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:38.440180 465088 usertrap_amd64.go:122] [ 58684: 58684] Allocate a new trap: 0xc0032fb8c0 40 10:47:38 executing program 0: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}, &(0x7f0000000080)=""/117, 0x75) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000140)='\x00', 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = dup(r0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)) r2 = epoll_create1(0x80000) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r3, 0xee01, 0x0) r4 = openat$cgroup_type(r0, &(0x7f0000000280), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000380)={{r4}, 0x0, 0x14, @inherit={0x98, &(0x7f00000002c0)={0x0, 0xa, 0x4, 0x800, {0x30, 0x7ff, 0xfffffffffffffffc, 0x5, 0xf7}, [0x9, 0x6, 0xfff, 0x7, 0x4, 0x4, 0x6, 0x3, 0x90, 0x8]}}, @devid}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.net/syz1\x00', 0x200002, 0x0) fstat(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440), 0x40000, 0x0) syncfs(r8) truncate(&(0x7f0000001480)='./file0\x00', 0x996) faccessat2(r1, &(0x7f00000014c0)='./file0\x00', 0x50, 0x0) r9 = open$dir(&(0x7f0000001500)='./file0\x00', 0x121201, 0xa0) fchownat(r9, &(0x7f0000001540)='./file0\x00', r6, r7, 0x400) mount$9p_fd(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x22000, &(0x7f0000001600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'y\x00'}}, {@access_any}, {@access_uid={'access', 0x3d, r6}}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@noextend}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffff}}]}}) pipe2(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_tcp_buf(r11, 0x6, 0xd, &(0x7f0000001700)=""/163, &(0x7f00000017c0)=0xa3) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000001800)) r12 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r10, 0xd000943e, &(0x7f0000001840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000002840)={{r13, 0xfffffffffffffff9, 0x0, 0x8, 0x769, 0x6, 0xfffffffffffffffa, 0x1, 0x100, 0x6, 0x3b0, 0x8, 0xffffffffffff800f, 0x4, 0x7fffffffffffffff}, 0x8, [0x0]}) write$FUSE_NOTIFY_DELETE(r11, &(0x7f00000028c0)={0x35, 0x6, 0x0, {0x6, 0x3, 0xc, 0x0, '&+\xf2(\x8d\xd7-\'%-/:'}}, 0x35) fsetxattr(r12, &(0x7f0000002900)=@known='trusted.overlay.opaque\x00', &(0x7f0000002940)='&+\xf2(\x8d\xd7-\'%-/:', 0xc, 0x3) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000002980), &(0x7f00000029c0)='./file0\x00', 0x8, 0x2) D0312 10:47:38.441015 465088 usertrap_amd64.go:225] [ 58684: 58684] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:38.452348 465088 usertrap_amd64.go:212] [ 58684: 58684] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:38.452444 465088 usertrap_amd64.go:122] [ 58684: 58684] Allocate a new trap: 0xc0032fb8c0 41 D0312 10:47:38.452545 465088 usertrap_amd64.go:225] [ 58684: 58684] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:38.453525 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.454209 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.464576 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.467081 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.485077 465088 usertrap_amd64.go:212] [ 58687: 58687] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:38.485213 465088 usertrap_amd64.go:122] [ 58687: 58687] Allocate a new trap: 0xc0032fb8f0 40 D0312 10:47:38.485620 465088 usertrap_amd64.go:225] [ 58687: 58687] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:38.490837 465088 usertrap_amd64.go:212] [ 58687: 58687] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:38.490976 465088 usertrap_amd64.go:122] [ 58687: 58687] Allocate a new trap: 0xc0032fb8f0 41 D0312 10:47:38.491067 465088 usertrap_amd64.go:225] [ 58687: 58687] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:38.491671 465088 usertrap_amd64.go:212] [ 58684: 58684] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:38.491805 465088 usertrap_amd64.go:122] [ 58684: 58684] Allocate a new trap: 0xc0032fb8c0 42 D0312 10:47:38.491938 465088 usertrap_amd64.go:225] [ 58684: 58684] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:38.502969 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.503413 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.510491 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.513037 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.515810 465088 usertrap_amd64.go:212] [ 58684: 58684] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:38.515901 465088 usertrap_amd64.go:122] [ 58684: 58684] Allocate a new trap: 0xc0032fb8c0 43 D0312 10:47:38.515957 465088 usertrap_amd64.go:225] [ 58684: 58684] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:38.520428 465088 task_exit.go:204] [ 58684: 58684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.520747 465088 task_exit.go:204] [ 58684: 58684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.521085 465088 task_signals.go:204] [ 58684: 58688] Signal 58684, PID: 58688, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.521218 465088 task_exit.go:204] [ 58684: 58688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.524507 465088 task_exit.go:204] [ 58684: 58688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.524604 465088 task_exit.go:204] [ 58684: 58688] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.524692 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:38.528730 465088 task_exit.go:204] [ 58684: 58684] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:38 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) faccessat2(r2, &(0x7f0000000000)='\x00', 0x3, 0x1100) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) D0312 10:47:38.542863 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.543242 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.545708 465088 usertrap_amd64.go:212] [ 58687: 58687] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:38.545869 465088 usertrap_amd64.go:122] [ 58687: 58687] Allocate a new trap: 0xc0032fb8f0 42 D0312 10:47:38.545986 465088 usertrap_amd64.go:225] [ 58687: 58687] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:38.609243 465088 usertrap_amd64.go:212] [ 58690: 58690] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:38.609359 465088 usertrap_amd64.go:122] [ 58690: 58690] Allocate a new trap: 0xc007f0c1b0 40 D0312 10:47:38.610140 465088 usertrap_amd64.go:225] [ 58690: 58690] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:38.612420 465088 usertrap_amd64.go:212] [ 58690: 58690] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:38.612519 465088 usertrap_amd64.go:122] [ 58690: 58690] Allocate a new trap: 0xc007f0c1b0 41 D0312 10:47:38.612587 465088 usertrap_amd64.go:225] [ 58690: 58690] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:38.614448 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.623825 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.624728 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:38.625141 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.625283 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:38.625865 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:38.629212 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.629804 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.640668 465088 usertrap_amd64.go:212] [ 58690: 58690] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:38.640770 465088 usertrap_amd64.go:122] [ 58690: 58690] Allocate a new trap: 0xc007f0c1b0 42 D0312 10:47:38.640856 465088 usertrap_amd64.go:225] [ 58690: 58690] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:38.647982 465088 usertrap_amd64.go:212] [ 58687: 58689] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:38.648085 465088 usertrap_amd64.go:122] [ 58687: 58689] Allocate a new trap: 0xc0032fb8f0 43 D0312 10:47:38.648160 465088 usertrap_amd64.go:225] [ 58687: 58689] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:38.653580 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.654043 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.668015 465088 usertrap_amd64.go:212] [ 58687: 58687] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:38.668139 465088 usertrap_amd64.go:122] [ 58687: 58687] Allocate a new trap: 0xc0032fb8f0 44 D0312 10:47:38.668210 465088 usertrap_amd64.go:225] [ 58687: 58687] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:38.682431 465088 task_exit.go:204] [ 58687: 58687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.682701 465088 task_exit.go:204] [ 58687: 58687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.683650 465088 task_signals.go:204] [ 58687: 58689] Signal 58687, PID: 58689, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.683799 465088 task_exit.go:204] [ 58687: 58689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.686168 465088 task_exit.go:204] [ 58687: 58689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.686228 465088 task_exit.go:204] [ 58687: 58689] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.686360 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:38.690588 465088 task_exit.go:204] [ 58687: 58687] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.697182 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.697528 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.698580 465088 usertrap_amd64.go:212] [ 58690: 58690] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:38.698653 465088 usertrap_amd64.go:122] [ 58690: 58690] Allocate a new trap: 0xc007f0c1b0 43 D0312 10:47:38.698734 465088 usertrap_amd64.go:225] [ 58690: 58690] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:38.715625 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.715904 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.718752 465088 task_exit.go:204] [ 58690: 58690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.719034 465088 task_exit.go:204] [ 58690: 58690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.719180 465088 task_signals.go:204] [ 58690: 58691] Signal 58690, PID: 58691, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.719205 465088 task_signals.go:204] [ 58690: 58692] Signal 58690, PID: 58692, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.719284 465088 task_exit.go:204] [ 58690: 58692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.719343 465088 task_exit.go:204] [ 58690: 58691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.719485 465088 task_exit.go:204] [ 58690: 58692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.719520 465088 task_exit.go:204] [ 58690: 58692] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.721794 465088 task_exit.go:204] [ 58690: 58691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.721894 465088 task_exit.go:204] [ 58690: 58691] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.722018 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:38.726098 465088 task_exit.go:204] [ 58690: 58690] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.746834 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.747257 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.841080 465088 usertrap_amd64.go:212] [ 58672: 58672] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:38.841205 465088 usertrap_amd64.go:122] [ 58672: 58672] Allocate a new trap: 0xc0075f8ba0 45 D0312 10:47:38.841282 465088 usertrap_amd64.go:225] [ 58672: 58672] Apply the binary patch addr 55c5b5da8fa4 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0312 10:47:38.848544 465088 task_exit.go:204] [ 58672: 58672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.848725 465088 task_exit.go:204] [ 58672: 58672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.848992 465088 task_signals.go:204] [ 58672: 58678] Signal 58672, PID: 58678, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.849069 465088 task_exit.go:204] [ 58672: 58678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.849224 465088 task_exit.go:204] [ 58672: 58678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.849253 465088 task_exit.go:204] [ 58672: 58678] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.849356 465088 task_signals.go:204] [ 58672: 58676] Signal 58672, PID: 58676, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.849439 465088 task_signals.go:204] [ 58672: 58674] Signal 58672, PID: 58674, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.849472 465088 task_exit.go:204] [ 58672: 58676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.849633 465088 task_signals.go:204] [ 58672: 58681] Signal 58672, PID: 58681, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.849725 465088 task_exit.go:204] [ 58672: 58676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.849773 465088 task_exit.go:204] [ 58672: 58676] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.849868 465088 task_exit.go:204] [ 58672: 58681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.849996 465088 task_exit.go:204] [ 58672: 58681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.850043 465088 task_exit.go:204] [ 58672: 58681] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.850110 465088 task_exit.go:204] [ 58672: 58674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.850380 465088 usertrap_amd64.go:212] [ 58673: 58673] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:38.850449 465088 usertrap_amd64.go:122] [ 58673: 58673] Allocate a new trap: 0xc0019c87b0 43 D0312 10:47:38.850544 465088 usertrap_amd64.go:225] [ 58673: 58673] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:38.853228 465088 task_exit.go:204] [ 58672: 58674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.853315 465088 task_exit.go:204] [ 58672: 58674] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.853416 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:38.854639 465088 task_exit.go:204] [ 58672: 58672] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.859332 465088 task_exit.go:204] [ 58673: 58673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.859573 465088 task_exit.go:204] [ 58673: 58673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.859727 465088 task_signals.go:204] [ 58673: 58675] Signal 58673, PID: 58675, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.859774 465088 task_signals.go:204] [ 58673: 58680] Signal 58673, PID: 58680, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:38.859828 465088 task_exit.go:204] [ 58673: 58675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.860012 465088 task_exit.go:204] [ 58673: 58675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.860044 465088 task_exit.go:204] [ 58673: 58675] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.860167 465088 task_exit.go:204] [ 58673: 58680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:38.862672 465088 task_exit.go:204] [ 58673: 58680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:38.862727 465088 task_exit.go:204] [ 58673: 58680] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:38.862803 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:38.864862 465088 task_exit.go:204] [ 58673: 58673] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r5 = eventfd(0x2) dup2(r4, r5) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:38 executing program 0: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}, &(0x7f0000000080)=""/117, 0x75) (async) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000140)='\x00', 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) (async, rerun: 64) r1 = dup(r0) (rerun: 64) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)) (async) r2 = epoll_create1(0x80000) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x1) (async) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r3, 0xee01, 0x0) (async) r4 = openat$cgroup_type(r0, &(0x7f0000000280), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000380)={{r4}, 0x0, 0x14, @inherit={0x98, &(0x7f00000002c0)={0x0, 0xa, 0x4, 0x800, {0x30, 0x7ff, 0xfffffffffffffffc, 0x5, 0xf7}, [0x9, 0x6, 0xfff, 0x7, 0x4, 0x4, 0x6, 0x3, 0x90, 0x8]}}, @devid}) (async, rerun: 64) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.net/syz1\x00', 0x200002, 0x0) (rerun: 64) fstat(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440), 0x40000, 0x0) syncfs(r8) truncate(&(0x7f0000001480)='./file0\x00', 0x996) (async) faccessat2(r1, &(0x7f00000014c0)='./file0\x00', 0x50, 0x0) (async, rerun: 32) r9 = open$dir(&(0x7f0000001500)='./file0\x00', 0x121201, 0xa0) (rerun: 32) fchownat(r9, &(0x7f0000001540)='./file0\x00', r6, r7, 0x400) (async, rerun: 32) mount$9p_fd(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x22000, &(0x7f0000001600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'y\x00'}}, {@access_any}, {@access_uid={'access', 0x3d, r6}}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@noextend}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffff}}]}}) (async, rerun: 32) pipe2(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_tcp_buf(r11, 0x6, 0xd, &(0x7f0000001700)=""/163, &(0x7f00000017c0)=0xa3) (async, rerun: 64) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000001800)) (async, rerun: 64) r12 = syz_open_dev$ttys(0xc, 0x2, 0x1) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r10, 0xd000943e, &(0x7f0000001840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000002840)={{r13, 0xfffffffffffffff9, 0x0, 0x8, 0x769, 0x6, 0xfffffffffffffffa, 0x1, 0x100, 0x6, 0x3b0, 0x8, 0xffffffffffff800f, 0x4, 0x7fffffffffffffff}, 0x8, [0x0]}) (async) write$FUSE_NOTIFY_DELETE(r11, &(0x7f00000028c0)={0x35, 0x6, 0x0, {0x6, 0x3, 0xc, 0x0, '&+\xf2(\x8d\xd7-\'%-/:'}}, 0x35) fsetxattr(r12, &(0x7f0000002900)=@known='trusted.overlay.opaque\x00', &(0x7f0000002940)='&+\xf2(\x8d\xd7-\'%-/:', 0xc, 0x3) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000002980), &(0x7f00000029c0)='./file0\x00', 0x8, 0x2) 10:47:38 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) faccessat2(r2, &(0x7f0000000000)='\x00', 0x3, 0x1100) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) 10:47:38 executing program 1: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup2(r0, r1) r3 = dup2(r2, r2) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000080)={0x1, 0x10000, 0x5a43}) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="30b7c7dd77158ed6608e0983f635e816368ccac49c0815c0ad78213f4012431ec14150807e80c019dca9d95fc11c94a5ad782495e66e865ee646fc32f0fdbed9da29e44ecf48d6033d36f802a2765f377c2bbda1d1f5c428c9da6f2928da3459e60f755dee6a08870ce0b74cc9774b85fbe1cfe38b9c389cf3056e1efaee4afd2cbc1b87cadf69f9c506f4f85edeee43916f6773944c9fea630d8f9c72512719b634ca3196f2e65dfb275e5888a299a12160461ab17c6e568e7cb8fdaab054813b9a18a2fcdb0355c954ecd643e8611bf22e63", 0xd3}, {&(0x7f00000001c0)="1560f91bd91313875262426d68ed58f3ecfd285501d030361e2a0c259943671ec745c03748364b6499cb42a88e8c8fd19d6cb52a3ec33e8c9ad9cbb3b0bd25918c5810320371968684236960fdc6cc320d44d56cb82ff3ed44efeb68fe52c9271eb9e8074c12c9bd56e334968304d3fbc88b8c8a07db9f1d8e23df042b75705545bdcef0cebed3db3308ef38c9ed9829496d885d43e90f74", 0x98}], 0x2, 0x0, 0x0, 0x400c084}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000300)={'lo\x00', {0x2, 0x4e23, @remote}}) r4 = accept4$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000003c0)) write$binfmt_misc(r3, &(0x7f0000000400)={'syz0', "e0d7a7aa1f1dbc18156eb586c81d2aacc5a74afb6650ea28942351108b8038b4bd9ff287b2a93c304b79e0b9bbd107bbbfed683700b06312ab4283299309b4ad0ea92d8e4e5eddd4"}, 0x4c) (async) write$binfmt_misc(r3, &(0x7f0000000400)={'syz0', "e0d7a7aa1f1dbc18156eb586c81d2aacc5a74afb6650ea28942351108b8038b4bd9ff287b2a93c304b79e0b9bbd107bbbfed683700b06312ab4283299309b4ad0ea92d8e4e5eddd4"}, 0x4c) getsockname$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) r5 = accept$unix(r2, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) syz_open_dev$ttys(0xc, 0x2, 0x0) (async) r6 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIOCLEX(r6, 0x5451) accept$inet6(r2, &(0x7f00000005c0), &(0x7f0000000600)=0x1c) (async) accept$inet6(r2, &(0x7f00000005c0), &(0x7f0000000600)=0x1c) socket$packet(0x11, 0x2, 0x300) (async) r7 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r7, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) r9 = creat(&(0x7f00000006c0)='./file0\x00', 0x101) fcntl$dupfd(0xffffffffffffffff, 0x406, r6) (async) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, r6) recvmsg(r10, &(0x7f0000001c40)={&(0x7f0000000700)=@xdp, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/34, 0x22}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/68, 0x44}, {&(0x7f0000001880)=""/197, 0xc5}, {&(0x7f0000001980)=""/147, 0x93}, {&(0x7f0000001a40)=""/121, 0x79}], 0x7, &(0x7f0000001b40)=""/198, 0xc6}, 0x2002) r11 = accept4(r9, 0x0, &(0x7f0000001c80), 0xacaceeeb18a711d5) socket$nl_route(0x10, 0x3, 0x0) (async) r12 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r12, &(0x7f0000001e40)={&(0x7f0000001cc0)=@rc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d40)=""/91, 0x5b}], 0x1, &(0x7f0000001e00)=""/11, 0xb}, 0x2000) (async) recvmsg(r12, &(0x7f0000001e40)={&(0x7f0000001cc0)=@rc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d40)=""/91, 0x5b}], 0x1, &(0x7f0000001e00)=""/11, 0xb}, 0x2000) r13 = signalfd4(r1, &(0x7f0000001e80)={[0x80000001]}, 0x8, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r13, 0x40309410, &(0x7f0000001ec0)={0x7ff, 0x5, 0x3, 0xfba, 0x2, [0x4, 0xffffb7be, 0x3, 0x2]}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r9, 0x29, 0x37, &(0x7f0000001f00)={0x1d, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x3f}, @enc_lim={0x4, 0x1, 0x2}]}, 0x18) (async) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r9, 0x29, 0x37, &(0x7f0000001f00)={0x1d, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x3f}, @enc_lim={0x4, 0x1, 0x2}]}, 0x18) setsockopt$inet6_mreq(r11, 0x29, 0x7, &(0x7f0000001f40)={@ipv4={'\x00', '\xff\xff', @local}, r8}, 0x14) recvmsg$unix(r7, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001f80)=""/223, 0xdf}, {&(0x7f0000002080)=""/146, 0x92}, {&(0x7f0000002140)=""/153, 0x99}, {&(0x7f0000002200)=""/191, 0xbf}, {&(0x7f00000022c0)=""/216, 0xd8}], 0x5, &(0x7f0000002440)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x10140) (async) recvmsg$unix(r7, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001f80)=""/223, 0xdf}, {&(0x7f0000002080)=""/146, 0x92}, {&(0x7f0000002140)=""/153, 0x99}, {&(0x7f0000002200)=""/191, 0xbf}, {&(0x7f00000022c0)=""/216, 0xd8}], 0x5, &(0x7f0000002440)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x10140) D0312 10:47:38.890892 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.891262 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.893349 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:38.893648 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.926291 465088 usertrap_amd64.go:212] [ 58693: 58693] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:38.926414 465088 usertrap_amd64.go:122] [ 58693: 58693] Allocate a new trap: 0xc002a43500 40 D0312 10:47:38.929421 465088 usertrap_amd64.go:225] [ 58693: 58693] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:38.930396 465088 usertrap_amd64.go:212] [ 58694: 58694] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:38.930520 465088 usertrap_amd64.go:122] [ 58694: 58694] Allocate a new trap: 0xc00e7ba4e0 40 D0312 10:47:38.931043 465088 usertrap_amd64.go:225] [ 58694: 58694] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:38.936644 465088 usertrap_amd64.go:212] [ 58693: 58693] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:38.936707 465088 usertrap_amd64.go:122] [ 58693: 58693] Allocate a new trap: 0xc002a43500 41 D0312 10:47:38.936758 465088 usertrap_amd64.go:225] [ 58693: 58693] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:38.938599 465088 usertrap_amd64.go:212] [ 58694: 58694] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:38.938672 465088 usertrap_amd64.go:122] [ 58694: 58694] Allocate a new trap: 0xc00e7ba4e0 41 D0312 10:47:38.938724 465088 usertrap_amd64.go:225] [ 58694: 58694] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:38.939907 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.940385 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.944917 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.946022 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.949043 465088 usertrap_amd64.go:212] [ 58695: 58695] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:38.949489 465088 usertrap_amd64.go:122] [ 58695: 58695] Allocate a new trap: 0xc00ce3e7e0 40 D0312 10:47:38.950520 465088 usertrap_amd64.go:225] [ 58695: 58695] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:38.958387 465088 usertrap_amd64.go:212] [ 58693: 58693] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:38.958500 465088 usertrap_amd64.go:122] [ 58693: 58693] Allocate a new trap: 0xc002a43500 42 D0312 10:47:38.958573 465088 usertrap_amd64.go:225] [ 58693: 58693] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:38.959806 465088 usertrap_amd64.go:212] [ 58694: 58694] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:38.959879 465088 usertrap_amd64.go:122] [ 58694: 58694] Allocate a new trap: 0xc00e7ba4e0 42 D0312 10:47:38.959937 465088 usertrap_amd64.go:225] [ 58694: 58694] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:38.968195 465088 usertrap_amd64.go:212] [ 58695: 58695] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:38.968325 465088 usertrap_amd64.go:122] [ 58695: 58695] Allocate a new trap: 0xc00ce3e7e0 41 D0312 10:47:38.968423 465088 usertrap_amd64.go:225] [ 58695: 58695] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:38.970967 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.971559 465088 usertrap_amd64.go:212] [ 58696: 58696] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:38.971753 465088 usertrap_amd64.go:122] [ 58696: 58696] Allocate a new trap: 0xc007f0c2d0 39 D0312 10:47:38.971631 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.972750 465088 usertrap_amd64.go:225] [ 58696: 58696] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:38.976516 465088 usertrap_amd64.go:212] [ 58696: 58696] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:38.976747 465088 usertrap_amd64.go:122] [ 58696: 58696] Allocate a new trap: 0xc007f0c2d0 40 D0312 10:47:38.977022 465088 usertrap_amd64.go:225] [ 58696: 58696] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:38.987984 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:38.990782 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:38.996907 465088 usertrap_amd64.go:212] [ 58695: 58695] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:38.997004 465088 usertrap_amd64.go:122] [ 58695: 58695] Allocate a new trap: 0xc00ce3e7e0 42 D0312 10:47:38.997070 465088 usertrap_amd64.go:225] [ 58695: 58695] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:39.007139 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.007505 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.028460 465088 usertrap_amd64.go:212] [ 58696: 58696] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:39.028559 465088 usertrap_amd64.go:122] [ 58696: 58696] Allocate a new trap: 0xc007f0c2d0 41 D0312 10:47:39.028642 465088 usertrap_amd64.go:225] [ 58696: 58696] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:39.052637 465088 usertrap_amd64.go:212] [ 58694: 58694] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:39.052695 465088 usertrap_amd64.go:122] [ 58694: 58694] Allocate a new trap: 0xc00e7ba4e0 43 D0312 10:47:39.052765 465088 usertrap_amd64.go:225] [ 58694: 58694] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:39.061682 465088 task_exit.go:204] [ 58694: 58694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.061898 465088 task_exit.go:204] [ 58694: 58694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.062306 465088 task_signals.go:204] [ 58694: 58698] Signal 58694, PID: 58698, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.062428 465088 task_exit.go:204] [ 58694: 58698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.063523 465088 task_exit.go:204] [ 58694: 58698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.063571 465088 task_exit.go:204] [ 58694: 58698] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.063944 465088 task_signals.go:204] [ 58694: 58700] Signal 58694, PID: 58700, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.064049 465088 task_exit.go:204] [ 58694: 58700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.064290 465088 task_exit.go:204] [ 58694: 58700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.064342 465088 task_exit.go:204] [ 58694: 58700] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.064789 465088 task_signals.go:204] [ 58694: 58702] Signal 58694, PID: 58702, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.064866 465088 task_exit.go:204] [ 58694: 58702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.067511 465088 task_exit.go:204] [ 58694: 58702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.067656 465088 task_exit.go:204] [ 58694: 58702] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.067747 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:39.067974 465088 task_exit.go:204] [ 58694: 58694] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:39 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c6530317e64202d202023215b207d0645beae1f4566e75bb56921784d9be8626ed8bc933a24f0af7d9514e4d0a8341c"], 0x2a) D0312 10:47:39.087251 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.087637 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.087810 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.087991 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.088313 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.088652 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.088770 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.088983 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.089303 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.094082 465088 usertrap_amd64.go:212] [ 58695: 58701] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:39.094169 465088 usertrap_amd64.go:122] [ 58695: 58701] Allocate a new trap: 0xc00ce3e7e0 43 D0312 10:47:39.094280 465088 usertrap_amd64.go:225] [ 58695: 58701] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:39.094510 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.094685 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.094939 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.095175 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.095490 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.095673 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.095892 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.095993 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.096166 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.096894 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.097116 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.097231 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.097360 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.097875 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.098180 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.098346 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.098596 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.098830 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.101262 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.101382 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.101598 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.101969 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.102215 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.102367 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.102541 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.102534 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.103307 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.103461 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.103791 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.103965 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.104209 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.104594 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.105388 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.105542 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.106036 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.106394 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.106922 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.109998 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.113046 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.113155 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.113749 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.114027 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.114319 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.114433 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.114606 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.116285 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.119407 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.119550 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.122527 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.125449 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.127831 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.127973 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.131442 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.133785 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.134765 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.134881 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.135199 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.139702 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.141946 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.142123 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.144398 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.147014 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.147029 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.147513 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.152234 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.152374 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.152619 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.153263 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.153560 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.153681 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.153861 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.154677 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.155325 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.155471 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.156143 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.156391 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.156656 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.156767 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.156929 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.157249 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.157518 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.157666 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.157876 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.158204 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.158548 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.158759 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.158926 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.159338 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.159598 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.159758 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.159926 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.160214 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.160449 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.160619 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.160766 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.161106 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.161314 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.161463 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.161638 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.161978 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.162695 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.162994 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.163301 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.163649 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.164085 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.164334 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.164866 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.166444 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.167532 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.167645 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.170537 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.172679 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.174511 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.174724 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.175460 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.175510 465088 usertrap_amd64.go:212] [ 58706: 58706] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:39.175703 465088 usertrap_amd64.go:122] [ 58706: 58706] Allocate a new trap: 0xc00e7ba660 40 D0312 10:47:39.176167 465088 usertrap_amd64.go:225] [ 58706: 58706] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:39.177195 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.177503 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.177606 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.177815 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.178561 465088 usertrap_amd64.go:212] [ 58706: 58706] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:39.178621 465088 usertrap_amd64.go:122] [ 58706: 58706] Allocate a new trap: 0xc00e7ba660 41 D0312 10:47:39.178691 465088 usertrap_amd64.go:225] [ 58706: 58706] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:39.179784 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.180176 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.180274 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.180658 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.181000 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.181235 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.181322 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.181479 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.181749 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.181995 465088 client.go:400] recv [channel 0xc00051c3f0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.182078 465088 client.go:400] send [channel 0xc00051c3f0] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.183610 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:39.186578 465088 client.go:400] recv [channel 0xc00051c3f0] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.194607 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.195649 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.195903 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.195985 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.196130 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.196344 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.196574 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.197310 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.198194 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.198329 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.198487 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.199459 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.199731 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.199847 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.199997 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.201783 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.202127 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.202342 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.202746 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.203154 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.203210 465088 usertrap_amd64.go:212] [ 58696: 58696] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:39.203288 465088 usertrap_amd64.go:122] [ 58696: 58696] Allocate a new trap: 0xc007f0c2d0 42 D0312 10:47:39.203402 465088 usertrap_amd64.go:225] [ 58696: 58696] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:39.203429 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.203585 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.203793 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.204076 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.204328 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.204482 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.204750 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.205094 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.205475 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.205594 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.205749 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.206086 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.206353 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.206483 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.206727 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.207132 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.207440 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.207580 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.207737 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.208255 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.208473 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.208598 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.208742 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.209039 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.209340 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.209460 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.209632 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.209931 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.210182 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.210285 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.210440 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.210701 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.210931 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.211017 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.211167 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.211393 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.212087 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.212182 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.212375 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.212603 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.212830 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.212978 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.213237 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.213482 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.213773 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.213939 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.214125 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.214388 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.214657 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.214793 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.215077 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.215352 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.216024 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.216233 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.216401 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.216725 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.216992 465088 usertrap_amd64.go:212] [ 58695: 58695] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:39.217044 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.217094 465088 usertrap_amd64.go:122] [ 58695: 58695] Allocate a new trap: 0xc00ce3e7e0 44 D0312 10:47:39.217132 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.217186 465088 usertrap_amd64.go:225] [ 58695: 58695] Apply the binary patch addr 55c5b5e1be1a trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:39.217297 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.217558 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.217846 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.218014 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.218257 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.222898 465088 usertrap_amd64.go:212] [ 58693: 58709] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:39.223014 465088 usertrap_amd64.go:122] [ 58693: 58709] Allocate a new trap: 0xc002a43500 43 D0312 10:47:39.223103 465088 usertrap_amd64.go:225] [ 58693: 58709] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:39.224211 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.224738 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.235748 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.236128 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.236239 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.236468 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.236670 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.236906 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.237054 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.237439 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.240624 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.242166 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.242255 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.242971 465088 usertrap_amd64.go:212] [ 58706: 58706] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:39.243066 465088 usertrap_amd64.go:122] [ 58706: 58706] Allocate a new trap: 0xc00e7ba660 42 D0312 10:47:39.243151 465088 usertrap_amd64.go:225] [ 58706: 58706] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:39.244568 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.248063 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.248363 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.248497 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.248776 465088 usertrap_amd64.go:212] [ 58693: 58693] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:39.248832 465088 usertrap_amd64.go:122] [ 58693: 58693] Allocate a new trap: 0xc002a43500 44 D0312 10:47:39.248892 465088 usertrap_amd64.go:225] [ 58693: 58693] Apply the binary patch addr 5652f299ce1a trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:39.252833 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.262272 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.262625 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.262777 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.263001 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.263406 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.263664 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.263765 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.264033 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.266711 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.269871 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.270007 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.270169 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.270514 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.270908 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.271000 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.271254 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.271580 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.271824 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.271962 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.272073 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.272383 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.272610 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.272709 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.272818 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.273221 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.273443 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.273559 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.273762 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.274135 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.274653 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.274766 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.277917 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.280385 465088 usertrap_amd64.go:212] [ 58693: 58693] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:39.280494 465088 usertrap_amd64.go:122] [ 58693: 58693] Allocate a new trap: 0xc002a43500 45 D0312 10:47:39.280558 465088 usertrap_amd64.go:225] [ 58693: 58693] Apply the binary patch addr 5652f2929fa4 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0312 10:47:39.287596 465088 usertrap_amd64.go:212] [ 58706: 58706] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:39.287733 465088 usertrap_amd64.go:122] [ 58706: 58706] Allocate a new trap: 0xc00e7ba660 43 D0312 10:47:39.287817 465088 usertrap_amd64.go:225] [ 58706: 58706] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:39.291880 465088 task_exit.go:204] [ 58693: 58693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.292255 465088 task_signals.go:204] [ 58693: 58709] Signal 58693, PID: 58709, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292284 465088 task_signals.go:204] [ 58693: 58712] Signal 58693, PID: 58712, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292283 465088 task_signals.go:204] [ 58693: 58705] Signal 58693, PID: 58705, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292432 465088 task_signals.go:204] [ 58693: 58697] Signal 58693, PID: 58697, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292468 465088 task_exit.go:204] [ 58693: 58709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.292593 465088 task_signals.go:204] [ 58693: 58711] Signal 58693, PID: 58711, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292599 465088 task_signals.go:204] [ 58693: 58699] Signal 58693, PID: 58699, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.292725 465088 task_exit.go:204] [ 58693: 58711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.292869 465088 task_exit.go:204] [ 58693: 58711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.292899 465088 task_exit.go:204] [ 58693: 58711] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.293500 465088 task_exit.go:204] [ 58693: 58712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.293696 465088 task_exit.go:204] [ 58693: 58712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.293735 465088 task_exit.go:204] [ 58693: 58712] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.293874 465088 task_exit.go:204] [ 58693: 58699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.294550 465088 task_exit.go:204] [ 58693: 58699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.294611 465088 task_exit.go:204] [ 58693: 58699] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.294734 465088 task_exit.go:204] [ 58693: 58705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.294890 465088 task_exit.go:204] [ 58693: 58705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.294929 465088 task_exit.go:204] [ 58693: 58705] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.294995 465088 task_exit.go:204] [ 58693: 58693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.295195 465088 task_exit.go:204] [ 58693: 58697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.295428 465088 task_exit.go:204] [ 58693: 58697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.295495 465088 task_exit.go:204] [ 58693: 58697] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.298046 465088 task_exit.go:204] [ 58693: 58709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.298128 465088 task_exit.go:204] [ 58693: 58709] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.298205 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:39.302737 465088 task_exit.go:204] [ 58693: 58693] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:39 executing program 0: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}, &(0x7f0000000080)=""/117, 0x75) (async) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000140)='\x00', 0x1, 0x3) (async) r0 = dup(0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) (async) r1 = dup(r0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)) (async) r2 = epoll_create1(0x80000) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x1) (async) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r3, 0xee01, 0x0) (async) r4 = openat$cgroup_type(r0, &(0x7f0000000280), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000380)={{r4}, 0x0, 0x14, @inherit={0x98, &(0x7f00000002c0)={0x0, 0xa, 0x4, 0x800, {0x30, 0x7ff, 0xfffffffffffffffc, 0x5, 0xf7}, [0x9, 0x6, 0xfff, 0x7, 0x4, 0x4, 0x6, 0x3, 0x90, 0x8]}}, @devid}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.net/syz1\x00', 0x200002, 0x0) fstat(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440), 0x40000, 0x0) syncfs(r8) (async) truncate(&(0x7f0000001480)='./file0\x00', 0x996) (async) faccessat2(r1, &(0x7f00000014c0)='./file0\x00', 0x50, 0x0) (async) r9 = open$dir(&(0x7f0000001500)='./file0\x00', 0x121201, 0xa0) fchownat(r9, &(0x7f0000001540)='./file0\x00', r6, r7, 0x400) mount$9p_fd(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x22000, &(0x7f0000001600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'y\x00'}}, {@access_any}, {@access_uid={'access', 0x3d, r6}}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@noextend}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffff}}]}}) (async) pipe2(&(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_tcp_buf(r11, 0x6, 0xd, &(0x7f0000001700)=""/163, &(0x7f00000017c0)=0xa3) (async) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000001800)) r12 = syz_open_dev$ttys(0xc, 0x2, 0x1) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r10, 0xd000943e, &(0x7f0000001840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000002840)={{r13, 0xfffffffffffffff9, 0x0, 0x8, 0x769, 0x6, 0xfffffffffffffffa, 0x1, 0x100, 0x6, 0x3b0, 0x8, 0xffffffffffff800f, 0x4, 0x7fffffffffffffff}, 0x8, [0x0]}) (async) write$FUSE_NOTIFY_DELETE(r11, &(0x7f00000028c0)={0x35, 0x6, 0x0, {0x6, 0x3, 0xc, 0x0, '&+\xf2(\x8d\xd7-\'%-/:'}}, 0x35) fsetxattr(r12, &(0x7f0000002900)=@known='trusted.overlay.opaque\x00', &(0x7f0000002940)='&+\xf2(\x8d\xd7-\'%-/:', 0xc, 0x3) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000002980), &(0x7f00000029c0)='./file0\x00', 0x8, 0x2) D0312 10:47:39.320757 465088 task_exit.go:204] [ 58706: 58706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.321030 465088 task_exit.go:204] [ 58706: 58706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.321288 465088 task_signals.go:204] [ 58706: 58713] Signal 58706, PID: 58713, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.321459 465088 task_exit.go:204] [ 58706: 58713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.323676 465088 task_exit.go:204] [ 58706: 58713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.323744 465088 task_exit.go:204] [ 58706: 58713] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.323831 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:39.326262 465088 task_exit.go:204] [ 58706: 58706] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:39 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c6530317e64202d202023215b207d0645beae1f4566e75bb56921784d9be8626ed8bc933a24f0af7d9514e4d0a8341c"], 0x2a) D0312 10:47:39.339347 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.339741 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.348771 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.349345 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.410052 465088 usertrap_amd64.go:212] [ 58714: 58714] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:39.410224 465088 usertrap_amd64.go:122] [ 58714: 58714] Allocate a new trap: 0xc006251f20 40 D0312 10:47:39.410729 465088 usertrap_amd64.go:225] [ 58714: 58714] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:39.412851 465088 usertrap_amd64.go:212] [ 58715: 58715] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:39.412973 465088 usertrap_amd64.go:122] [ 58715: 58715] Allocate a new trap: 0xc00d9fd7d0 40 D0312 10:47:39.413537 465088 usertrap_amd64.go:225] [ 58715: 58715] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:39.417042 465088 usertrap_amd64.go:212] [ 58715: 58715] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:39.417142 465088 usertrap_amd64.go:122] [ 58715: 58715] Allocate a new trap: 0xc00d9fd7d0 41 D0312 10:47:39.417276 465088 usertrap_amd64.go:225] [ 58715: 58715] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:39.424919 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:39.425310 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.459256 465088 usertrap_amd64.go:212] [ 58714: 58714] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:39.459377 465088 usertrap_amd64.go:122] [ 58714: 58714] Allocate a new trap: 0xc006251f20 41 D0312 10:47:39.459538 465088 usertrap_amd64.go:225] [ 58714: 58714] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:39.463749 465088 usertrap_amd64.go:212] [ 58715: 58715] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:39.463878 465088 usertrap_amd64.go:122] [ 58715: 58715] Allocate a new trap: 0xc00d9fd7d0 42 D0312 10:47:39.464025 465088 usertrap_amd64.go:225] [ 58715: 58715] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:39.489384 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:39.489738 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.515197 465088 usertrap_amd64.go:212] [ 58714: 58714] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:39.515275 465088 usertrap_amd64.go:122] [ 58714: 58714] Allocate a new trap: 0xc006251f20 42 D0312 10:47:39.515331 465088 usertrap_amd64.go:225] [ 58714: 58714] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:39.523602 465088 usertrap_amd64.go:212] [ 58715: 58715] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:39.523703 465088 usertrap_amd64.go:122] [ 58715: 58715] Allocate a new trap: 0xc00d9fd7d0 43 D0312 10:47:39.523795 465088 usertrap_amd64.go:225] [ 58715: 58715] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:39.527483 465088 task_exit.go:204] [ 58715: 58715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.527736 465088 task_exit.go:204] [ 58715: 58715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.531048 465088 task_signals.go:204] [ 58715: 58717] Signal 58715, PID: 58717, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.531137 465088 task_exit.go:204] [ 58715: 58717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.531317 465088 task_exit.go:204] [ 58715: 58717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.531355 465088 task_exit.go:204] [ 58715: 58717] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.531540 465088 task_signals.go:204] [ 58715: 58716] Signal 58715, PID: 58716, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.531606 465088 task_exit.go:204] [ 58715: 58716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.534899 465088 task_exit.go:204] [ 58715: 58716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.534960 465088 task_exit.go:204] [ 58715: 58716] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.535026 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:39.535718 465088 task_exit.go:204] [ 58715: 58715] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:39 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) (async) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c6530317e64202d202023215b207d0645beae1f4566e75bb56921784d9be8626ed8bc933a24f0af7d9514e4d0a8341c"], 0x2a) D0312 10:47:39.579183 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.579715 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.625626 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, ]} D0312 10:47:39.626064 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.626198 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0, ]} D0312 10:47:39.628224 465088 client.go:400] recv [channel 0xc00051c360] WalkResp{Status: 1, Inodes: []} D0312 10:47:39.637517 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.641091 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.664298 465088 usertrap_amd64.go:212] [ 58714: 58718] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:39.664414 465088 usertrap_amd64.go:122] [ 58714: 58718] Allocate a new trap: 0xc006251f20 43 D0312 10:47:39.664486 465088 usertrap_amd64.go:225] [ 58714: 58718] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:39.665888 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.668324 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.682476 465088 usertrap_amd64.go:212] [ 58714: 58714] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:39.682544 465088 usertrap_amd64.go:122] [ 58714: 58714] Allocate a new trap: 0xc006251f20 44 D0312 10:47:39.682657 465088 usertrap_amd64.go:225] [ 58714: 58714] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:39.689413 465088 task_exit.go:204] [ 58714: 58714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.689622 465088 task_signals.go:204] [ 58714: 58720] Signal 58714, PID: 58720, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.689665 465088 task_exit.go:204] [ 58714: 58714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.689829 465088 task_signals.go:204] [ 58714: 58719] Signal 58714, PID: 58719, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.689893 465088 task_exit.go:204] [ 58714: 58720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.690121 465088 task_signals.go:204] [ 58714: 58718] Signal 58714, PID: 58718, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.690252 465088 task_exit.go:204] [ 58714: 58720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.690309 465088 task_exit.go:204] [ 58714: 58720] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.690433 465088 task_exit.go:204] [ 58714: 58719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.690638 465088 task_exit.go:204] [ 58714: 58719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.690704 465088 task_exit.go:204] [ 58714: 58719] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.690802 465088 task_exit.go:204] [ 58714: 58718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.693854 465088 task_exit.go:204] [ 58714: 58718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.693912 465088 task_exit.go:204] [ 58714: 58718] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.693993 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:39.699865 465088 task_exit.go:204] [ 58714: 58714] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.701139 465088 usertrap_amd64.go:212] [ 58721: 58721] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:39.701232 465088 usertrap_amd64.go:122] [ 58721: 58721] Allocate a new trap: 0xc0075f94a0 40 D0312 10:47:39.701667 465088 usertrap_amd64.go:225] [ 58721: 58721] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:39.704387 465088 usertrap_amd64.go:212] [ 58721: 58721] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:39.704481 465088 usertrap_amd64.go:122] [ 58721: 58721] Allocate a new trap: 0xc0075f94a0 41 D0312 10:47:39.704600 465088 usertrap_amd64.go:225] [ 58721: 58721] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:39.706885 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:39.707706 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.739529 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.742472 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.760010 465088 usertrap_amd64.go:212] [ 58721: 58721] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:39.760119 465088 usertrap_amd64.go:122] [ 58721: 58721] Allocate a new trap: 0xc0075f94a0 42 D0312 10:47:39.760198 465088 usertrap_amd64.go:225] [ 58721: 58721] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:39.820933 465088 usertrap_amd64.go:212] [ 58695: 58695] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:39.821109 465088 usertrap_amd64.go:122] [ 58695: 58695] Allocate a new trap: 0xc00ce3e7e0 45 D0312 10:47:39.821222 465088 usertrap_amd64.go:225] [ 58695: 58695] Apply the binary patch addr 55c5b5da8fa4 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0312 10:47:39.826868 465088 task_exit.go:204] [ 58695: 58695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.827031 465088 task_signals.go:204] [ 58695: 58704] Signal 58695, PID: 58704, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.827146 465088 task_signals.go:204] [ 58695: 58701] Signal 58695, PID: 58701, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.827151 465088 task_exit.go:204] [ 58695: 58704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.827288 465088 task_exit.go:204] [ 58695: 58695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.827656 465088 task_signals.go:204] [ 58695: 58710] Signal 58695, PID: 58710, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.827752 465088 task_exit.go:204] [ 58695: 58710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.827848 465088 task_signals.go:204] [ 58695: 58707] Signal 58695, PID: 58707, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.828001 465088 task_exit.go:204] [ 58695: 58710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.828048 465088 task_exit.go:204] [ 58695: 58710] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.828146 465088 task_exit.go:204] [ 58695: 58707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.828345 465088 task_exit.go:204] [ 58695: 58707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.828384 465088 task_exit.go:204] [ 58695: 58707] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.828460 465088 task_exit.go:204] [ 58695: 58701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.828615 465088 task_exit.go:204] [ 58695: 58701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.828658 465088 task_exit.go:204] [ 58695: 58701] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.831075 465088 task_exit.go:204] [ 58695: 58704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.831150 465088 task_exit.go:204] [ 58695: 58704] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.831223 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:39.832534 465088 usertrap_amd64.go:212] [ 58696: 58696] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:39.832605 465088 usertrap_amd64.go:122] [ 58696: 58696] Allocate a new trap: 0xc007f0c2d0 43 D0312 10:47:39.832667 465088 usertrap_amd64.go:225] [ 58696: 58696] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:39.835224 465088 task_exit.go:204] [ 58695: 58695] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.838439 465088 usertrap_amd64.go:212] [ 58721: 58721] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:39.838509 465088 usertrap_amd64.go:122] [ 58721: 58721] Allocate a new trap: 0xc0075f94a0 43 D0312 10:47:39.838569 465088 usertrap_amd64.go:225] [ 58721: 58721] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:39.847287 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.847882 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.850935 465088 task_exit.go:204] [ 58721: 58721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.851082 465088 task_signals.go:204] [ 58721: 58722] Signal 58721, PID: 58722, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.851109 465088 task_exit.go:204] [ 58721: 58721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.851152 465088 task_exit.go:204] [ 58721: 58722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.851336 465088 task_exit.go:204] [ 58721: 58722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.851332 465088 task_signals.go:204] [ 58721: 58723] Signal 58721, PID: 58723, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.851381 465088 task_exit.go:204] [ 58721: 58722] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.851738 465088 task_exit.go:204] [ 58721: 58723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.854238 465088 task_exit.go:204] [ 58721: 58723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.854333 465088 task_exit.go:204] [ 58721: 58723] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.854432 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:39.855014 465088 task_exit.go:204] [ 58721: 58721] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.859439 465088 task_exit.go:204] [ 58696: 58696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.859696 465088 task_exit.go:204] [ 58696: 58696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.861104 465088 task_signals.go:204] [ 58696: 58708] Signal 58696, PID: 58708, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.861264 465088 task_exit.go:204] [ 58696: 58708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.861435 465088 task_exit.go:204] [ 58696: 58708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.861464 465088 task_exit.go:204] [ 58696: 58708] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.861749 465088 task_signals.go:204] [ 58696: 58703] Signal 58696, PID: 58703, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:39.861832 465088 task_exit.go:204] [ 58696: 58703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:39.863987 465088 task_exit.go:204] [ 58696: 58703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:39.864027 465088 task_exit.go:204] [ 58696: 58703] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:39.864125 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:39.865247 465088 task_exit.go:204] [ 58696: 58696] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r5 = eventfd(0x2) dup2(r4, r5) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:39 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x20, 0x0, [0xc6f, 0x9, 0x100000000, 0x0, 0x8000000000000000], [0x4, 0x9, 0x3, 0xffffffffffff40fc, 0x8000, 0x7, 0x64b, 0xffff, 0x80, 0x8, 0x100, 0xe8c, 0x3f, 0x5, 0x7f, 0x8, 0x0, 0x3, 0x6, 0xfffffffffffffe00, 0x80, 0x3, 0x31, 0x1000, 0x8, 0x1, 0x100000000, 0x86f, 0x3ff, 0xe05d, 0x800, 0xf, 0x7fffffffffffffff, 0x5, 0x2, 0x6, 0x3ff, 0x9, 0x3, 0x4, 0x674c, 0x5, 0x200000, 0xffffffffffffffff, 0x7, 0xfff, 0x0, 0x6, 0x9, 0x5, 0x5, 0x10000, 0x6, 0x81, 0x7ff, 0x1, 0xfff, 0x6, 0x0, 0xfff, 0xe0f2, 0xcc88, 0xffff, 0x7, 0x9, 0x2, 0xfff, 0x6, 0xff, 0xfb2, 0x1, 0x9, 0x5, 0x102000, 0x1, 0x101, 0x8, 0x0, 0x2, 0xff, 0x7f, 0x8000, 0x6724cabb, 0x9, 0xfffffffffffffff8, 0x1, 0x1, 0xe3f, 0x2, 0x1, 0x2, 0x1, 0x0, 0x32, 0x958e, 0x101, 0x7ff, 0x0, 0x3, 0x5, 0x100000000, 0x7ff, 0x7, 0xffffffff, 0x20, 0xfffffffffffff001, 0x9, 0x8, 0x100000001, 0xfffffffffffff78e, 0xfffffffffffffff9, 0x1ff, 0x1, 0x94, 0x7, 0xdcc5, 0x40, 0x1, 0x6, 0x5, 0x5365c123]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6, 0x9a4d, 0x1}) 10:47:39 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat2(r1, &(0x7f0000000000)='\x00', 0x3, 0x1100) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x6c, 0x1, 0x1, "a645659aff74e6a8bdb8e3cab0e30afe", "6ed9a78bbae657c7970f10375d37d0f1771121f574b1c57afff396783b4ec522f7c82fa27f2934a1980231c39ba87e0d9c15454776e5b4ac25359817bb755562c798e54c8c4b231ca9dff3b2a8758effa8932fb7e2ebd6"}, 0x6c, 0x3) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) 10:47:39 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1) ioctl$KDGKBSENT(r0, 0x5450, 0x0) D0312 10:47:39.879570 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.880383 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.901976 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:39.902341 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.961126 465088 usertrap_amd64.go:212] [ 58725: 58725] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:39.961282 465088 usertrap_amd64.go:122] [ 58725: 58725] Allocate a new trap: 0xc0072c8090 40 D0312 10:47:39.961801 465088 usertrap_amd64.go:225] [ 58725: 58725] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:39.963936 465088 usertrap_amd64.go:212] [ 58725: 58725] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:39.964009 465088 usertrap_amd64.go:122] [ 58725: 58725] Allocate a new trap: 0xc0072c8090 41 D0312 10:47:39.964091 465088 usertrap_amd64.go:225] [ 58725: 58725] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:39.972438 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:39.972842 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:39.985377 465088 usertrap_amd64.go:212] [ 58724: 58724] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:39.985543 465088 usertrap_amd64.go:122] [ 58724: 58724] Allocate a new trap: 0xc00ce3f6b0 40 D0312 10:47:39.985942 465088 usertrap_amd64.go:225] [ 58724: 58724] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:39.990873 465088 usertrap_amd64.go:212] [ 58727: 58727] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:39.991008 465088 usertrap_amd64.go:122] [ 58727: 58727] Allocate a new trap: 0xc00ce3f6e0 39 D0312 10:47:39.991324 465088 usertrap_amd64.go:225] [ 58727: 58727] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:39.994788 465088 usertrap_amd64.go:212] [ 58724: 58724] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:39.994862 465088 usertrap_amd64.go:122] [ 58724: 58724] Allocate a new trap: 0xc00ce3f6b0 41 D0312 10:47:39.994913 465088 usertrap_amd64.go:225] [ 58724: 58724] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:40.002719 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.003524 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.005088 465088 usertrap_amd64.go:212] [ 58727: 58727] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:40.005159 465088 usertrap_amd64.go:122] [ 58727: 58727] Allocate a new trap: 0xc00ce3f6e0 40 D0312 10:47:40.005238 465088 usertrap_amd64.go:225] [ 58727: 58727] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:40.007207 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.007584 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.008681 465088 usertrap_amd64.go:212] [ 58726: 58726] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:40.008798 465088 usertrap_amd64.go:122] [ 58726: 58726] Allocate a new trap: 0xc0032fbef0 40 D0312 10:47:40.009287 465088 usertrap_amd64.go:225] [ 58726: 58726] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:40.012114 465088 usertrap_amd64.go:212] [ 58726: 58726] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:40.012189 465088 usertrap_amd64.go:122] [ 58726: 58726] Allocate a new trap: 0xc0032fbef0 41 D0312 10:47:40.012249 465088 usertrap_amd64.go:225] [ 58726: 58726] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:40.016104 465088 usertrap_amd64.go:212] [ 58727: 58727] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:40.016174 465088 usertrap_amd64.go:122] [ 58727: 58727] Allocate a new trap: 0xc00ce3f6e0 41 D0312 10:47:40.016225 465088 usertrap_amd64.go:225] [ 58727: 58727] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:40.031526 465088 usertrap_amd64.go:212] [ 58725: 58725] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:40.031633 465088 usertrap_amd64.go:122] [ 58725: 58725] Allocate a new trap: 0xc0072c8090 42 D0312 10:47:40.031761 465088 usertrap_amd64.go:225] [ 58725: 58725] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:40.039393 465088 usertrap_amd64.go:212] [ 58724: 58724] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:40.040605 465088 usertrap_amd64.go:122] [ 58724: 58724] Allocate a new trap: 0xc00ce3f6b0 42 D0312 10:47:40.040670 465088 usertrap_amd64.go:225] [ 58724: 58724] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:40.053825 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.054216 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.083489 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.083874 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.083939 465088 usertrap_amd64.go:212] [ 58726: 58726] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:40.084026 465088 usertrap_amd64.go:122] [ 58726: 58726] Allocate a new trap: 0xc0032fbef0 42 D0312 10:47:40.084087 465088 usertrap_amd64.go:225] [ 58726: 58726] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:40.097992 465088 usertrap_amd64.go:212] [ 58725: 58725] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:40.098081 465088 usertrap_amd64.go:122] [ 58725: 58725] Allocate a new trap: 0xc0072c8090 43 D0312 10:47:40.098139 465088 usertrap_amd64.go:225] [ 58725: 58725] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:40.099112 465088 usertrap_amd64.go:212] [ 58724: 58724] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:40.099191 465088 usertrap_amd64.go:122] [ 58724: 58724] Allocate a new trap: 0xc00ce3f6b0 43 D0312 10:47:40.099280 465088 usertrap_amd64.go:225] [ 58724: 58724] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:40.106411 465088 task_exit.go:204] [ 58725: 58725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.106623 465088 task_exit.go:204] [ 58725: 58725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.107965 465088 task_signals.go:204] [ 58725: 58729] Signal 58725, PID: 58729, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.108110 465088 task_exit.go:204] [ 58725: 58729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.111543 465088 task_exit.go:204] [ 58725: 58729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.111645 465088 task_exit.go:204] [ 58725: 58729] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.111809 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:40.113002 465088 task_exit.go:204] [ 58725: 58725] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:40 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x20, 0x0, [0xc6f, 0x9, 0x100000000, 0x0, 0x8000000000000000], [0x4, 0x9, 0x3, 0xffffffffffff40fc, 0x8000, 0x7, 0x64b, 0xffff, 0x80, 0x8, 0x100, 0xe8c, 0x3f, 0x5, 0x7f, 0x8, 0x0, 0x3, 0x6, 0xfffffffffffffe00, 0x80, 0x3, 0x31, 0x1000, 0x8, 0x1, 0x100000000, 0x86f, 0x3ff, 0xe05d, 0x800, 0xf, 0x7fffffffffffffff, 0x5, 0x2, 0x6, 0x3ff, 0x9, 0x3, 0x4, 0x674c, 0x5, 0x200000, 0xffffffffffffffff, 0x7, 0xfff, 0x0, 0x6, 0x9, 0x5, 0x5, 0x10000, 0x6, 0x81, 0x7ff, 0x1, 0xfff, 0x6, 0x0, 0xfff, 0xe0f2, 0xcc88, 0xffff, 0x7, 0x9, 0x2, 0xfff, 0x6, 0xff, 0xfb2, 0x1, 0x9, 0x5, 0x102000, 0x1, 0x101, 0x8, 0x0, 0x2, 0xff, 0x7f, 0x8000, 0x6724cabb, 0x9, 0xfffffffffffffff8, 0x1, 0x1, 0xe3f, 0x2, 0x1, 0x2, 0x1, 0x0, 0x32, 0x958e, 0x101, 0x7ff, 0x0, 0x3, 0x5, 0x100000000, 0x7ff, 0x7, 0xffffffff, 0x20, 0xfffffffffffff001, 0x9, 0x8, 0x100000001, 0xfffffffffffff78e, 0xfffffffffffffff9, 0x1ff, 0x1, 0x94, 0x7, 0xdcc5, 0x40, 0x1, 0x6, 0x5, 0x5365c123]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6, 0x9a4d, 0x1}) D0312 10:47:40.129160 465088 task_exit.go:204] [ 58724: 58724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.129442 465088 task_exit.go:204] [ 58724: 58724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.129908 465088 task_signals.go:204] [ 58724: 58730] Signal 58724, PID: 58730, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.130048 465088 task_exit.go:204] [ 58724: 58730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.132055 465088 task_exit.go:204] [ 58724: 58730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.132126 465088 task_exit.go:204] [ 58724: 58730] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.132230 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:40.132322 465088 task_exit.go:204] [ 58724: 58724] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:40 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1) ioctl$KDGKBSENT(r0, 0x5450, 0x0) D0312 10:47:40.153678 465088 usertrap_amd64.go:212] [ 58726: 58726] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:40.153751 465088 usertrap_amd64.go:122] [ 58726: 58726] Allocate a new trap: 0xc0032fbef0 43 D0312 10:47:40.153864 465088 usertrap_amd64.go:225] [ 58726: 58726] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:40.184068 465088 task_signals.go:470] [ 7: 9388] Notified of signal 23 D0312 10:47:40.190308 465088 task_signals.go:220] [ 7: 9388] Signal 23: delivering to handler D0312 10:47:40.191118 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.192112 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.192406 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.192863 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.234343 465088 task_exit.go:204] [ 58726: 58726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.234661 465088 task_exit.go:204] [ 58726: 58726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.235190 465088 task_signals.go:204] [ 58726: 58731] Signal 58726, PID: 58731, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.235297 465088 task_exit.go:204] [ 58726: 58731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.238497 465088 task_exit.go:204] [ 58726: 58731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.238565 465088 task_exit.go:204] [ 58726: 58731] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.238658 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:40.239662 465088 task_exit.go:204] [ 58726: 58726] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:40 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) (async) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat2(r1, &(0x7f0000000000)='\x00', 0x3, 0x1100) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x6c, 0x1, 0x1, "a645659aff74e6a8bdb8e3cab0e30afe", "6ed9a78bbae657c7970f10375d37d0f1771121f574b1c57afff396783b4ec522f7c82fa27f2934a1980231c39ba87e0d9c15454776e5b4ac25359817bb755562c798e54c8c4b231ca9dff3b2a8758effa8932fb7e2ebd6"}, 0x6c, 0x3) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) D0312 10:47:40.252664 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.253098 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.266766 465088 usertrap_amd64.go:212] [ 58734: 58734] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:40.266878 465088 usertrap_amd64.go:122] [ 58734: 58734] Allocate a new trap: 0xc0075f8000 40 D0312 10:47:40.267596 465088 usertrap_amd64.go:225] [ 58734: 58734] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:40.270685 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.272203 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.272666 465088 usertrap_amd64.go:212] [ 58727: 58727] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:40.272793 465088 usertrap_amd64.go:122] [ 58727: 58727] Allocate a new trap: 0xc00ce3f6e0 42 D0312 10:47:40.272869 465088 usertrap_amd64.go:225] [ 58727: 58727] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:40.274675 465088 usertrap_amd64.go:212] [ 58734: 58734] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:40.274765 465088 usertrap_amd64.go:122] [ 58734: 58734] Allocate a new trap: 0xc0075f8000 41 D0312 10:47:40.274834 465088 usertrap_amd64.go:225] [ 58734: 58734] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:40.277451 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.280296 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.305860 465088 task_signals.go:470] [ 7: 9] Notified of signal 23 D0312 10:47:40.306190 465088 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0312 10:47:40.311970 465088 usertrap_amd64.go:212] [ 58733: 58733] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:40.312136 465088 usertrap_amd64.go:122] [ 58733: 58733] Allocate a new trap: 0xc00d020000 40 D0312 10:47:40.313091 465088 usertrap_amd64.go:225] [ 58733: 58733] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:40.314980 465088 usertrap_amd64.go:212] [ 58734: 58734] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:40.315098 465088 usertrap_amd64.go:122] [ 58734: 58734] Allocate a new trap: 0xc0075f8000 42 D0312 10:47:40.315214 465088 usertrap_amd64.go:225] [ 58734: 58734] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:40.315521 465088 usertrap_amd64.go:212] [ 58733: 58733] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:40.315604 465088 usertrap_amd64.go:122] [ 58733: 58733] Allocate a new trap: 0xc00d020000 41 D0312 10:47:40.315670 465088 usertrap_amd64.go:225] [ 58733: 58733] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:40.318408 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.319349 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.343223 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.345229 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.345321 465088 usertrap_amd64.go:212] [ 58733: 58733] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:40.345427 465088 usertrap_amd64.go:122] [ 58733: 58733] Allocate a new trap: 0xc00d020000 42 D0312 10:47:40.345531 465088 usertrap_amd64.go:225] [ 58733: 58733] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:40.349229 465088 usertrap_amd64.go:212] [ 58734: 58734] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:40.349334 465088 usertrap_amd64.go:122] [ 58734: 58734] Allocate a new trap: 0xc0075f8000 43 D0312 10:47:40.349415 465088 usertrap_amd64.go:225] [ 58734: 58734] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:40.351955 465088 task_exit.go:204] [ 58734: 58734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.352191 465088 task_exit.go:204] [ 58734: 58734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.353411 465088 task_signals.go:204] [ 58734: 58736] Signal 58734, PID: 58736, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.353536 465088 task_exit.go:204] [ 58734: 58736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.357152 465088 task_exit.go:204] [ 58734: 58736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.357211 465088 task_exit.go:204] [ 58734: 58736] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.357303 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:40.357530 465088 task_exit.go:204] [ 58734: 58734] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.362441 465088 usertrap_amd64.go:212] [ 58735: 58735] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:40.362518 465088 usertrap_amd64.go:122] [ 58735: 58735] Allocate a new trap: 0xc00d020030 40 D0312 10:47:40.362915 465088 usertrap_amd64.go:225] [ 58735: 58735] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) 10:47:40 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1) ioctl$KDGKBSENT(r0, 0x5450, 0x0) D0312 10:47:40.366096 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.368028 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.369964 465088 usertrap_amd64.go:212] [ 58735: 58735] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:40.370070 465088 usertrap_amd64.go:122] [ 58735: 58735] Allocate a new trap: 0xc00d020030 41 D0312 10:47:40.370135 465088 usertrap_amd64.go:225] [ 58735: 58735] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:40.373739 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.377582 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.390596 465088 usertrap_amd64.go:212] [ 58733: 58733] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:40.390706 465088 usertrap_amd64.go:122] [ 58733: 58733] Allocate a new trap: 0xc00d020000 43 D0312 10:47:40.390789 465088 usertrap_amd64.go:225] [ 58733: 58733] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:40.396711 465088 usertrap_amd64.go:212] [ 58735: 58735] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:40.396831 465088 usertrap_amd64.go:122] [ 58735: 58735] Allocate a new trap: 0xc00d020030 42 D0312 10:47:40.397000 465088 usertrap_amd64.go:225] [ 58735: 58735] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:40.400382 465088 task_exit.go:204] [ 58733: 58733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.400589 465088 task_signals.go:204] [ 58733: 58737] Signal 58733, PID: 58737, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.400666 465088 task_exit.go:204] [ 58733: 58733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.400809 465088 task_exit.go:204] [ 58733: 58737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.402850 465088 task_exit.go:204] [ 58733: 58737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.402925 465088 task_exit.go:204] [ 58733: 58737] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.403016 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:40.405022 465088 task_exit.go:204] [ 58733: 58733] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.441414 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.441800 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.446373 465088 usertrap_amd64.go:212] [ 58738: 58738] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:40.446470 465088 usertrap_amd64.go:122] [ 58738: 58738] Allocate a new trap: 0xc0072c80c0 40 D0312 10:47:40.447971 465088 usertrap_amd64.go:225] [ 58738: 58738] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:40.461283 465088 usertrap_amd64.go:212] [ 58738: 58738] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:40.461387 465088 usertrap_amd64.go:122] [ 58738: 58738] Allocate a new trap: 0xc0072c80c0 41 D0312 10:47:40.461467 465088 usertrap_amd64.go:225] [ 58738: 58738] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:40.463756 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.464585 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.473582 465088 usertrap_amd64.go:212] [ 58735: 58735] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:40.473656 465088 usertrap_amd64.go:122] [ 58735: 58735] Allocate a new trap: 0xc00d020030 43 D0312 10:47:40.473714 465088 usertrap_amd64.go:225] [ 58735: 58735] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:40.479452 465088 task_exit.go:204] [ 58735: 58735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.479787 465088 task_signals.go:204] [ 58735: 58739] Signal 58735, PID: 58739, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.479797 465088 task_exit.go:204] [ 58735: 58735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.480032 465088 task_exit.go:204] [ 58735: 58739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.480169 465088 task_signals.go:204] [ 58735: 58740] Signal 58735, PID: 58740, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.480337 465088 task_exit.go:204] [ 58735: 58739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.480382 465088 task_exit.go:204] [ 58735: 58739] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.480902 465088 task_exit.go:204] [ 58735: 58740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.482913 465088 task_exit.go:204] [ 58735: 58740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.482952 465088 task_exit.go:204] [ 58735: 58740] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.483009 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:40.488692 465088 task_exit.go:204] [ 58735: 58735] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.492146 465088 usertrap_amd64.go:212] [ 58738: 58738] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:40.492339 465088 usertrap_amd64.go:122] [ 58738: 58738] Allocate a new trap: 0xc0072c80c0 42 D0312 10:47:40.492478 465088 usertrap_amd64.go:225] [ 58738: 58738] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:40.502468 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.504670 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.541427 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.541959 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.544552 465088 usertrap_amd64.go:212] [ 58738: 58738] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:40.544665 465088 usertrap_amd64.go:122] [ 58738: 58738] Allocate a new trap: 0xc0072c80c0 43 D0312 10:47:40.544747 465088 usertrap_amd64.go:225] [ 58738: 58738] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:40.547761 465088 task_exit.go:204] [ 58738: 58738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.548040 465088 task_exit.go:204] [ 58738: 58738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.549658 465088 task_signals.go:204] [ 58738: 58741] Signal 58738, PID: 58741, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.549764 465088 task_exit.go:204] [ 58738: 58741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.551737 465088 task_exit.go:204] [ 58738: 58741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.551782 465088 task_exit.go:204] [ 58738: 58741] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.551862 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:40.554209 465088 task_exit.go:204] [ 58738: 58738] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.560656 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.563948 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.844493 465088 usertrap_amd64.go:212] [ 58727: 58727] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:40.844607 465088 usertrap_amd64.go:122] [ 58727: 58727] Allocate a new trap: 0xc00ce3f6e0 43 D0312 10:47:40.844674 465088 usertrap_amd64.go:225] [ 58727: 58727] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:40.869487 465088 task_exit.go:204] [ 58727: 58727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.869746 465088 task_exit.go:204] [ 58727: 58727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.870034 465088 task_signals.go:204] [ 58727: 58728] Signal 58727, PID: 58728, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.870019 465088 task_signals.go:204] [ 58727: 58732] Signal 58727, PID: 58732, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:40.870141 465088 task_exit.go:204] [ 58727: 58728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.870370 465088 task_exit.go:204] [ 58727: 58728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.870464 465088 task_exit.go:204] [ 58727: 58728] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.870643 465088 task_exit.go:204] [ 58727: 58732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:40.872820 465088 task_exit.go:204] [ 58727: 58732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:40.872874 465088 task_exit.go:204] [ 58727: 58732] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.872975 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:40.875840 465088 task_exit.go:204] [ 58727: 58727] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:40.884673 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:40.886262 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r5 = eventfd(0x2) dup2(r4, r5) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:40 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat2(r1, &(0x7f0000000000)='\x00', 0x3, 0x1100) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x6c, 0x1, 0x1, "a645659aff74e6a8bdb8e3cab0e30afe", "6ed9a78bbae657c7970f10375d37d0f1771121f574b1c57afff396783b4ec522f7c82fa27f2934a1980231c39ba87e0d9c15454776e5b4ac25359817bb755562c798e54c8c4b231ca9dff3b2a8758effa8932fb7e2ebd6"}, 0x6c, 0x3) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) fcntl$dupfd(r0, 0x0, r0) (async) faccessat2(r1, &(0x7f0000000000)='\x00', 0x3, 0x1100) (async) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x6c, 0x1, 0x1, "a645659aff74e6a8bdb8e3cab0e30afe", "6ed9a78bbae657c7970f10375d37d0f1771121f574b1c57afff396783b4ec522f7c82fa27f2934a1980231c39ba87e0d9c15454776e5b4ac25359817bb755562c798e54c8c4b231ca9dff3b2a8758effa8932fb7e2ebd6"}, 0x6c, 0x3) (async) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) (async) 10:47:40 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x20, 0x0, [0xc6f, 0x9, 0x100000000, 0x0, 0x8000000000000000], [0x4, 0x9, 0x3, 0xffffffffffff40fc, 0x8000, 0x7, 0x64b, 0xffff, 0x80, 0x8, 0x100, 0xe8c, 0x3f, 0x5, 0x7f, 0x8, 0x0, 0x3, 0x6, 0xfffffffffffffe00, 0x80, 0x3, 0x31, 0x1000, 0x8, 0x1, 0x100000000, 0x86f, 0x3ff, 0xe05d, 0x800, 0xf, 0x7fffffffffffffff, 0x5, 0x2, 0x6, 0x3ff, 0x9, 0x3, 0x4, 0x674c, 0x5, 0x200000, 0xffffffffffffffff, 0x7, 0xfff, 0x0, 0x6, 0x9, 0x5, 0x5, 0x10000, 0x6, 0x81, 0x7ff, 0x1, 0xfff, 0x6, 0x0, 0xfff, 0xe0f2, 0xcc88, 0xffff, 0x7, 0x9, 0x2, 0xfff, 0x6, 0xff, 0xfb2, 0x1, 0x9, 0x5, 0x102000, 0x1, 0x101, 0x8, 0x0, 0x2, 0xff, 0x7f, 0x8000, 0x6724cabb, 0x9, 0xfffffffffffffff8, 0x1, 0x1, 0xe3f, 0x2, 0x1, 0x2, 0x1, 0x0, 0x32, 0x958e, 0x101, 0x7ff, 0x0, 0x3, 0x5, 0x100000000, 0x7ff, 0x7, 0xffffffff, 0x20, 0xfffffffffffff001, 0x9, 0x8, 0x100000001, 0xfffffffffffff78e, 0xfffffffffffffff9, 0x1ff, 0x1, 0x94, 0x7, 0xdcc5, 0x40, 0x1, 0x6, 0x5, 0x5365c123]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6, 0x9a4d, 0x1}) (async) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6, 0x9a4d, 0x1}) 10:47:40 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r0, &(0x7f0000000000)=""/57, 0x39, 0x40000001, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @empty, 0x3}, 0x1c) r1 = accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x0) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x4e21, 0x5, @empty, 0xfff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000140)="d502896cf0c0694b883f343a14149babea2aaab0feab4e5d1aac13816b2a28595938d39d162756148a63e1f25077750a6e55d5c93ddc3a20da5ef4921dd2fd99dd1f070e3d77d64d4f623f45c7f53ee3c473a1f51abf6fae7a4b7d615a83751774deafb6bf22dafe65d6f7b6da488da2d21408ae9c1eac0427717862d5a25c6518ac14bc27cc978f12c67fe1f038e5c88fe760a8263fe589695dbbcede8896d87533f9f2229d41bee4274ed5d57dd9c6bcbccec39c31a1b2ab", 0xb9}, {&(0x7f0000000200)="e923fe6c0451fc84eed77a3a1a2a29c3fa81ab8842f24959c8047095d743e7e8eaabe5c1d03d8c3998d9c86bba651c6a55eade58c504a754b4b02cec04f621eb8c7b59a8b2d82ae8853aee637d42f035fda54facd1aafe7a0f", 0x59}, {&(0x7f0000000280)="efa993908a3afb2d0a70764d0b59bda99409d7fe62f3b3c1ca5789600d9e8d4c5dd4215fa4033b490ad9b9119138fdb5bbe588ac7f0fa39aa629c7961e956428daf9ea31288fc314c1516d89cd715b4c38b02316", 0x54}], 0x3}, 0x90) r2 = socket(0x2, 0x3, 0x400) r3 = dup3(r1, r2, 0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000380)=""/150, 0x96}], 0x1) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x50000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000004c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000540)=""/165, &(0x7f0000000600)=0xa5) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) recvfrom$inet6(r2, &(0x7f00000006c0)=""/93, 0x5d, 0x83, &(0x7f0000000740)={0xa, 0x4e22, 0x1, @private2, 0x4}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000780)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000840)={'syztnl2\x00', &(0x7f00000007c0)={'gretap0\x00', r5, 0x20, 0x80, 0x1, 0xfff, {{0x10, 0x4, 0x0, 0x0, 0x40, 0x67, 0x0, 0xfe, 0x29, 0x0, @private=0xa010102, @local, {[@rr={0x7, 0x1b, 0xcd, [@private=0xa010100, @private=0xa010101, @broadcast, @multicast1, @rand_addr=0x64010102, @remote]}, @timestamp_prespec={0x44, 0x4, 0xbc, 0x3, 0xb}, @timestamp={0x44, 0xc, 0x95, 0x0, 0x6, [0x0, 0x6]}, @end]}}}}}) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='./binderfs/binder-control\x00', 0x800, 0x0) lseek(r7, 0xffffffffffff0001, 0x1) r8 = accept4(r3, &(0x7f00000008c0)=@phonet, &(0x7f0000000940)=0x80, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000009c0)=0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000a00)={'hsr0\x00', {0x2, 0x4e20, @multicast1}}) r10 = openat$cgroup_devices(r4, &(0x7f0000000a40)='devices.deny\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r10, 0xc020660b, &(0x7f0000000a80)={0x7, 0x3, 0x4, 0x6, 0x6, [{0xffffffff, 0x89, 0xfff, '\x00', 0x1002}, {0x1, 0x8, 0x0, '\x00', 0x2}, {0x3, 0x6, 0x92, '\x00', 0x280}, {0x9, 0x4, 0x3, '\x00', 0x209}, {0x420, 0x5, 0x1}, {0xfae, 0x9, 0x7}]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000c00)={'vxcan1\x00'}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000c40)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000c80)=0x1c, 0x80800) pipe(&(0x7f0000000cc0)) r11 = accept4$inet(r2, &(0x7f0000000d00)={0x2, 0x0, @dev}, &(0x7f0000000d40)=0x10, 0x80800) ioctl$AUTOFS_IOC_READY(r11, 0x9360, 0x1) r12 = signalfd4(r1, &(0x7f0000000d80)={[0x5]}, 0x8, 0x800) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000dc0)={@private2, r6}, 0x14) D0312 10:47:40.955114 465088 usertrap_amd64.go:212] [ 58742: 58742] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:40.955299 465088 usertrap_amd64.go:122] [ 58742: 58742] Allocate a new trap: 0xc0072c8270 40 D0312 10:47:40.955804 465088 usertrap_amd64.go:225] [ 58742: 58742] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:40.963824 465088 usertrap_amd64.go:212] [ 58744: 58744] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:40.963951 465088 usertrap_amd64.go:122] [ 58744: 58744] Allocate a new trap: 0xc00d9fc1e0 40 D0312 10:47:40.964775 465088 usertrap_amd64.go:212] [ 58742: 58742] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:40.964825 465088 usertrap_amd64.go:122] [ 58742: 58742] Allocate a new trap: 0xc0072c8270 41 D0312 10:47:40.964895 465088 usertrap_amd64.go:225] [ 58742: 58742] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:40.968254 465088 usertrap_amd64.go:212] [ 58743: 58743] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:40.968278 465088 usertrap_amd64.go:225] [ 58744: 58744] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:40.968380 465088 usertrap_amd64.go:122] [ 58743: 58743] Allocate a new trap: 0xc007f8a030 40 D0312 10:47:40.969307 465088 usertrap_amd64.go:225] [ 58743: 58743] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:40.970178 465088 usertrap_amd64.go:212] [ 58744: 58744] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:40.970239 465088 usertrap_amd64.go:122] [ 58744: 58744] Allocate a new trap: 0xc00d9fc1e0 41 D0312 10:47:40.970296 465088 usertrap_amd64.go:225] [ 58744: 58744] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:40.973475 465088 usertrap_amd64.go:212] [ 58745: 58745] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:40.973610 465088 usertrap_amd64.go:122] [ 58745: 58745] Allocate a new trap: 0xc007ec81b0 39 D0312 10:47:40.974385 465088 usertrap_amd64.go:225] [ 58745: 58745] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:40.976847 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.980036 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.980346 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.983628 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.985090 465088 usertrap_amd64.go:212] [ 58743: 58743] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:40.985147 465088 usertrap_amd64.go:122] [ 58743: 58743] Allocate a new trap: 0xc007f8a030 41 D0312 10:47:40.985211 465088 usertrap_amd64.go:225] [ 58743: 58743] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:40.989471 465088 usertrap_amd64.go:212] [ 58745: 58745] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:40.989531 465088 usertrap_amd64.go:122] [ 58745: 58745] Allocate a new trap: 0xc007ec81b0 40 D0312 10:47:40.989599 465088 usertrap_amd64.go:225] [ 58745: 58745] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:40.996367 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:40.996835 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:40.998584 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.001461 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.014959 465088 usertrap_amd64.go:212] [ 58745: 58745] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:41.015043 465088 usertrap_amd64.go:122] [ 58745: 58745] Allocate a new trap: 0xc007ec81b0 41 D0312 10:47:41.015115 465088 usertrap_amd64.go:225] [ 58745: 58745] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:41.019953 465088 usertrap_amd64.go:212] [ 58744: 58744] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:41.020026 465088 usertrap_amd64.go:122] [ 58744: 58744] Allocate a new trap: 0xc00d9fc1e0 42 D0312 10:47:41.020096 465088 usertrap_amd64.go:225] [ 58744: 58744] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:41.021020 465088 usertrap_amd64.go:212] [ 58742: 58742] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:41.021109 465088 usertrap_amd64.go:122] [ 58742: 58742] Allocate a new trap: 0xc0072c8270 42 D0312 10:47:41.021169 465088 usertrap_amd64.go:225] [ 58742: 58742] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:41.043065 465088 usertrap_amd64.go:212] [ 58743: 58743] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:41.043173 465088 usertrap_amd64.go:122] [ 58743: 58743] Allocate a new trap: 0xc007f8a030 42 D0312 10:47:41.043245 465088 usertrap_amd64.go:225] [ 58743: 58743] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:41.078644 465088 usertrap_amd64.go:212] [ 58744: 58744] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:41.078721 465088 usertrap_amd64.go:122] [ 58744: 58744] Allocate a new trap: 0xc00d9fc1e0 43 D0312 10:47:41.078801 465088 usertrap_amd64.go:225] [ 58744: 58744] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:41.091734 465088 task_exit.go:204] [ 58744: 58744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.091894 465088 task_signals.go:204] [ 58744: 58750] Signal 58744, PID: 58750, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.092136 465088 task_signals.go:204] [ 58744: 58748] Signal 58744, PID: 58748, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.092213 465088 task_exit.go:204] [ 58744: 58750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.092282 465088 task_exit.go:204] [ 58744: 58744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.092517 465088 task_exit.go:204] [ 58744: 58748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.092736 465088 task_exit.go:204] [ 58744: 58748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.092773 465088 task_exit.go:204] [ 58744: 58748] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.095316 465088 task_exit.go:204] [ 58744: 58750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.095410 465088 task_exit.go:204] [ 58744: 58750] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.095499 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:41.098987 465088 task_exit.go:204] [ 58744: 58744] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:41 executing program 1: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) D0312 10:47:41.111904 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.113426 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.132694 465088 usertrap_amd64.go:212] [ 58742: 58742] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:41.132766 465088 usertrap_amd64.go:122] [ 58742: 58742] Allocate a new trap: 0xc0072c8270 43 D0312 10:47:41.132846 465088 usertrap_amd64.go:225] [ 58742: 58742] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:41.138012 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.138391 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.139218 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.139547 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.145417 465088 usertrap_amd64.go:212] [ 58742: 58742] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:41.145554 465088 usertrap_amd64.go:122] [ 58742: 58742] Allocate a new trap: 0xc0072c8270 44 D0312 10:47:41.145625 465088 usertrap_amd64.go:225] [ 58742: 58742] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:41.156697 465088 task_exit.go:204] [ 58742: 58742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.157138 465088 task_signals.go:204] [ 58742: 58751] Signal 58742, PID: 58751, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.157404 465088 task_exit.go:204] [ 58742: 58751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.157628 465088 task_signals.go:204] [ 58742: 58753] Signal 58742, PID: 58753, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.157787 465088 task_signals.go:204] [ 58742: 58747] Signal 58742, PID: 58747, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.157922 465088 task_signals.go:204] [ 58742: 58752] Signal 58742, PID: 58752, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.158288 465088 task_exit.go:204] [ 58742: 58747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.158471 465088 task_exit.go:204] [ 58742: 58747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.158580 465088 task_exit.go:204] [ 58742: 58747] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.160220 465088 task_exit.go:204] [ 58742: 58742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.160472 465088 task_exit.go:204] [ 58742: 58753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.160575 465088 task_exit.go:204] [ 58742: 58752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.161041 465088 task_exit.go:204] [ 58742: 58751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.161203 465088 task_exit.go:204] [ 58742: 58751] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.161340 465088 task_exit.go:204] [ 58742: 58753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.161431 465088 task_exit.go:204] [ 58742: 58753] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.162276 465088 usertrap_amd64.go:212] [ 58743: 58743] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:41.162381 465088 usertrap_amd64.go:122] [ 58743: 58743] Allocate a new trap: 0xc007f8a030 43 D0312 10:47:41.162499 465088 usertrap_amd64.go:225] [ 58743: 58743] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:41.165467 465088 task_exit.go:204] [ 58742: 58752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.165538 465088 task_exit.go:204] [ 58742: 58752] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.165627 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:41.165905 465088 task_exit.go:204] [ 58742: 58742] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:41 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x84, 0x0) D0312 10:47:41.175881 465088 task_exit.go:204] [ 58743: 58743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.176133 465088 task_exit.go:204] [ 58743: 58743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.176685 465088 task_signals.go:204] [ 58743: 58749] Signal 58743, PID: 58749, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.176841 465088 task_exit.go:204] [ 58743: 58749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.179840 465088 task_exit.go:204] [ 58743: 58749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.179914 465088 task_exit.go:204] [ 58743: 58749] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.180014 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:41.181035 465088 task_exit.go:204] [ 58743: 58743] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:41 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r0, &(0x7f0000000000)=""/57, 0x39, 0x40000001, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @empty, 0x3}, 0x1c) r1 = accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x0) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x4e21, 0x5, @empty, 0xfff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000140)="d502896cf0c0694b883f343a14149babea2aaab0feab4e5d1aac13816b2a28595938d39d162756148a63e1f25077750a6e55d5c93ddc3a20da5ef4921dd2fd99dd1f070e3d77d64d4f623f45c7f53ee3c473a1f51abf6fae7a4b7d615a83751774deafb6bf22dafe65d6f7b6da488da2d21408ae9c1eac0427717862d5a25c6518ac14bc27cc978f12c67fe1f038e5c88fe760a8263fe589695dbbcede8896d87533f9f2229d41bee4274ed5d57dd9c6bcbccec39c31a1b2ab", 0xb9}, {&(0x7f0000000200)="e923fe6c0451fc84eed77a3a1a2a29c3fa81ab8842f24959c8047095d743e7e8eaabe5c1d03d8c3998d9c86bba651c6a55eade58c504a754b4b02cec04f621eb8c7b59a8b2d82ae8853aee637d42f035fda54facd1aafe7a0f", 0x59}, {&(0x7f0000000280)="efa993908a3afb2d0a70764d0b59bda99409d7fe62f3b3c1ca5789600d9e8d4c5dd4215fa4033b490ad9b9119138fdb5bbe588ac7f0fa39aa629c7961e956428daf9ea31288fc314c1516d89cd715b4c38b02316", 0x54}], 0x3}, 0x90) (async) r2 = socket(0x2, 0x3, 0x400) r3 = dup3(r1, r2, 0x0) (async) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000380)=""/150, 0x96}], 0x1) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x50000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000004c0)={0x1}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000540)=""/165, &(0x7f0000000600)=0xa5) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) recvfrom$inet6(r2, &(0x7f00000006c0)=""/93, 0x5d, 0x83, &(0x7f0000000740)={0xa, 0x4e22, 0x1, @private2, 0x4}, 0x1c) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000780)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000840)={'syztnl2\x00', &(0x7f00000007c0)={'gretap0\x00', r5, 0x20, 0x80, 0x1, 0xfff, {{0x10, 0x4, 0x0, 0x0, 0x40, 0x67, 0x0, 0xfe, 0x29, 0x0, @private=0xa010102, @local, {[@rr={0x7, 0x1b, 0xcd, [@private=0xa010100, @private=0xa010101, @broadcast, @multicast1, @rand_addr=0x64010102, @remote]}, @timestamp_prespec={0x44, 0x4, 0xbc, 0x3, 0xb}, @timestamp={0x44, 0xc, 0x95, 0x0, 0x6, [0x0, 0x6]}, @end]}}}}}) (async) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='./binderfs/binder-control\x00', 0x800, 0x0) lseek(r7, 0xffffffffffff0001, 0x1) (async) r8 = accept4(r3, &(0x7f00000008c0)=@phonet, &(0x7f0000000940)=0x80, 0x0) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000009c0)=0x1c) (async) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000a00)={'hsr0\x00', {0x2, 0x4e20, @multicast1}}) (async) r10 = openat$cgroup_devices(r4, &(0x7f0000000a40)='devices.deny\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r10, 0xc020660b, &(0x7f0000000a80)={0x7, 0x3, 0x4, 0x6, 0x6, [{0xffffffff, 0x89, 0xfff, '\x00', 0x1002}, {0x1, 0x8, 0x0, '\x00', 0x2}, {0x3, 0x6, 0x92, '\x00', 0x280}, {0x9, 0x4, 0x3, '\x00', 0x209}, {0x420, 0x5, 0x1}, {0xfae, 0x9, 0x7}]}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000c00)={'vxcan1\x00'}) (async) accept4$inet6(0xffffffffffffffff, &(0x7f0000000c40)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000c80)=0x1c, 0x80800) (async) pipe(&(0x7f0000000cc0)) (async) r11 = accept4$inet(r2, &(0x7f0000000d00)={0x2, 0x0, @dev}, &(0x7f0000000d40)=0x10, 0x80800) ioctl$AUTOFS_IOC_READY(r11, 0x9360, 0x1) (async) r12 = signalfd4(r1, &(0x7f0000000d80)={[0x5]}, 0x8, 0x800) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000dc0)={@private2, r6}, 0x14) D0312 10:47:41.187222 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.188060 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.196840 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.197125 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.198136 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.198762 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.201429 465088 usertrap_amd64.go:212] [ 58745: 58745] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:41.201547 465088 usertrap_amd64.go:122] [ 58745: 58745] Allocate a new trap: 0xc007ec81b0 42 D0312 10:47:41.201660 465088 usertrap_amd64.go:225] [ 58745: 58745] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:41.242468 465088 usertrap_amd64.go:212] [ 58756: 58756] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:41.242674 465088 usertrap_amd64.go:122] [ 58756: 58756] Allocate a new trap: 0xc00d9fc270 40 D0312 10:47:41.247283 465088 usertrap_amd64.go:225] [ 58756: 58756] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:41.252791 465088 usertrap_amd64.go:212] [ 58756: 58756] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:41.252906 465088 usertrap_amd64.go:122] [ 58756: 58756] Allocate a new trap: 0xc00d9fc270 41 D0312 10:47:41.253014 465088 usertrap_amd64.go:225] [ 58756: 58756] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:41.256842 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.257392 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.266320 465088 usertrap_amd64.go:212] [ 58757: 58757] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:41.266553 465088 usertrap_amd64.go:122] [ 58757: 58757] Allocate a new trap: 0xc00d020120 40 D0312 10:47:41.267307 465088 usertrap_amd64.go:225] [ 58757: 58757] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:41.271793 465088 usertrap_amd64.go:212] [ 58755: 58755] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:41.271935 465088 usertrap_amd64.go:122] [ 58755: 58755] Allocate a new trap: 0xc00eb10360 40 D0312 10:47:41.272921 465088 usertrap_amd64.go:225] [ 58755: 58755] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:41.273954 465088 usertrap_amd64.go:212] [ 58756: 58756] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:41.274116 465088 usertrap_amd64.go:122] [ 58756: 58756] Allocate a new trap: 0xc00d9fc270 42 D0312 10:47:41.274245 465088 usertrap_amd64.go:225] [ 58756: 58756] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:41.274556 465088 usertrap_amd64.go:212] [ 58755: 58755] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:41.274899 465088 usertrap_amd64.go:122] [ 58755: 58755] Allocate a new trap: 0xc00eb10360 41 D0312 10:47:41.275094 465088 usertrap_amd64.go:225] [ 58755: 58755] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:41.276870 465088 usertrap_amd64.go:212] [ 58757: 58757] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:41.277035 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.277013 465088 usertrap_amd64.go:122] [ 58757: 58757] Allocate a new trap: 0xc00d020120 41 D0312 10:47:41.278271 465088 usertrap_amd64.go:225] [ 58757: 58757] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:41.279514 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.293159 465088 usertrap_amd64.go:212] [ 58756: 58756] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:41.293263 465088 usertrap_amd64.go:122] [ 58756: 58756] Allocate a new trap: 0xc00d9fc270 43 D0312 10:47:41.293347 465088 usertrap_amd64.go:225] [ 58756: 58756] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:41.294894 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.298464 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.307381 465088 task_exit.go:204] [ 58756: 58756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.307672 465088 task_exit.go:204] [ 58756: 58756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.307837 465088 task_signals.go:204] [ 58756: 58758] Signal 58756, PID: 58758, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.307999 465088 task_exit.go:204] [ 58756: 58758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.311453 465088 task_exit.go:204] [ 58756: 58758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.311550 465088 task_exit.go:204] [ 58756: 58758] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.311685 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:41.312535 465088 task_exit.go:204] [ 58756: 58756] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.314723 465088 usertrap_amd64.go:212] [ 58755: 58755] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:41.314795 465088 usertrap_amd64.go:122] [ 58755: 58755] Allocate a new trap: 0xc00eb10360 42 D0312 10:47:41.314917 465088 usertrap_amd64.go:225] [ 58755: 58755] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 10:47:41 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x84, 0x0) D0312 10:47:41.322242 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.324377 465088 usertrap_amd64.go:212] [ 58757: 58757] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:41.324454 465088 usertrap_amd64.go:122] [ 58757: 58757] Allocate a new trap: 0xc00d020120 42 D0312 10:47:41.324504 465088 usertrap_amd64.go:225] [ 58757: 58757] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:41.326829 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.363923 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.365234 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.370379 465088 usertrap_amd64.go:212] [ 58761: 58761] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:41.370527 465088 usertrap_amd64.go:122] [ 58761: 58761] Allocate a new trap: 0xc007f0c2d0 40 D0312 10:47:41.371427 465088 usertrap_amd64.go:225] [ 58761: 58761] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:41.372731 465088 usertrap_amd64.go:212] [ 58755: 58755] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:41.372798 465088 usertrap_amd64.go:122] [ 58755: 58755] Allocate a new trap: 0xc00eb10360 43 D0312 10:47:41.372873 465088 usertrap_amd64.go:225] [ 58755: 58755] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:41.374322 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.375492 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.376052 465088 task_exit.go:204] [ 58755: 58755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.376241 465088 task_exit.go:204] [ 58755: 58755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.378376 465088 task_signals.go:204] [ 58755: 58759] Signal 58755, PID: 58759, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.378595 465088 task_exit.go:204] [ 58755: 58759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.381137 465088 task_exit.go:204] [ 58755: 58759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.381195 465088 task_exit.go:204] [ 58755: 58759] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.381321 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:41.383201 465088 usertrap_amd64.go:212] [ 58761: 58761] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:41.383372 465088 usertrap_amd64.go:122] [ 58761: 58761] Allocate a new trap: 0xc007f0c2d0 41 D0312 10:47:41.383512 465088 usertrap_amd64.go:225] [ 58761: 58761] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:41.383708 465088 task_exit.go:204] [ 58755: 58755] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.387116 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.388698 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.394175 465088 usertrap_amd64.go:212] [ 58757: 58757] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:41.394253 465088 usertrap_amd64.go:122] [ 58757: 58757] Allocate a new trap: 0xc00d020120 43 D0312 10:47:41.394336 465088 usertrap_amd64.go:225] [ 58757: 58757] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:41.429318 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.429640 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.430476 465088 usertrap_amd64.go:212] [ 58757: 58757] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:41.430523 465088 usertrap_amd64.go:122] [ 58757: 58757] Allocate a new trap: 0xc00d020120 44 D0312 10:47:41.430591 465088 usertrap_amd64.go:225] [ 58757: 58757] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:41.440602 465088 usertrap_amd64.go:212] [ 58761: 58761] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:41.440694 465088 usertrap_amd64.go:122] [ 58761: 58761] Allocate a new trap: 0xc007f0c2d0 42 D0312 10:47:41.440793 465088 usertrap_amd64.go:225] [ 58761: 58761] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:41.453278 465088 task_exit.go:204] [ 58757: 58757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.453430 465088 task_signals.go:204] [ 58757: 58760] Signal 58757, PID: 58760, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.453435 465088 task_signals.go:204] [ 58757: 58762] Signal 58757, PID: 58762, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.453534 465088 task_exit.go:204] [ 58757: 58760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.453756 465088 task_exit.go:204] [ 58757: 58760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.453826 465088 task_exit.go:204] [ 58757: 58760] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.454206 465088 task_signals.go:204] [ 58757: 58764] Signal 58757, PID: 58764, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.454332 465088 task_signals.go:204] [ 58757: 58763] Signal 58757, PID: 58763, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.454398 465088 task_exit.go:204] [ 58757: 58757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.454460 465088 task_exit.go:204] [ 58757: 58763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.454765 465088 task_exit.go:204] [ 58757: 58762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.456068 465088 task_exit.go:204] [ 58757: 58762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.456119 465088 task_exit.go:204] [ 58757: 58762] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.456219 465088 task_exit.go:204] [ 58757: 58764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.456350 465088 task_exit.go:204] [ 58757: 58763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.456493 465088 task_exit.go:204] [ 58757: 58763] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.459519 465088 task_exit.go:204] [ 58757: 58764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.459573 465088 task_exit.go:204] [ 58757: 58764] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.459704 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:41.462377 465088 task_exit.go:204] [ 58757: 58757] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.500154 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.502776 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.522851 465088 usertrap_amd64.go:212] [ 58761: 58761] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:41.522980 465088 usertrap_amd64.go:122] [ 58761: 58761] Allocate a new trap: 0xc007f0c2d0 43 D0312 10:47:41.523065 465088 usertrap_amd64.go:225] [ 58761: 58761] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:41.531663 465088 task_exit.go:204] [ 58761: 58761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.531798 465088 task_signals.go:204] [ 58761: 58766] Signal 58761, PID: 58766, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.531861 465088 task_exit.go:204] [ 58761: 58761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.533805 465088 task_exit.go:204] [ 58761: 58766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.533976 465088 task_exit.go:204] [ 58761: 58766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.534008 465088 task_exit.go:204] [ 58761: 58766] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.535522 465088 task_signals.go:204] [ 58761: 58765] Signal 58761, PID: 58765, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.535592 465088 task_exit.go:204] [ 58761: 58765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.538227 465088 task_exit.go:204] [ 58761: 58765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.538301 465088 task_exit.go:204] [ 58761: 58765] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.538371 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:41.539998 465088 task_exit.go:204] [ 58761: 58761] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.551433 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.552122 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.848165 465088 usertrap_amd64.go:212] [ 58745: 58745] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:41.848304 465088 usertrap_amd64.go:122] [ 58745: 58745] Allocate a new trap: 0xc007ec81b0 43 D0312 10:47:41.848389 465088 usertrap_amd64.go:225] [ 58745: 58745] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:41.857831 465088 task_exit.go:204] [ 58745: 58745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.858033 465088 task_exit.go:204] [ 58745: 58745] Transitioning from exit state TaskExitInitiated to TaskExitZombie 10:47:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r4, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:41.861645 465088 task_signals.go:204] [ 58745: 58746] Signal 58745, PID: 58746, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.861732 465088 task_exit.go:204] [ 58745: 58746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.861955 465088 task_exit.go:204] [ 58745: 58746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.861998 465088 task_exit.go:204] [ 58745: 58746] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.862262 465088 task_signals.go:204] [ 58745: 58754] Signal 58745, PID: 58754, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:41.862334 465088 task_exit.go:204] [ 58745: 58754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:41.864398 465088 task_exit.go:204] [ 58745: 58754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:41.864447 465088 task_exit.go:204] [ 58745: 58754] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:41.864563 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:41.866822 465088 task_exit.go:204] [ 58745: 58745] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:41 executing program 1: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async, rerun: 64) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async, rerun: 64) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async, rerun: 32) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async, rerun: 32) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 10:47:41 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r0, &(0x7f0000000000)=""/57, 0x39, 0x40000001, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @empty, 0x3}, 0x1c) (async, rerun: 32) r1 = accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x0) (rerun: 32) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000100)={0xa, 0x4e21, 0x5, @empty, 0xfff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000140)="d502896cf0c0694b883f343a14149babea2aaab0feab4e5d1aac13816b2a28595938d39d162756148a63e1f25077750a6e55d5c93ddc3a20da5ef4921dd2fd99dd1f070e3d77d64d4f623f45c7f53ee3c473a1f51abf6fae7a4b7d615a83751774deafb6bf22dafe65d6f7b6da488da2d21408ae9c1eac0427717862d5a25c6518ac14bc27cc978f12c67fe1f038e5c88fe760a8263fe589695dbbcede8896d87533f9f2229d41bee4274ed5d57dd9c6bcbccec39c31a1b2ab", 0xb9}, {&(0x7f0000000200)="e923fe6c0451fc84eed77a3a1a2a29c3fa81ab8842f24959c8047095d743e7e8eaabe5c1d03d8c3998d9c86bba651c6a55eade58c504a754b4b02cec04f621eb8c7b59a8b2d82ae8853aee637d42f035fda54facd1aafe7a0f", 0x59}, {&(0x7f0000000280)="efa993908a3afb2d0a70764d0b59bda99409d7fe62f3b3c1ca5789600d9e8d4c5dd4215fa4033b490ad9b9119138fdb5bbe588ac7f0fa39aa629c7961e956428daf9ea31288fc314c1516d89cd715b4c38b02316", 0x54}], 0x3}, 0x90) (async) r2 = socket(0x2, 0x3, 0x400) r3 = dup3(r1, r2, 0x0) (async) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000380)=""/150, 0x96}], 0x1) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x50000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000004c0)={0x1}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) (async, rerun: 32) getsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000540)=""/165, &(0x7f0000000600)=0xa5) (rerun: 32) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) recvfrom$inet6(r2, &(0x7f00000006c0)=""/93, 0x5d, 0x83, &(0x7f0000000740)={0xa, 0x4e22, 0x1, @private2, 0x4}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000780)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000840)={'syztnl2\x00', &(0x7f00000007c0)={'gretap0\x00', r5, 0x20, 0x80, 0x1, 0xfff, {{0x10, 0x4, 0x0, 0x0, 0x40, 0x67, 0x0, 0xfe, 0x29, 0x0, @private=0xa010102, @local, {[@rr={0x7, 0x1b, 0xcd, [@private=0xa010100, @private=0xa010101, @broadcast, @multicast1, @rand_addr=0x64010102, @remote]}, @timestamp_prespec={0x44, 0x4, 0xbc, 0x3, 0xb}, @timestamp={0x44, 0xc, 0x95, 0x0, 0x6, [0x0, 0x6]}, @end]}}}}}) (async) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='./binderfs/binder-control\x00', 0x800, 0x0) lseek(r7, 0xffffffffffff0001, 0x1) (async) r8 = accept4(r3, &(0x7f00000008c0)=@phonet, &(0x7f0000000940)=0x80, 0x0) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000009c0)=0x1c) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000a00)={'hsr0\x00', {0x2, 0x4e20, @multicast1}}) (async, rerun: 64) r10 = openat$cgroup_devices(r4, &(0x7f0000000a40)='devices.deny\x00', 0x2, 0x0) (rerun: 64) ioctl$FS_IOC_FIEMAP(r10, 0xc020660b, &(0x7f0000000a80)={0x7, 0x3, 0x4, 0x6, 0x6, [{0xffffffff, 0x89, 0xfff, '\x00', 0x1002}, {0x1, 0x8, 0x0, '\x00', 0x2}, {0x3, 0x6, 0x92, '\x00', 0x280}, {0x9, 0x4, 0x3, '\x00', 0x209}, {0x420, 0x5, 0x1}, {0xfae, 0x9, 0x7}]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000c00)={'vxcan1\x00'}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000c40)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000c80)=0x1c, 0x80800) (async) pipe(&(0x7f0000000cc0)) (async) r11 = accept4$inet(r2, &(0x7f0000000d00)={0x2, 0x0, @dev}, &(0x7f0000000d40)=0x10, 0x80800) ioctl$AUTOFS_IOC_READY(r11, 0x9360, 0x1) r12 = signalfd4(r1, &(0x7f0000000d80)={[0x5]}, 0x8, 0x800) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000dc0)={@private2, r6}, 0x14) 10:47:41 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x84, 0x0) D0312 10:47:41.901816 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:41.904090 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.915773 465088 usertrap_amd64.go:212] [ 58767: 58767] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:41.915889 465088 usertrap_amd64.go:122] [ 58767: 58767] Allocate a new trap: 0xc0072c8870 40 D0312 10:47:41.916449 465088 usertrap_amd64.go:225] [ 58767: 58767] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:41.918522 465088 usertrap_amd64.go:212] [ 58767: 58767] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:41.918656 465088 usertrap_amd64.go:122] [ 58767: 58767] Allocate a new trap: 0xc0072c8870 41 D0312 10:47:41.918826 465088 usertrap_amd64.go:225] [ 58767: 58767] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:41.920746 465088 usertrap_amd64.go:212] [ 58769: 58769] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:41.920845 465088 usertrap_amd64.go:122] [ 58769: 58769] Allocate a new trap: 0xc00d9fc390 40 D0312 10:47:41.921368 465088 usertrap_amd64.go:225] [ 58769: 58769] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:41.926822 465088 usertrap_amd64.go:212] [ 58769: 58769] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:41.926940 465088 usertrap_amd64.go:122] [ 58769: 58769] Allocate a new trap: 0xc00d9fc390 41 D0312 10:47:41.927006 465088 usertrap_amd64.go:225] [ 58769: 58769] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:41.932212 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.933298 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.941660 465088 usertrap_amd64.go:212] [ 58768: 58768] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:41.941999 465088 usertrap_amd64.go:122] [ 58768: 58768] Allocate a new trap: 0xc00eb107b0 40 D0312 10:47:41.943184 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.944664 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.948691 465088 usertrap_amd64.go:212] [ 58767: 58767] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:41.948769 465088 usertrap_amd64.go:122] [ 58767: 58767] Allocate a new trap: 0xc0072c8870 42 D0312 10:47:41.948851 465088 usertrap_amd64.go:225] [ 58767: 58767] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:41.952629 465088 usertrap_amd64.go:225] [ 58768: 58768] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:41.966972 465088 usertrap_amd64.go:212] [ 58770: 58770] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:41.967105 465088 usertrap_amd64.go:122] [ 58770: 58770] Allocate a new trap: 0xc006f3e330 39 D0312 10:47:41.973241 465088 usertrap_amd64.go:225] [ 58770: 58770] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:41.974517 465088 usertrap_amd64.go:212] [ 58768: 58768] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:41.974583 465088 usertrap_amd64.go:122] [ 58768: 58768] Allocate a new trap: 0xc00eb107b0 41 D0312 10:47:41.974655 465088 usertrap_amd64.go:225] [ 58768: 58768] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:41.981047 465088 usertrap_amd64.go:212] [ 58769: 58769] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:41.981132 465088 usertrap_amd64.go:122] [ 58769: 58769] Allocate a new trap: 0xc00d9fc390 42 D0312 10:47:41.981200 465088 usertrap_amd64.go:225] [ 58769: 58769] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:41.981886 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.983170 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:41.982081 465088 usertrap_amd64.go:212] [ 58770: 58770] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:41.985226 465088 usertrap_amd64.go:122] [ 58770: 58770] Allocate a new trap: 0xc006f3e330 40 D0312 10:47:41.985311 465088 usertrap_amd64.go:225] [ 58770: 58770] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:41.987102 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:41.987692 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.011714 465088 usertrap_amd64.go:212] [ 58770: 58770] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:42.011864 465088 usertrap_amd64.go:122] [ 58770: 58770] Allocate a new trap: 0xc006f3e330 41 D0312 10:47:42.011937 465088 usertrap_amd64.go:225] [ 58770: 58770] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:42.026104 465088 usertrap_amd64.go:212] [ 58768: 58768] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:42.026209 465088 usertrap_amd64.go:122] [ 58768: 58768] Allocate a new trap: 0xc00eb107b0 42 D0312 10:47:42.026268 465088 usertrap_amd64.go:225] [ 58768: 58768] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:42.047324 465088 usertrap_amd64.go:212] [ 58767: 58767] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:42.047445 465088 usertrap_amd64.go:122] [ 58767: 58767] Allocate a new trap: 0xc0072c8870 43 D0312 10:47:42.047572 465088 usertrap_amd64.go:225] [ 58767: 58767] Apply the binary patch addr 55c5b5e1be1a trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:42.058234 465088 usertrap_amd64.go:212] [ 58767: 58767] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:42.058321 465088 usertrap_amd64.go:122] [ 58767: 58767] Allocate a new trap: 0xc0072c8870 44 D0312 10:47:42.058448 465088 usertrap_amd64.go:225] [ 58767: 58767] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:42.062746 465088 task_exit.go:204] [ 58767: 58767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.062982 465088 task_signals.go:204] [ 58767: 58779] Signal 58767, PID: 58779, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.063067 465088 task_signals.go:204] [ 58767: 58777] Signal 58767, PID: 58777, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.063111 465088 task_exit.go:204] [ 58767: 58779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.063201 465088 task_exit.go:204] [ 58767: 58777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.063573 465088 task_signals.go:204] [ 58767: 58772] Signal 58767, PID: 58772, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.063574 465088 task_exit.go:204] [ 58767: 58767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.063763 465088 task_signals.go:204] [ 58767: 58776] Signal 58767, PID: 58776, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.063862 465088 task_signals.go:204] [ 58767: 58774] Signal 58767, PID: 58774, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.064004 465088 task_signals.go:204] [ 58767: 58771] Signal 58767, PID: 58771, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.064124 465088 task_exit.go:204] [ 58767: 58774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.064585 465088 task_exit.go:204] [ 58767: 58774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.064645 465088 task_exit.go:204] [ 58767: 58774] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.064761 465088 task_exit.go:204] [ 58767: 58776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.064937 465088 task_exit.go:204] [ 58767: 58776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.065016 465088 task_exit.go:204] [ 58767: 58776] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.065147 465088 task_exit.go:204] [ 58767: 58779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.065223 465088 task_exit.go:204] [ 58767: 58779] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.065349 465088 task_exit.go:204] [ 58767: 58772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.065629 465088 task_exit.go:204] [ 58767: 58772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.065691 465088 task_exit.go:204] [ 58767: 58772] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.065874 465088 task_exit.go:204] [ 58767: 58777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.065937 465088 task_exit.go:204] [ 58767: 58777] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.066068 465088 task_exit.go:204] [ 58767: 58771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.069329 465088 task_exit.go:204] [ 58767: 58771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.069404 465088 task_exit.go:204] [ 58767: 58771] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.069478 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:42.071284 465088 task_exit.go:204] [ 58767: 58767] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:42 executing program 1: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) (async) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) D0312 10:47:42.089897 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.091553 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.094119 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.094989 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.096455 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.096767 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.101466 465088 usertrap_amd64.go:212] [ 58768: 58768] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:42.101520 465088 usertrap_amd64.go:122] [ 58768: 58768] Allocate a new trap: 0xc00eb107b0 43 D0312 10:47:42.101585 465088 usertrap_amd64.go:225] [ 58768: 58768] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:42.110468 465088 task_exit.go:204] [ 58768: 58768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.110741 465088 task_exit.go:204] [ 58768: 58768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.111027 465088 task_signals.go:204] [ 58768: 58778] Signal 58768, PID: 58778, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.111129 465088 task_exit.go:204] [ 58768: 58778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.111288 465088 task_exit.go:204] [ 58768: 58778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.111345 465088 task_exit.go:204] [ 58768: 58778] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.111567 465088 task_signals.go:204] [ 58768: 58782] Signal 58768, PID: 58782, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.111630 465088 task_exit.go:204] [ 58768: 58782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.114510 465088 task_exit.go:204] [ 58768: 58782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.114561 465088 task_exit.go:204] [ 58768: 58782] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.114672 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:42.120193 465088 task_exit.go:204] [ 58768: 58768] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@nl, &(0x7f00000000c0)=0x80, 0x80800) dup3(r0, r1, 0x0) D0312 10:47:42.126161 465088 usertrap_amd64.go:212] [ 58769: 58769] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:42.126244 465088 usertrap_amd64.go:122] [ 58769: 58769] Allocate a new trap: 0xc00d9fc390 43 D0312 10:47:42.126328 465088 usertrap_amd64.go:225] [ 58769: 58769] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:42.129738 465088 task_exit.go:204] [ 58769: 58769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.129995 465088 task_signals.go:204] [ 58769: 58781] Signal 58769, PID: 58781, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.130039 465088 task_exit.go:204] [ 58769: 58769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.130149 465088 task_signals.go:204] [ 58769: 58773] Signal 58769, PID: 58773, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.130214 465088 task_signals.go:204] [ 58769: 58780] Signal 58769, PID: 58780, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.130259 465088 task_exit.go:204] [ 58769: 58773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.130457 465088 task_exit.go:204] [ 58769: 58773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.130497 465088 task_exit.go:204] [ 58769: 58773] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.130595 465088 task_exit.go:204] [ 58769: 58781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.130727 465088 task_exit.go:204] [ 58769: 58781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.131126 465088 task_exit.go:204] [ 58769: 58781] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.131218 465088 task_exit.go:204] [ 58769: 58780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.133972 465088 task_exit.go:204] [ 58769: 58780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.134059 465088 task_exit.go:204] [ 58769: 58780] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.134178 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:42.134761 465088 task_exit.go:204] [ 58769: 58769] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.135690 465088 usertrap_amd64.go:212] [ 58783: 58783] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:42.135773 465088 usertrap_amd64.go:122] [ 58783: 58783] Allocate a new trap: 0xc0032fa390 40 D0312 10:47:42.136147 465088 usertrap_amd64.go:225] [ 58783: 58783] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:42.146159 465088 usertrap_amd64.go:212] [ 58783: 58783] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:42.146283 465088 usertrap_amd64.go:122] [ 58783: 58783] Allocate a new trap: 0xc0032fa390 41 D0312 10:47:42.146434 465088 usertrap_amd64.go:225] [ 58783: 58783] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) 10:47:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000740)=[{{&(0x7f00000001c0), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000000280)=""/237, 0xed}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/115, 0x73}, {&(0x7f00000004c0)=""/22, 0x16}, {&(0x7f0000000500)=""/160, 0xa0}, {&(0x7f00000005c0)=""/225, 0xe1}], 0x8}}], 0x1, 0x40010303, &(0x7f00000007c0)={r1, r2+60000000}) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r3, r0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x0) r5 = accept(r0, 0x0, 0x0) getsockopt$SO_COOKIE(r5, 0x1, 0x19, 0x0, &(0x7f0000000140)) socket$unix(0x1, 0x5, 0x0) D0312 10:47:42.157148 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.158058 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.158756 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.159159 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.166951 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.168659 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.177762 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.178232 465088 usertrap_amd64.go:212] [ 58770: 58770] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:42.178311 465088 usertrap_amd64.go:122] [ 58770: 58770] Allocate a new trap: 0xc006f3e330 42 D0312 10:47:42.178271 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.178392 465088 usertrap_amd64.go:225] [ 58770: 58770] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:42.186146 465088 usertrap_amd64.go:212] [ 58783: 58783] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:42.186246 465088 usertrap_amd64.go:122] [ 58783: 58783] Allocate a new trap: 0xc0032fa390 42 D0312 10:47:42.186823 465088 usertrap_amd64.go:225] [ 58783: 58783] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:42.206054 465088 usertrap_amd64.go:212] [ 58785: 58785] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:42.206359 465088 usertrap_amd64.go:122] [ 58785: 58785] Allocate a new trap: 0xc00eb107e0 40 D0312 10:47:42.212477 465088 usertrap_amd64.go:225] [ 58785: 58785] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:42.218972 465088 usertrap_amd64.go:212] [ 58785: 58785] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:42.219111 465088 usertrap_amd64.go:122] [ 58785: 58785] Allocate a new trap: 0xc00eb107e0 41 D0312 10:47:42.219207 465088 usertrap_amd64.go:225] [ 58785: 58785] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:42.242436 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.242826 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.247214 465088 usertrap_amd64.go:212] [ 58787: 58787] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:42.247323 465088 usertrap_amd64.go:122] [ 58787: 58787] Allocate a new trap: 0xc007f8a210 40 D0312 10:47:42.248140 465088 usertrap_amd64.go:225] [ 58787: 58787] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:42.249731 465088 usertrap_amd64.go:212] [ 58787: 58787] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:42.249793 465088 usertrap_amd64.go:122] [ 58787: 58787] Allocate a new trap: 0xc007f8a210 41 D0312 10:47:42.249852 465088 usertrap_amd64.go:225] [ 58787: 58787] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:42.264044 465088 usertrap_amd64.go:212] [ 58785: 58785] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:42.264175 465088 usertrap_amd64.go:122] [ 58785: 58785] Allocate a new trap: 0xc00eb107e0 42 D0312 10:47:42.264252 465088 usertrap_amd64.go:225] [ 58785: 58785] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:42.271637 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.271994 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.290118 465088 usertrap_amd64.go:212] [ 58785: 58785] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:42.290224 465088 usertrap_amd64.go:122] [ 58785: 58785] Allocate a new trap: 0xc00eb107e0 43 D0312 10:47:42.290326 465088 usertrap_amd64.go:225] [ 58785: 58785] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:42.296736 465088 task_exit.go:204] [ 58785: 58785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.297055 465088 task_signals.go:204] [ 58785: 58789] Signal 58785, PID: 58789, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.297226 465088 task_exit.go:204] [ 58785: 58785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.297540 465088 task_exit.go:204] [ 58785: 58789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.300405 465088 task_exit.go:204] [ 58785: 58789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.300483 465088 task_exit.go:204] [ 58785: 58789] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.300583 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:42.302897 465088 task_exit.go:204] [ 58785: 58785] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@nl, &(0x7f00000000c0)=0x80, 0x80800) dup3(r0, r1, 0x0) D0312 10:47:42.319145 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.320091 465088 usertrap_amd64.go:212] [ 58787: 58787] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:42.320227 465088 usertrap_amd64.go:122] [ 58787: 58787] Allocate a new trap: 0xc007f8a210 42 D0312 10:47:42.320293 465088 usertrap_amd64.go:225] [ 58787: 58787] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:42.320748 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.349016 465088 usertrap_amd64.go:212] [ 58783: 58783] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:42.349129 465088 usertrap_amd64.go:122] [ 58783: 58783] Allocate a new trap: 0xc0032fa390 43 D0312 10:47:42.349195 465088 usertrap_amd64.go:225] [ 58783: 58783] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:42.352506 465088 task_exit.go:204] [ 58783: 58783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.352891 465088 task_exit.go:204] [ 58783: 58783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.353908 465088 task_signals.go:204] [ 58783: 58790] Signal 58783, PID: 58790, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.354038 465088 task_exit.go:204] [ 58783: 58790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.354260 465088 task_exit.go:204] [ 58783: 58790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.354294 465088 task_exit.go:204] [ 58783: 58790] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.354447 465088 task_signals.go:204] [ 58783: 58788] Signal 58783, PID: 58788, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.354502 465088 task_exit.go:204] [ 58783: 58788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.354672 465088 task_exit.go:204] [ 58783: 58788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.354700 465088 task_exit.go:204] [ 58783: 58788] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.354844 465088 task_signals.go:204] [ 58783: 58792] Signal 58783, PID: 58792, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.354907 465088 task_exit.go:204] [ 58783: 58792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.355062 465088 task_exit.go:204] [ 58783: 58792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.355087 465088 task_exit.go:204] [ 58783: 58792] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.356397 465088 task_signals.go:204] [ 58783: 58786] Signal 58783, PID: 58786, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.356504 465088 task_exit.go:204] [ 58783: 58786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.358987 465088 task_exit.go:204] [ 58783: 58786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.359053 465088 task_exit.go:204] [ 58783: 58786] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.359142 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:42.361638 465088 task_exit.go:204] [ 58783: 58783] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.385544 465088 usertrap_amd64.go:212] [ 58787: 58787] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:42.385663 465088 usertrap_amd64.go:122] [ 58787: 58787] Allocate a new trap: 0xc007f8a210 43 D0312 10:47:42.385752 465088 usertrap_amd64.go:225] [ 58787: 58787] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:42.386680 465088 usertrap_amd64.go:212] [ 58793: 58793] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:42.386847 465088 usertrap_amd64.go:122] [ 58793: 58793] Allocate a new trap: 0xc007ec8930 40 D0312 10:47:42.387527 465088 usertrap_amd64.go:225] [ 58793: 58793] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:42.388443 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.388986 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.391484 465088 task_exit.go:204] [ 58787: 58787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.391491 465088 usertrap_amd64.go:212] [ 58793: 58793] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:42.391664 465088 usertrap_amd64.go:122] [ 58793: 58793] Allocate a new trap: 0xc007ec8930 41 D0312 10:47:42.391692 465088 task_signals.go:204] [ 58787: 58791] Signal 58787, PID: 58791, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.391811 465088 task_exit.go:204] [ 58787: 58791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.391788 465088 usertrap_amd64.go:225] [ 58793: 58793] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:42.392119 465088 task_exit.go:204] [ 58787: 58791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.392244 465088 task_exit.go:204] [ 58787: 58791] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.403118 465088 task_exit.go:204] [ 58787: 58787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.405371 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:42.406369 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.406705 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.409257 465088 task_exit.go:204] [ 58787: 58787] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.416744 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.417265 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.419159 465088 usertrap_amd64.go:212] [ 58793: 58793] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:42.419246 465088 usertrap_amd64.go:122] [ 58793: 58793] Allocate a new trap: 0xc007ec8930 42 D0312 10:47:42.419348 465088 usertrap_amd64.go:225] [ 58793: 58793] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:42.442348 465088 usertrap_amd64.go:212] [ 58793: 58793] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:42.442475 465088 usertrap_amd64.go:122] [ 58793: 58793] Allocate a new trap: 0xc007ec8930 43 D0312 10:47:42.442547 465088 usertrap_amd64.go:225] [ 58793: 58793] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:42.444405 465088 task_exit.go:204] [ 58793: 58793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.444554 465088 task_exit.go:204] [ 58793: 58793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.444535 465088 task_signals.go:204] [ 58793: 58794] Signal 58793, PID: 58794, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.444641 465088 task_exit.go:204] [ 58793: 58794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.447670 465088 task_exit.go:204] [ 58793: 58794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.447723 465088 task_exit.go:204] [ 58793: 58794] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.447817 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:42.448199 465088 task_exit.go:204] [ 58793: 58793] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.460103 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.460534 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.845219 465088 usertrap_amd64.go:212] [ 58770: 58770] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:42.845334 465088 usertrap_amd64.go:122] [ 58770: 58770] Allocate a new trap: 0xc006f3e330 43 D0312 10:47:42.845468 465088 usertrap_amd64.go:225] [ 58770: 58770] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:42.849096 465088 task_exit.go:204] [ 58770: 58770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.849281 465088 task_exit.go:204] [ 58770: 58770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.849636 465088 task_signals.go:204] [ 58770: 58784] Signal 58770, PID: 58784, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.849734 465088 task_exit.go:204] [ 58770: 58784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.849886 465088 task_exit.go:204] [ 58770: 58784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.849922 465088 task_exit.go:204] [ 58770: 58784] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.850027 465088 task_signals.go:204] [ 58770: 58775] Signal 58770, PID: 58775, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.850111 465088 task_exit.go:204] [ 58770: 58775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.853565 465088 task_exit.go:204] [ 58770: 58775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.853649 465088 task_exit.go:204] [ 58770: 58775] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.853760 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:42.854021 465088 task_exit.go:204] [ 58770: 58770] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r4, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:42 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) faccessat2(r3, &(0x7f0000000000)='\x00', 0x3, 0x1100) connect$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$TFD_IOC_SET_TICKS(r1, 0x5452, &(0x7f0000002140)) D0312 10:47:42.863266 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.864149 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) r1 = accept4(r0, &(0x7f0000000000)=@nl, &(0x7f00000000c0)=0x80, 0x80800) dup3(r0, r1, 0x0) 10:47:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) (async) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000740)=[{{&(0x7f00000001c0), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000000280)=""/237, 0xed}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/115, 0x73}, {&(0x7f00000004c0)=""/22, 0x16}, {&(0x7f0000000500)=""/160, 0xa0}, {&(0x7f00000005c0)=""/225, 0xe1}], 0x8}}], 0x1, 0x40010303, &(0x7f00000007c0)={r1, r2+60000000}) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) listen(r3, 0x0) (async) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r3, r0) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x0) r5 = accept(r0, 0x0, 0x0) getsockopt$SO_COOKIE(r5, 0x1, 0x19, 0x0, &(0x7f0000000140)) (async) socket$unix(0x1, 0x5, 0x0) D0312 10:47:42.893019 465088 usertrap_amd64.go:212] [ 58796: 58796] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:42.893149 465088 usertrap_amd64.go:122] [ 58796: 58796] Allocate a new trap: 0xc007ec8960 40 D0312 10:47:42.893554 465088 usertrap_amd64.go:225] [ 58796: 58796] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:42.902630 465088 usertrap_amd64.go:212] [ 58796: 58796] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:42.902709 465088 usertrap_amd64.go:122] [ 58796: 58796] Allocate a new trap: 0xc007ec8960 41 D0312 10:47:42.902804 465088 usertrap_amd64.go:225] [ 58796: 58796] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:42.905497 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.906209 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.916648 465088 usertrap_amd64.go:212] [ 58796: 58796] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:42.917457 465088 usertrap_amd64.go:122] [ 58796: 58796] Allocate a new trap: 0xc007ec8960 42 D0312 10:47:42.917555 465088 usertrap_amd64.go:225] [ 58796: 58796] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:42.922653 465088 usertrap_amd64.go:212] [ 58795: 58795] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:42.922753 465088 usertrap_amd64.go:122] [ 58795: 58795] Allocate a new trap: 0xc00e7ba150 40 D0312 10:47:42.923102 465088 usertrap_amd64.go:225] [ 58795: 58795] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:42.930377 465088 usertrap_amd64.go:212] [ 58797: 58797] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:42.930500 465088 usertrap_amd64.go:122] [ 58797: 58797] Allocate a new trap: 0xc006f3e480 39 D0312 10:47:42.931170 465088 usertrap_amd64.go:212] [ 58798: 58798] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:42.931287 465088 usertrap_amd64.go:122] [ 58798: 58798] Allocate a new trap: 0xc0032fa630 40 D0312 10:47:42.931729 465088 usertrap_amd64.go:225] [ 58798: 58798] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:42.931835 465088 usertrap_amd64.go:225] [ 58797: 58797] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:42.934100 465088 usertrap_amd64.go:212] [ 58798: 58798] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:42.934179 465088 usertrap_amd64.go:122] [ 58798: 58798] Allocate a new trap: 0xc0032fa630 41 D0312 10:47:42.934292 465088 usertrap_amd64.go:225] [ 58798: 58798] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:42.934857 465088 usertrap_amd64.go:212] [ 58797: 58797] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:42.934950 465088 usertrap_amd64.go:122] [ 58797: 58797] Allocate a new trap: 0xc006f3e480 40 D0312 10:47:42.935060 465088 usertrap_amd64.go:225] [ 58797: 58797] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:42.937316 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.937710 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.938206 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.940529 465088 usertrap_amd64.go:212] [ 58795: 58795] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:42.940594 465088 usertrap_amd64.go:122] [ 58795: 58795] Allocate a new trap: 0xc00e7ba150 41 D0312 10:47:42.940707 465088 usertrap_amd64.go:225] [ 58795: 58795] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:42.942027 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.942815 465088 usertrap_amd64.go:212] [ 58796: 58796] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:42.942874 465088 usertrap_amd64.go:122] [ 58796: 58796] Allocate a new trap: 0xc007ec8960 43 D0312 10:47:42.942944 465088 usertrap_amd64.go:225] [ 58796: 58796] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:42.956857 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:42.959080 465088 task_exit.go:204] [ 58796: 58796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.959773 465088 task_exit.go:204] [ 58796: 58796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.959977 465088 task_signals.go:204] [ 58796: 58799] Signal 58796, PID: 58799, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.960095 465088 task_exit.go:204] [ 58796: 58799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.960323 465088 task_exit.go:204] [ 58796: 58799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.960414 465088 task_exit.go:204] [ 58796: 58799] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.960597 465088 task_signals.go:204] [ 58796: 58800] Signal 58796, PID: 58800, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:42.960702 465088 task_exit.go:204] [ 58796: 58800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:42.963963 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.964157 465088 task_exit.go:204] [ 58796: 58800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:42.964213 465088 task_exit.go:204] [ 58796: 58800] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.964284 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:42.964636 465088 task_exit.go:204] [ 58796: 58796] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:42.967248 465088 usertrap_amd64.go:212] [ 58797: 58797] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:42.967407 465088 usertrap_amd64.go:122] [ 58797: 58797] Allocate a new trap: 0xc006f3e480 41 D0312 10:47:42.967584 465088 usertrap_amd64.go:225] [ 58797: 58797] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) 10:47:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:42.974155 465088 usertrap_amd64.go:212] [ 58798: 58798] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:42.974207 465088 usertrap_amd64.go:122] [ 58798: 58798] Allocate a new trap: 0xc0032fa630 42 D0312 10:47:42.974258 465088 usertrap_amd64.go:225] [ 58798: 58798] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:42.985491 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:42.987198 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:42.997669 465088 usertrap_amd64.go:212] [ 58795: 58795] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:42.997762 465088 usertrap_amd64.go:122] [ 58795: 58795] Allocate a new trap: 0xc00e7ba150 42 D0312 10:47:42.997828 465088 usertrap_amd64.go:225] [ 58795: 58795] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:43.045198 465088 usertrap_amd64.go:212] [ 58798: 58798] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:43.045307 465088 usertrap_amd64.go:122] [ 58798: 58798] Allocate a new trap: 0xc0032fa630 43 D0312 10:47:43.045375 465088 usertrap_amd64.go:225] [ 58798: 58798] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:43.045195 465088 usertrap_amd64.go:212] [ 58795: 58795] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:43.045468 465088 usertrap_amd64.go:122] [ 58795: 58795] Allocate a new trap: 0xc00e7ba150 43 D0312 10:47:43.045568 465088 usertrap_amd64.go:225] [ 58795: 58795] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:43.045941 465088 usertrap_amd64.go:212] [ 58804: 58804] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:43.046078 465088 usertrap_amd64.go:122] [ 58804: 58804] Allocate a new trap: 0xc007f0c630 40 D0312 10:47:43.046874 465088 usertrap_amd64.go:225] [ 58804: 58804] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:43.049876 465088 task_exit.go:204] [ 58795: 58795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.050075 465088 task_signals.go:204] [ 58795: 58805] Signal 58795, PID: 58805, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.050237 465088 task_exit.go:204] [ 58795: 58805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.050591 465088 task_exit.go:204] [ 58795: 58795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.050751 465088 usertrap_amd64.go:212] [ 58804: 58804] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:43.050819 465088 task_exit.go:204] [ 58798: 58798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.050862 465088 usertrap_amd64.go:122] [ 58804: 58804] Allocate a new trap: 0xc007f0c630 41 D0312 10:47:43.050957 465088 task_signals.go:204] [ 58798: 58806] Signal 58798, PID: 58806, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.051016 465088 usertrap_amd64.go:225] [ 58804: 58804] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:43.051063 465088 task_signals.go:204] [ 58798: 58803] Signal 58798, PID: 58803, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.051091 465088 task_exit.go:204] [ 58798: 58806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.051258 465088 task_signals.go:204] [ 58798: 58802] Signal 58798, PID: 58802, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.051364 465088 task_exit.go:204] [ 58798: 58798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.052912 465088 task_exit.go:204] [ 58795: 58805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.053043 465088 task_exit.go:204] [ 58795: 58805] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.053137 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:43.053360 465088 task_exit.go:204] [ 58798: 58803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.053590 465088 task_exit.go:204] [ 58798: 58803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.053624 465088 task_exit.go:204] [ 58798: 58803] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.053772 465088 task_exit.go:204] [ 58798: 58802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.053942 465088 task_exit.go:204] [ 58798: 58806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.053990 465088 task_exit.go:204] [ 58798: 58806] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.054246 465088 task_exit.go:204] [ 58795: 58795] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:43 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r1 = fcntl$dupfd(r0, 0x0, r0) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) faccessat2(r3, &(0x7f0000000000)='\x00', 0x3, 0x1100) connect$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) (async) ioctl$TFD_IOC_SET_TICKS(r1, 0x5452, &(0x7f0000002140)) D0312 10:47:43.056728 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.057322 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.059098 465088 task_exit.go:204] [ 58798: 58802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.059249 465088 task_exit.go:204] [ 58798: 58802] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.059561 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:43.062140 465088 task_exit.go:204] [ 58798: 58798] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.069397 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.069835 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000740)=[{{&(0x7f00000001c0), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000000280)=""/237, 0xed}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/115, 0x73}, {&(0x7f00000004c0)=""/22, 0x16}, {&(0x7f0000000500)=""/160, 0xa0}, {&(0x7f00000005c0)=""/225, 0xe1}], 0x8}}], 0x1, 0x40010303, &(0x7f00000007c0)={r1, r2+60000000}) (async) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) (async) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) dup2(r3, r0) (async, rerun: 64) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) (rerun: 64) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x0) (rerun: 64) r5 = accept(r0, 0x0, 0x0) getsockopt$SO_COOKIE(r5, 0x1, 0x19, 0x0, &(0x7f0000000140)) (async) socket$unix(0x1, 0x5, 0x0) D0312 10:47:43.073520 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.074548 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.089154 465088 usertrap_amd64.go:212] [ 58804: 58804] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:43.089245 465088 usertrap_amd64.go:122] [ 58804: 58804] Allocate a new trap: 0xc007f0c630 42 D0312 10:47:43.089305 465088 usertrap_amd64.go:225] [ 58804: 58804] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:43.102501 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.103641 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.104251 465088 usertrap_amd64.go:212] [ 58808: 58808] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:43.104356 465088 usertrap_amd64.go:122] [ 58808: 58808] Allocate a new trap: 0xc00eb10a50 40 D0312 10:47:43.105008 465088 usertrap_amd64.go:225] [ 58808: 58808] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:43.109099 465088 usertrap_amd64.go:212] [ 58808: 58808] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:43.109197 465088 usertrap_amd64.go:122] [ 58808: 58808] Allocate a new trap: 0xc00eb10a50 41 D0312 10:47:43.109267 465088 usertrap_amd64.go:225] [ 58808: 58808] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:43.109948 465088 usertrap_amd64.go:212] [ 58797: 58797] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:43.110033 465088 usertrap_amd64.go:122] [ 58797: 58797] Allocate a new trap: 0xc006f3e480 42 D0312 10:47:43.110105 465088 usertrap_amd64.go:225] [ 58797: 58797] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:43.111385 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.111759 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.120168 465088 usertrap_amd64.go:212] [ 58810: 58810] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:43.120322 465088 usertrap_amd64.go:122] [ 58810: 58810] Allocate a new trap: 0xc006f3e5d0 40 D0312 10:47:43.120996 465088 usertrap_amd64.go:225] [ 58810: 58810] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:43.122988 465088 usertrap_amd64.go:212] [ 58804: 58804] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:43.123106 465088 usertrap_amd64.go:122] [ 58804: 58804] Allocate a new trap: 0xc007f0c630 43 D0312 10:47:43.123171 465088 usertrap_amd64.go:225] [ 58804: 58804] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:43.124301 465088 usertrap_amd64.go:212] [ 58810: 58810] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:43.124431 465088 usertrap_amd64.go:122] [ 58810: 58810] Allocate a new trap: 0xc006f3e5d0 41 D0312 10:47:43.124510 465088 usertrap_amd64.go:212] [ 58808: 58808] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:43.124516 465088 usertrap_amd64.go:225] [ 58810: 58810] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:43.124575 465088 usertrap_amd64.go:122] [ 58808: 58808] Allocate a new trap: 0xc00eb10a50 42 D0312 10:47:43.124840 465088 usertrap_amd64.go:225] [ 58808: 58808] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:43.128622 465088 task_exit.go:204] [ 58804: 58804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.128861 465088 task_exit.go:204] [ 58804: 58804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.130175 465088 task_signals.go:204] [ 58804: 58809] Signal 58804, PID: 58809, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.130314 465088 task_exit.go:204] [ 58804: 58809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.132461 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.132904 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.133806 465088 task_exit.go:204] [ 58804: 58809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.133876 465088 task_exit.go:204] [ 58804: 58809] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.133972 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:43.135752 465088 task_exit.go:204] [ 58804: 58804] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:43 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:43.147002 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.148308 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.149616 465088 usertrap_amd64.go:212] [ 58810: 58810] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:43.149682 465088 usertrap_amd64.go:122] [ 58810: 58810] Allocate a new trap: 0xc006f3e5d0 42 D0312 10:47:43.149765 465088 usertrap_amd64.go:225] [ 58810: 58810] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:43.152760 465088 usertrap_amd64.go:212] [ 58808: 58808] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:43.152810 465088 usertrap_amd64.go:122] [ 58808: 58808] Allocate a new trap: 0xc00eb10a50 43 D0312 10:47:43.152870 465088 usertrap_amd64.go:225] [ 58808: 58808] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:43.159204 465088 task_exit.go:204] [ 58808: 58808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.159477 465088 task_signals.go:204] [ 58808: 58811] Signal 58808, PID: 58811, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.159751 465088 task_signals.go:204] [ 58808: 58812] Signal 58808, PID: 58812, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.159852 465088 task_exit.go:204] [ 58808: 58808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.160106 465088 task_exit.go:204] [ 58808: 58811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.161126 465088 task_exit.go:204] [ 58808: 58811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.161186 465088 task_exit.go:204] [ 58808: 58811] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.161407 465088 task_exit.go:204] [ 58808: 58812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.164772 465088 task_exit.go:204] [ 58808: 58812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.164861 465088 task_exit.go:204] [ 58808: 58812] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.164999 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:43.165839 465088 task_exit.go:204] [ 58808: 58808] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.175799 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.176510 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.186869 465088 usertrap_amd64.go:212] [ 58814: 58814] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:43.186983 465088 usertrap_amd64.go:122] [ 58814: 58814] Allocate a new trap: 0xc0075f8870 40 D0312 10:47:43.187499 465088 usertrap_amd64.go:225] [ 58814: 58814] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:43.191844 465088 usertrap_amd64.go:212] [ 58814: 58814] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:43.192015 465088 usertrap_amd64.go:122] [ 58814: 58814] Allocate a new trap: 0xc0075f8870 41 D0312 10:47:43.192141 465088 usertrap_amd64.go:225] [ 58814: 58814] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:43.204049 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.204880 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.217823 465088 usertrap_amd64.go:212] [ 58814: 58814] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:43.217914 465088 usertrap_amd64.go:122] [ 58814: 58814] Allocate a new trap: 0xc0075f8870 42 D0312 10:47:43.218007 465088 usertrap_amd64.go:225] [ 58814: 58814] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:43.254537 465088 usertrap_amd64.go:212] [ 58814: 58814] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:43.254632 465088 usertrap_amd64.go:122] [ 58814: 58814] Allocate a new trap: 0xc0075f8870 43 D0312 10:47:43.254715 465088 usertrap_amd64.go:225] [ 58814: 58814] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:43.256886 465088 task_exit.go:204] [ 58814: 58814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.257202 465088 task_signals.go:204] [ 58814: 58817] Signal 58814, PID: 58817, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.257238 465088 task_exit.go:204] [ 58814: 58814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.257387 465088 task_exit.go:204] [ 58814: 58817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.260425 465088 task_exit.go:204] [ 58814: 58817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.260497 465088 task_exit.go:204] [ 58814: 58817] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.260580 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:43.260716 465088 usertrap_amd64.go:212] [ 58810: 58810] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:43.260776 465088 usertrap_amd64.go:122] [ 58810: 58810] Allocate a new trap: 0xc006f3e5d0 43 D0312 10:47:43.260870 465088 usertrap_amd64.go:225] [ 58810: 58810] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:43.262389 465088 task_exit.go:204] [ 58814: 58814] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.273613 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.274071 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.303110 465088 task_signals.go:470] [ 7: 9388] Notified of signal 23 D0312 10:47:43.303387 465088 task_signals.go:220] [ 7: 9388] Signal 23: delivering to handler D0312 10:47:43.784155 465088 usertrap_amd64.go:212] [ 58797: 58797] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:43.784256 465088 usertrap_amd64.go:122] [ 58797: 58797] Allocate a new trap: 0xc006f3e480 43 D0312 10:47:43.784354 465088 usertrap_amd64.go:225] [ 58797: 58797] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:43.797222 465088 task_exit.go:204] [ 58797: 58797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.797431 465088 task_exit.go:204] [ 58797: 58797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.797573 465088 task_signals.go:204] [ 58797: 58807] Signal 58797, PID: 58807, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.797650 465088 task_exit.go:204] [ 58797: 58807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.797778 465088 task_exit.go:204] [ 58797: 58807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.797805 465088 task_exit.go:204] [ 58797: 58807] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.798612 465088 task_signals.go:204] [ 58797: 58801] Signal 58797, PID: 58801, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.798701 465088 task_exit.go:204] [ 58797: 58801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.800747 465088 task_exit.go:204] [ 58797: 58801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.800790 465088 task_exit.go:204] [ 58797: 58801] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.800868 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:43.805160 465088 task_exit.go:204] [ 58797: 58797] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r4, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:43 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r1 = fcntl$dupfd(r0, 0x0, r0) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) faccessat2(r3, &(0x7f0000000000)='\x00', 0x3, 0x1100) (async) connect$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$TFD_IOC_SET_TICKS(r1, 0x5452, &(0x7f0000002140)) 10:47:43 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x2) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) D0312 10:47:43.832743 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.833289 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.868452 465088 usertrap_amd64.go:212] [ 58818: 58818] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:43.868589 465088 usertrap_amd64.go:122] [ 58818: 58818] Allocate a new trap: 0xc007ec8a50 40 D0312 10:47:43.869476 465088 usertrap_amd64.go:225] [ 58818: 58818] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:43.882102 465088 usertrap_amd64.go:212] [ 58818: 58818] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:43.882186 465088 usertrap_amd64.go:122] [ 58818: 58818] Allocate a new trap: 0xc007ec8a50 41 D0312 10:47:43.882247 465088 usertrap_amd64.go:225] [ 58818: 58818] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:43.882205 465088 usertrap_amd64.go:212] [ 58819: 58819] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:43.882319 465088 usertrap_amd64.go:122] [ 58819: 58819] Allocate a new trap: 0xc00ff86960 40 D0312 10:47:43.882895 465088 usertrap_amd64.go:225] [ 58819: 58819] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:43.884694 465088 usertrap_amd64.go:212] [ 58819: 58819] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:43.884765 465088 usertrap_amd64.go:122] [ 58819: 58819] Allocate a new trap: 0xc00ff86960 41 D0312 10:47:43.884853 465088 usertrap_amd64.go:225] [ 58819: 58819] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:43.891060 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.892190 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.894184 465088 usertrap_amd64.go:212] [ 58820: 58820] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:43.894344 465088 usertrap_amd64.go:122] [ 58820: 58820] Allocate a new trap: 0xc006f3e840 39 D0312 10:47:43.894504 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.894809 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.894875 465088 usertrap_amd64.go:225] [ 58820: 58820] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:43.902078 465088 usertrap_amd64.go:212] [ 58820: 58820] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:43.902133 465088 usertrap_amd64.go:122] [ 58820: 58820] Allocate a new trap: 0xc006f3e840 40 D0312 10:47:43.902199 465088 usertrap_amd64.go:225] [ 58820: 58820] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:43.904611 465088 usertrap_amd64.go:212] [ 58819: 58819] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:43.904681 465088 usertrap_amd64.go:122] [ 58819: 58819] Allocate a new trap: 0xc00ff86960 42 D0312 10:47:43.904768 465088 usertrap_amd64.go:225] [ 58819: 58819] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:43.906988 465088 usertrap_amd64.go:212] [ 58818: 58818] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:43.907043 465088 usertrap_amd64.go:122] [ 58818: 58818] Allocate a new trap: 0xc007ec8a50 42 D0312 10:47:43.907102 465088 usertrap_amd64.go:225] [ 58818: 58818] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:43.908839 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:43.909178 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.925566 465088 usertrap_amd64.go:212] [ 58820: 58820] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:43.925622 465088 usertrap_amd64.go:122] [ 58820: 58820] Allocate a new trap: 0xc006f3e840 41 D0312 10:47:43.925679 465088 usertrap_amd64.go:225] [ 58820: 58820] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:43.952740 465088 usertrap_amd64.go:212] [ 58818: 58818] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:43.952827 465088 usertrap_amd64.go:122] [ 58818: 58818] Allocate a new trap: 0xc007ec8a50 43 D0312 10:47:43.952899 465088 usertrap_amd64.go:225] [ 58818: 58818] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:43.960434 465088 usertrap_amd64.go:212] [ 58819: 58819] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:43.960480 465088 usertrap_amd64.go:122] [ 58819: 58819] Allocate a new trap: 0xc00ff86960 43 D0312 10:47:43.960535 465088 usertrap_amd64.go:225] [ 58819: 58819] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:43.962394 465088 task_exit.go:204] [ 58819: 58819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.962635 465088 task_signals.go:204] [ 58819: 58821] Signal 58819, PID: 58821, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.962640 465088 task_signals.go:204] [ 58819: 58825] Signal 58819, PID: 58825, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.962720 465088 task_exit.go:204] [ 58819: 58825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.962908 465088 task_exit.go:204] [ 58819: 58819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.963061 465088 task_exit.go:204] [ 58819: 58825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.963116 465088 task_exit.go:204] [ 58819: 58825] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.963232 465088 task_exit.go:204] [ 58819: 58821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.966184 465088 task_exit.go:204] [ 58819: 58821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.966244 465088 task_exit.go:204] [ 58819: 58821] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.966338 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:43.970117 465088 task_exit.go:204] [ 58819: 58819] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.975939 465088 usertrap_amd64.go:212] [ 58810: 58810] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:43.976034 465088 usertrap_amd64.go:122] [ 58810: 58810] Allocate a new trap: 0xc006f3e5d0 44 D0312 10:47:43.976129 465088 usertrap_amd64.go:225] [ 58810: 58810] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:43.977852 465088 usertrap_amd64.go:212] [ 58818: 58818] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:43.977926 465088 usertrap_amd64.go:122] [ 58818: 58818] Allocate a new trap: 0xc007ec8a50 44 D0312 10:47:43.977980 465088 usertrap_amd64.go:225] [ 58818: 58818] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:43.978950 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:43.979674 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:43.982797 465088 task_exit.go:204] [ 58818: 58818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.983011 465088 task_exit.go:204] [ 58818: 58818] Transitioning from exit state TaskExitInitiated to TaskExitZombie 10:47:43 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x101) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffedc6) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x306) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x200) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xc2b) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2c56) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x400) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xab9e) D0312 10:47:43.984887 465088 task_signals.go:204] [ 58818: 58822] Signal 58818, PID: 58822, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.985038 465088 task_exit.go:204] [ 58818: 58822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.985237 465088 task_exit.go:204] [ 58818: 58822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.985277 465088 task_exit.go:204] [ 58818: 58822] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.985567 465088 task_signals.go:204] [ 58818: 58824] Signal 58818, PID: 58824, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.985625 465088 task_exit.go:204] [ 58818: 58824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.988390 465088 task_exit.go:204] [ 58818: 58824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.988443 465088 task_exit.go:204] [ 58818: 58824] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.988503 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:43.988882 465088 task_exit.go:204] [ 58818: 58818] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:43 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) r0 = socket$inet_icmp(0x2, 0x2, 0x1) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x5, 0xffffffffffffffff, 0x7fffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) D0312 10:47:43.992393 465088 task_exit.go:204] [ 58810: 58810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.992616 465088 task_signals.go:204] [ 58810: 58816] Signal 58810, PID: 58816, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.992690 465088 task_signals.go:204] [ 58810: 58813] Signal 58810, PID: 58813, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.992773 465088 task_signals.go:204] [ 58810: 58815] Signal 58810, PID: 58815, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:43.992825 465088 task_exit.go:204] [ 58810: 58810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.993267 465088 task_exit.go:204] [ 58810: 58816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.993455 465088 task_exit.go:204] [ 58810: 58816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.993488 465088 task_exit.go:204] [ 58810: 58816] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.993599 465088 task_exit.go:204] [ 58810: 58813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:43.993743 465088 task_exit.go:204] [ 58810: 58813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:43.993775 465088 task_exit.go:204] [ 58810: 58813] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:43.993848 465088 task_exit.go:204] [ 58810: 58815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.000310 465088 task_exit.go:204] [ 58810: 58815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.000362 465088 task_exit.go:204] [ 58810: 58815] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.000449 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:44.001420 465088 task_exit.go:204] [ 58810: 58810] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:44 executing program 0: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e, 0x800) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000500)=0x81) pwritev(r1, &(0x7f0000001640)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="0e367cea9ce4dd441a3477fb3ffc37e54bc2e0633861047aa715b7a95edd4293e52a20ec338b1995b19139eb1a952c489e4d01764c54bb76e192e7afb4d221b67775180bee23d7f7b929081f9a5e95a40601045613e1d53ac0d4923bbb9938ec2bbd5f6b69d2edffae6dcb540727a652cc877a99e68b2b1201491131e8a9764f68da272cd0dc29ad88090ac138a21aa50ec0a1bff37e5165", 0x98}, {&(0x7f0000001600)="b01a9cc8a2623573bda5851e5e6d15b76982e28bea64802b907d", 0x1a}], 0x3, 0xfff, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x81, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000016c0)=0x9) recvfrom$inet(r2, &(0x7f0000001700)=""/122, 0x7a, 0x40002002, &(0x7f0000001780)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0), 0x80200, 0x0) pipe2(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c800) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000001840)=0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f0000001880)=r5) fsetxattr$security_evm(r0, &(0x7f00000018c0), &(0x7f0000001900)=@v1={0x2, "69526058cb22b56f21726c11b67716"}, 0x10, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001940)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001b40)={{r6, 0x81, 0x0, 0x2, 0x0, 0x1ff, 0x6, 0x1, 0x8001, 0x3, 0x20, 0x2, 0x8001, 0x8001, 0x4}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = open(&(0x7f0000001c00)='./file0\x00', 0x8201, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r9, 0xf502, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000002040), 0x100000, 0x0) ioctl$KDENABIO(r10, 0x4b36) r11 = syz_open_procfs(0x0, &(0x7f0000002080)='net/netfilter\x00') close(r11) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f00000020c0)={r7, r6, "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", "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"}) r12 = open(&(0x7f00000030c0)='./file0\x00', 0x80400, 0x1dc) write$binfmt_elf32(r12, &(0x7f0000003100)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x40, 0x9, 0x81, 0x7, 0x2, 0x3e, 0x1, 0x12a, 0x38, 0x39b, 0x1, 0x4, 0x20, 0x1, 0x7, 0x4, 0x5}, [{0x6, 0x40, 0x6, 0x6, 0x9, 0x46f, 0x993, 0x200}, {0x6, 0x9, 0x9, 0x1, 0x5, 0x7, 0xfffff000, 0x80}], "bdb86bdbc2608f97688a950160514dc7e76e8183d4aa0029c41a349cc7c1eaa3", ['\x00', '\x00', '\x00']}, 0x398) r13 = openat$incfs(r2, &(0x7f00000034c0)='.pending_reads\x00', 0x181200, 0x18) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r13, 0x5000943f, &(0x7f0000003500)={{r3}, r8, 0x2, @unused=[0x8000000000000000, 0x4, 0x1bc7e28d, 0x4], @name="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"}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x30, r13, 0x7924b000) fchownat(r13, &(0x7f0000004500)='./file0\x00', 0xee01, 0x0, 0x1000) D0312 10:47:44.012374 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.013139 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.022340 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.022704 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.045550 465088 usertrap_amd64.go:212] [ 58826: 58826] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:44.045658 465088 usertrap_amd64.go:122] [ 58826: 58826] Allocate a new trap: 0xc007ec8ab0 40 D0312 10:47:44.048645 465088 usertrap_amd64.go:225] [ 58826: 58826] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:44.049470 465088 usertrap_amd64.go:212] [ 58828: 58828] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:44.049541 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.049614 465088 usertrap_amd64.go:122] [ 58828: 58828] Allocate a new trap: 0xc0075f8900 40 D0312 10:47:44.049922 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.050160 465088 usertrap_amd64.go:225] [ 58828: 58828] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:44.062723 465088 usertrap_amd64.go:212] [ 58820: 58820] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:44.062802 465088 usertrap_amd64.go:122] [ 58820: 58820] Allocate a new trap: 0xc006f3e840 42 D0312 10:47:44.062882 465088 usertrap_amd64.go:225] [ 58820: 58820] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:44.065094 465088 usertrap_amd64.go:212] [ 58828: 58828] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:44.065165 465088 usertrap_amd64.go:122] [ 58828: 58828] Allocate a new trap: 0xc0075f8900 41 D0312 10:47:44.065229 465088 usertrap_amd64.go:225] [ 58828: 58828] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:44.068580 465088 usertrap_amd64.go:212] [ 58829: 58829] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:44.068744 465088 usertrap_amd64.go:122] [ 58829: 58829] Allocate a new trap: 0xc007ec8ae0 40 D0312 10:47:44.069198 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.071737 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.073277 465088 usertrap_amd64.go:225] [ 58829: 58829] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:44.075380 465088 usertrap_amd64.go:212] [ 58829: 58829] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:44.075456 465088 usertrap_amd64.go:122] [ 58829: 58829] Allocate a new trap: 0xc007ec8ae0 41 D0312 10:47:44.075547 465088 usertrap_amd64.go:225] [ 58829: 58829] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:44.075783 465088 usertrap_amd64.go:212] [ 58826: 58826] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:44.075846 465088 usertrap_amd64.go:122] [ 58826: 58826] Allocate a new trap: 0xc007ec8ab0 41 D0312 10:47:44.075905 465088 usertrap_amd64.go:225] [ 58826: 58826] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:44.082629 465088 usertrap_amd64.go:212] [ 58828: 58828] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:44.082701 465088 usertrap_amd64.go:122] [ 58828: 58828] Allocate a new trap: 0xc0075f8900 42 D0312 10:47:44.082756 465088 usertrap_amd64.go:225] [ 58828: 58828] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:44.088621 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.089381 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.089770 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.093366 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.115043 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.115449 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.121257 465088 usertrap_amd64.go:212] [ 58826: 58826] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:44.121330 465088 usertrap_amd64.go:122] [ 58826: 58826] Allocate a new trap: 0xc007ec8ab0 42 D0312 10:47:44.121390 465088 usertrap_amd64.go:225] [ 58826: 58826] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:44.126027 465088 usertrap_amd64.go:212] [ 58829: 58829] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:44.126151 465088 usertrap_amd64.go:122] [ 58829: 58829] Allocate a new trap: 0xc007ec8ae0 42 D0312 10:47:44.126228 465088 usertrap_amd64.go:225] [ 58829: 58829] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:44.128236 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.130761 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.143657 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.143987 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.146025 465088 usertrap_amd64.go:212] [ 58828: 58830] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:44.146097 465088 usertrap_amd64.go:122] [ 58828: 58830] Allocate a new trap: 0xc0075f8900 43 D0312 10:47:44.146161 465088 usertrap_amd64.go:225] [ 58828: 58830] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:44.147066 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.147400 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.149011 465088 usertrap_amd64.go:212] [ 58829: 58829] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:44.149084 465088 usertrap_amd64.go:122] [ 58829: 58829] Allocate a new trap: 0xc007ec8ae0 43 D0312 10:47:44.149101 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.149197 465088 usertrap_amd64.go:225] [ 58829: 58829] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:44.150112 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.153460 465088 task_exit.go:204] [ 58829: 58829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.153582 465088 task_signals.go:204] [ 58829: 58832] Signal 58829, PID: 58832, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.153711 465088 task_exit.go:204] [ 58829: 58829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.153933 465088 task_exit.go:204] [ 58829: 58832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.156130 465088 task_exit.go:204] [ 58829: 58832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.157910 465088 task_exit.go:204] [ 58829: 58832] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.158486 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:44.159126 465088 task_exit.go:204] [ 58829: 58829] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:44 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) (async) r0 = socket$inet_icmp(0x2, 0x2, 0x1) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) (async) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x5, 0xffffffffffffffff, 0x7fffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, 0x0, 0x0) (async) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) D0312 10:47:44.174485 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.175032 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.183866 465088 usertrap_amd64.go:212] [ 58828: 58828] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:44.183955 465088 usertrap_amd64.go:122] [ 58828: 58828] Allocate a new trap: 0xc0075f8900 44 D0312 10:47:44.184029 465088 usertrap_amd64.go:225] [ 58828: 58828] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:44.190801 465088 task_exit.go:204] [ 58828: 58828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.191051 465088 task_exit.go:204] [ 58828: 58828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.191199 465088 task_signals.go:204] [ 58828: 58830] Signal 58828, PID: 58830, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.191320 465088 task_exit.go:204] [ 58828: 58830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.193545 465088 task_exit.go:204] [ 58828: 58830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.193610 465088 task_exit.go:204] [ 58828: 58830] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.193689 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:44.199748 465088 task_exit.go:204] [ 58828: 58828] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:44 executing program 0: memfd_create(&(0x7f0000000000)='\x00', 0x0) (async) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) accept4$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e, 0x800) (async) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e, 0x800) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000500)=0x81) (async) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000500)=0x81) pwritev(r1, &(0x7f0000001640)=[{&(0x7f0000000540)="81d081923f475a12d064c9343d3af6668c4376582aa51b9ab94c22956575704aa4895ae2af854b2058a65776520656a1a30769bf5826b62a25a834e94a951e1c7094d1a3310f96d0a3ee1a8c49852bc534b18c1d8d68e0b4e48cf3e841033514c281630d83d59f87dd00e21398e207cf75f263f1c0d19b40ee23998ce15b9396f35a714ef42f1d2ccb478efed5fdb750a6643f65165733b3630398d95a1241e73a69689f71c7c1c3f3dd5893a89f4889c9bb66e6eea053cfa999abf4579c581e5cd6c29193117acd50b7a8fe6a78b5a0ed3c437c6090282b2321c17da807f7c0fb714ed322bd335ce7bd1b4c6069a31610f17a3ca3905b14e48b2f1934f0a2115a1cc5637856cbf00c691c4bc9b00e223559096612e2a02e8826a15b2c7ec293f03538a20472b5aeedbbaa92384b3b3e3a4f5344db9e16906d3e5e55039bad124b1b514cae9db330aba871bec227dbfbee735be528d868a494d6d402177f2dd4df32411af3dc389c925f2c289a5ae26797e02d750842344d1acfa4c27d9f6d4c80537660f8f51e64b935719ad3cfa1442ea43d4210ec02fcecfdba5195c91421459e8eb48b2fe0ff0c824d0d9a166e2a74a2584b3ccfc97072e0cae39b8843b773fa2e3db00575b46fd53e8cae29ded8cf6951f55e6ff8d670e4c7f71be37022e71ef0aec33b587104dc2ba7e563b0dc326ac9a813aad1902c6efb7b6772f1495da3c6c6b3d83af2550963fb3839226a445a298685865416c40aafc8c3dad9d4aab8881cbc7e61265887c65529b003c3493232791bc8bcbe9a0c80651eb949f6421ada48615ba038d5d7e4f3a3026cad1edf66b2fc34e3c309a360dce4c7a85dcc70059a2c82ea38095d0b113c0de6ba18568a6cbf0e77f1e9b5f4919e0ba587f1f1c3ddfb54628df37245f6c9d3401153e912cf87af1f430dee1ebb2ff2ec12d8ff486e52a7bda5eb068903d6c08f48d3d1bb1b1c6be3c48c006a8f10cf2a30acd8b0dc20db57a77154f362c6a258b8aad6ecee0e4c4563d8096120e842c0d13241b746247c9cc41effe29cf5d233168627840706f7efbc759cb685ba264bea469a093b70d46ec56d8502a31ab0fbba05c489b56707a7e48c00feba9791587e4007ecbd970054a4ce6c091941787ac611ee35e9ace4a985481a046f5d2171ff35980554374e24a37bb558e0cec2cf59e8bd577ed9bd6f85c404f019e34613c6cae443de09c725f02c25ee2a8df2eaddb7d5d6177dccb0735faab9378fffa1d6f051f88fde75bd64ac93472dddda49e0d644369e7c11e4d0cb51c8499176e58b2da436c16c3bdfcbec7eace0e20bedda8534e47047ba4b517cbf09a08304956e7a15ebaff755087624b82905e9f237c211d94eb91e542972771617710134efd90c2036e5e42db1ff984aa335f08a87ee766f83c833267988c1d850776609f478b415db0f36e6f6fb3ec2a9509b2851c08c9ee5450b3945e0a537689d2c5d676eb534013abadcbc17baca8cade4756a27e792fc4a2c90d6c589956424fcb19a62e5019cf9240556ad6174c1ead20efda36aff4019fe09de51127730c053bf0b2dfdaf830a5613afc48f2800295206b05821f46ac8655edee9fbdceeb10466c795963ff19395dff309fb2500e2e893c2ea0922ca14579b3357712df865e727d08cfab18d98f91d4ab9a7b0456b4bfe24046b935732f64ffee96f4d5b90a88b68b94a8bcf10f231f255af87d145ad69beadc40581abbe6f46f12b184ac7118f7929b3d4b7490d81e11ce4bd0ce044424542c31ef0be940470beedb705d228dc9c5fedbeded66ff0cc648f4adc2738f551c7497030f87b1aab82fba951b920c659fd993d7b062162e1b735999a2f4085161145a1231086004094201ceb74efa4479c689fd921c7c954f5c46c3259f62fc821896a09a3f013c1cb4a17f97b111ef8443d733ab0ee6dce4cd6141b4a704f7a11f18665ea12fef83bc58ee398baaa85f15f0eb202c8ba03ac5604f5302a7f2dd883cb289d773f643b2300945e035993f7830e7701637c3faf0dc90ec728b781b949522f665569a20ebe98c929b25fc5efe9ae7261fa1b402b0e5d77e88393681f8f21a34cdda2a552ff68be60444e40aefebd9460217bd3f385724628a15b6f506de973345bf151ad6eac069e572ace73e7f9e05cf974cf5c3d9a98e8de15b72294d22f2690bb41482498eb5f2bcd64ccdd3520284e8390cf3b24ae3bac57886ad7e7f6995b4ad458cd4d0a9c63305e22327c86073d3800d9dec351dbfe7793be0cec670c48405115ce15e49963eba77d3765793f89e60fff8df36895a463df85e223b945ea344d74843fb247a8d7be2f45f2c11fc7ce15b206513bc80e25d26c845c58df929f7f8c42bb28f1e1c5e113da20c44da3ceedc6afe4ea676c01fcfdf7c328750a41cd51263d89618733e47e68cc5d867a052d3237bfc11c2f62b7e7e35376d8bfd8053b07fd0f7b4f4a28fe5f80b4392cd0aba077004ba6f307394ad1c9d1ecfb54d344207dd82d4f72e76a02fb826c51a5abf95eb418529d7b2e39063f2cd6acf75d3ea9982b407346cf01ae63e322578310f1cff5de98c9ea7b29d15fe0de979474bbe785ecc0ca26803c3f8f31031b3c67b915da2e4fdea9722141223a1a0badf7ed90e4967ab79bd6807cebc3d6fc14a5e160aa3c1c8fb5b3f1ee675ef55a34690ba9dfad885cfd6178c25e29daa8cbec830d1e6ef3cdbee903d068024820086336cef1c62b6d55c13b0b5d7e1fa8e79444f975151f21aae76b7de3c3b461649937dea960fc8665453a71317316e3d98ea4664188fab10145d505cdb76f847241f2c01a577cc7b45417f595563e92c3855c3ffc2d3afa7d23acca881e2c78910ccfa00c5e4f0086ffbc5848ca34693a03e10e2e4500e4d02c30bc3261d8d5f4b46a9228ddcbb1636a17e779a026f2ec236c9c2181aed3db665e2351b0c0c5fdd50f598e5523e70a9979e766bf025a6b87f92e2ead8e1b3976ee26b2c38cf56dead5661c798579ac1c591b217f338edb0a348828cc74906ebe6a53ac1153913e5dc9794b0a68eaf48190260e90ad78ea04a430581b59e0e5683960b8f884257c24bad118bbd2232ce11c7f576f3f8020e142fa20ccc5a20014ce287369c660fafd6259dd0e780ac9271ed1f7234d9b7064272b473f046065ea285d2a775d4a314d12e3198931d270308ac7c6ed7f3d9a254844fbe265a19921d8734e74e8dd1250c81767ee0fffdc90fdcc8ed5c1fa6657bcb38b74cb51fc84f68081bed576368c291f988fcc34c84f94fd19b8dbde0326eb2954440d2e694a4e6b5e5160fff7272a69ac9cd1f9fcd9c6dfd78adc90709d4d10a535492a21546a43b852bb562db0a777065bfd0002a479eaa81e1531a06748897f6e1600a8e6239847f82c2bec1ab4cdb3693fbb5f706cce36ce69d7a12f2dbe58e4d453651d53ef07ec2841eda6ec291c18e57f6122a7c891bc13c18c363994ff689a7c964d223eba717bed770e7226909a8461798191baeb4966db05db5d0d96fa9e2dbeba168630ec7d81057b0d07d8cf9c02c1dead8787051f2937b45b31520d56efbb7301f2ca0e0e87a0d0f3390b2750bb63d52d35f26e1dcf7256493d2c8710b9e6470ee190433725949d36651487fb309736f528f397a1ae05dbf36ba79241cd799d5562b4883c4e1ff6e60681d00cc2828040e4c19de4238553672797e6974e1ca8a44efd04036d9d403d5a6ff435d02addadb20eedbbf65a0ebfd5bc0640ce2d3260ab4b81f409e50bf971674b20796bc0ce9d396eea184e58b7d54f623d1b22be93bd7ef69366acb189bb147bcbdeecdf04b9af094694c9e6d41ad7aa331ff65048598c1db180ab629d560d84e14799ef6844beee0056f8ac969bf2052af21fe4d43dcc3fdaa538ce55a917ffe592af4fe12416dd656886a9ac652232b0816afa3e667f0b2a9c4df18574ed243182d0d7f358620a8f2f69e2ca1306d0ca50cf32fda09fb9ce17ccd4af274ca492d9e105190604dddfa78abbc97da519e8601bc0941f9f51e2d2fc18be0df4d864b1fe03651b4f33c6d673683ae2e9e672a5e35af48e58aa7bf6744d6bcf15a6e673df1a753324bffe69c559f3c9ce3a453254205e2e70e364f282842d5765883a081dc12f7a63275ff830d0344db5747989c4b92b2cee996ee24079c26372205c39f5e89d6b485b870404f9c12ef15ea6ec325723bd0b6a607444705eda75d4ab35c3703af178a14e52e8f4ec1dc52485892dbd88b03cea19ec70ac7a4a0432c18a638cb20a0b35167cd4668dad8dec524bb0023fe9113f1f520e72d3c87d08b212a312c3cf2392cdb7d3878584dc87a1c7d0f316aecaddf8063ddb095bae8a3243d160ece9ea0694d4f22ae24521ead25094f78b49f3815fe42397c3a14d411ba93fc9471b25bf7b19875749101a4bc8202500f6302a5ebb67a767a1460939a2d57b1190e6fd767aed4cbd8b97562660ccbbeefb06775be59307fbbf0850ca6bdd69494952c6129269cd76efd5eaa756b4a67224e403a0767eee16d6b51ec136fb09049dedc9d3bdf335a8a05949096e78e299369b704bc9244441543023272ed0cae00931abc760ba8303461ae1b6a2d868241b86726dab345de1655368e59ef04afb5ac21e270368452782c9ac424ee448f74a31009f9cc22d5e22a12858ca3f2bb4bbeef358d3e838e28caa73b127a963ec6b4fedd413781a70dd9309bdce3ab73937d49cca33f0b3d477fc61d87d5227a59db828c5abcda247d3fa45067d819f761ba22658e9e58ed0fce5d4fdc386a47d2fc6274f5bc80a0dcb37354bcd99f71958593ab98d244a717ba816d389710878b1309fcb8d47c2fce4d73ce8ff41d2d4f400e356036f4fd0786421392b869dfd69e9a3a9e48f818c83e3ae4e5855b80b8e7418c977e9e629f9c09c90671a56fe93f69845c93141a177b6002f7d4e9358cc5b5b6eb58e7d380a236b695a83f1280e7a150fb9e33eb15aaca31cbec09a989e7faed165db05922e1bc8e16f62aa7628485b8c0944e1078af4ea097c43cce663928d88a3a0bcef8c1300cf45fd964e72c75953cc175996bd027f1ee6eb199ddde4f13c27fb6d068da2b88e47fbf73fe974bfb6b7a49d2d1f7c2e2363e1dedaafa9ee3e41803330f560e697512d84de5f2de146aaf85761987aed86106798684c5259f4072e509092a8bed6139e8c0ec7233632c0cb0053cd293349175ad2f5619b3634a08071a44206c20f3994395e1ee782433b27061272c5a63de26a4fe4198ea81fc26ce6cb9d9e2e766e7d55ae3cb8d2d4311f51886f02f93e66e22be7e4906c123216efcc38cedc60fc383c8f5e43b64002bc893c405bedd646c3cd3a7ad48ca879875a2e864453f9d06532be7ca220245053f1dc484cddffdd78674864f21b19803fec8261d4fd59815fdc0382d3de56ace8e21020af3b2e9f10dda07f1d8eba0e501ba0b19fb821f74f10342450519c7085ddd35af588567f92f75102089bc21ffccb1ff7ccbe7c07abd8280cb0488b016fde55d21eb9b0d77de23fcd5285b52ee3dbe40c0c2b152f735304b83a276c6c219e2d249b658c11cad7c4e364ee6a2373a0774f2e02b19b3f0070ae8960e20142c8459f870c3f91d80a550045406b29c9f703f746c369c487e77fab40de03e8cd79b202d2e9fc0f6697ad07767260f87b91cc3186d682b06e5bdd18845cfa59f512d3a475b6dba1cf0d318f429abaaf518c02a16294185ce4c136231e7d7137fb13de123593ac4e8871c133", 0x1000}, {&(0x7f0000001540)="0e367cea9ce4dd441a3477fb3ffc37e54bc2e0633861047aa715b7a95edd4293e52a20ec338b1995b19139eb1a952c489e4d01764c54bb76e192e7afb4d221b67775180bee23d7f7b929081f9a5e95a40601045613e1d53ac0d4923bbb9938ec2bbd5f6b69d2edffae6dcb540727a652cc877a99e68b2b1201491131e8a9764f68da272cd0dc29ad88090ac138a21aa50ec0a1bff37e5165", 0x98}, {&(0x7f0000001600)="b01a9cc8a2623573bda5851e5e6d15b76982e28bea64802b907d", 0x1a}], 0x3, 0xfff, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x81, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000016c0)=0x9) recvfrom$inet(r2, &(0x7f0000001700)=""/122, 0x7a, 0x40002002, &(0x7f0000001780)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10) (async) recvfrom$inet(r2, &(0x7f0000001700)=""/122, 0x7a, 0x40002002, &(0x7f0000001780)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0), 0x80200, 0x0) pipe2(&(0x7f0000001800), 0x8c800) (async) pipe2(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c800) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000001840)=0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f0000001880)=r5) fsetxattr$security_evm(r0, &(0x7f00000018c0), &(0x7f0000001900)=@v1={0x2, "69526058cb22b56f21726c11b67716"}, 0x10, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001940)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001b40)={{r6, 0x81, 0x0, 0x2, 0x0, 0x1ff, 0x6, 0x1, 0x8001, 0x3, 0x20, 0x2, 0x8001, 0x8001, 0x4}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) open(&(0x7f0000001c00)='./file0\x00', 0x8201, 0x100) (async) r9 = open(&(0x7f0000001c00)='./file0\x00', 0x8201, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r9, 0xf502, 0x0) (async) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r9, 0xf502, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000002040), 0x100000, 0x0) ioctl$KDENABIO(r10, 0x4b36) r11 = syz_open_procfs(0x0, &(0x7f0000002080)='net/netfilter\x00') close(r11) (async) close(r11) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f00000020c0)={r7, r6, "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", "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"}) open(&(0x7f00000030c0)='./file0\x00', 0x80400, 0x1dc) (async) r12 = open(&(0x7f00000030c0)='./file0\x00', 0x80400, 0x1dc) write$binfmt_elf32(r12, &(0x7f0000003100)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x40, 0x9, 0x81, 0x7, 0x2, 0x3e, 0x1, 0x12a, 0x38, 0x39b, 0x1, 0x4, 0x20, 0x1, 0x7, 0x4, 0x5}, [{0x6, 0x40, 0x6, 0x6, 0x9, 0x46f, 0x993, 0x200}, {0x6, 0x9, 0x9, 0x1, 0x5, 0x7, 0xfffff000, 0x80}], "bdb86bdbc2608f97688a950160514dc7e76e8183d4aa0029c41a349cc7c1eaa3", ['\x00', '\x00', '\x00']}, 0x398) (async) write$binfmt_elf32(r12, &(0x7f0000003100)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x40, 0x9, 0x81, 0x7, 0x2, 0x3e, 0x1, 0x12a, 0x38, 0x39b, 0x1, 0x4, 0x20, 0x1, 0x7, 0x4, 0x5}, [{0x6, 0x40, 0x6, 0x6, 0x9, 0x46f, 0x993, 0x200}, {0x6, 0x9, 0x9, 0x1, 0x5, 0x7, 0xfffff000, 0x80}], "bdb86bdbc2608f97688a950160514dc7e76e8183d4aa0029c41a349cc7c1eaa3", ['\x00', '\x00', '\x00']}, 0x398) r13 = openat$incfs(r2, &(0x7f00000034c0)='.pending_reads\x00', 0x181200, 0x18) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r13, 0x5000943f, &(0x7f0000003500)={{r3}, r8, 0x2, @unused=[0x8000000000000000, 0x4, 0x1bc7e28d, 0x4], @name="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"}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x30, r13, 0x7924b000) fchownat(r13, &(0x7f0000004500)='./file0\x00', 0xee01, 0x0, 0x1000) D0312 10:47:44.213934 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.216560 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.225458 465088 usertrap_amd64.go:212] [ 58826: 58826] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:44.225534 465088 usertrap_amd64.go:122] [ 58826: 58826] Allocate a new trap: 0xc007ec8ab0 43 D0312 10:47:44.225598 465088 usertrap_amd64.go:225] [ 58826: 58826] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:44.231945 465088 task_exit.go:204] [ 58826: 58826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.232143 465088 task_exit.go:204] [ 58826: 58826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.233084 465088 task_signals.go:204] [ 58826: 58831] Signal 58826, PID: 58831, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.233208 465088 task_exit.go:204] [ 58826: 58831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.236289 465088 task_exit.go:204] [ 58826: 58831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.236387 465088 task_exit.go:204] [ 58826: 58831] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.236490 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:44.237508 465088 task_exit.go:204] [ 58826: 58826] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.246742 465088 usertrap_amd64.go:212] [ 58833: 58833] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:44.246881 465088 usertrap_amd64.go:122] [ 58833: 58833] Allocate a new trap: 0xc007ec8cc0 40 D0312 10:47:44.247376 465088 usertrap_amd64.go:225] [ 58833: 58833] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:44.251025 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.253141 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.253718 465088 usertrap_amd64.go:212] [ 58833: 58833] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:44.253771 465088 usertrap_amd64.go:122] [ 58833: 58833] Allocate a new trap: 0xc007ec8cc0 41 D0312 10:47:44.253850 465088 usertrap_amd64.go:225] [ 58833: 58833] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:44.258005 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.258533 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.280764 465088 usertrap_amd64.go:212] [ 58834: 58834] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:44.280896 465088 usertrap_amd64.go:122] [ 58834: 58834] Allocate a new trap: 0xc007f8aba0 40 D0312 10:47:44.281373 465088 usertrap_amd64.go:225] [ 58834: 58834] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:44.285556 465088 usertrap_amd64.go:212] [ 58834: 58834] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:44.285659 465088 usertrap_amd64.go:122] [ 58834: 58834] Allocate a new trap: 0xc007f8aba0 41 D0312 10:47:44.285755 465088 usertrap_amd64.go:225] [ 58834: 58834] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:44.286960 465088 usertrap_amd64.go:212] [ 58833: 58833] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:44.287027 465088 usertrap_amd64.go:122] [ 58833: 58833] Allocate a new trap: 0xc007ec8cc0 42 D0312 10:47:44.287155 465088 usertrap_amd64.go:225] [ 58833: 58833] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:44.292883 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.293786 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.309815 465088 usertrap_amd64.go:212] [ 58833: 58833] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:44.310338 465088 usertrap_amd64.go:122] [ 58833: 58833] Allocate a new trap: 0xc007ec8cc0 43 D0312 10:47:44.310485 465088 usertrap_amd64.go:225] [ 58833: 58833] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:44.315628 465088 usertrap_amd64.go:212] [ 58834: 58834] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:44.315691 465088 usertrap_amd64.go:122] [ 58834: 58834] Allocate a new trap: 0xc007f8aba0 42 D0312 10:47:44.315763 465088 usertrap_amd64.go:225] [ 58834: 58834] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:44.328507 465088 task_exit.go:204] [ 58833: 58833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.329090 465088 task_signals.go:204] [ 58833: 58835] Signal 58833, PID: 58835, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.329123 465088 task_signals.go:204] [ 58833: 58836] Signal 58833, PID: 58836, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.329342 465088 task_exit.go:204] [ 58833: 58833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.329451 465088 task_exit.go:204] [ 58833: 58835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.329747 465088 task_exit.go:204] [ 58833: 58835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.329788 465088 task_exit.go:204] [ 58833: 58835] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.329923 465088 task_exit.go:204] [ 58833: 58836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.333034 465088 task_exit.go:204] [ 58833: 58836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.333122 465088 task_exit.go:204] [ 58833: 58836] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.333218 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:44.334297 465088 task_exit.go:204] [ 58833: 58833] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.340719 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.342413 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.402218 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.409813 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.416843 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.417245 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.422237 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.422712 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.426982 465088 usertrap_amd64.go:212] [ 58834: 58837] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:44.427105 465088 usertrap_amd64.go:122] [ 58834: 58837] Allocate a new trap: 0xc007f8aba0 43 D0312 10:47:44.427191 465088 usertrap_amd64.go:225] [ 58834: 58837] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:44.428269 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.428784 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.433419 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.434777 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.445018 465088 usertrap_amd64.go:212] [ 58834: 58834] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:44.445113 465088 usertrap_amd64.go:122] [ 58834: 58834] Allocate a new trap: 0xc007f8aba0 44 D0312 10:47:44.445169 465088 usertrap_amd64.go:225] [ 58834: 58834] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:44.452519 465088 task_exit.go:204] [ 58834: 58834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.452761 465088 task_exit.go:204] [ 58834: 58834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.452902 465088 task_signals.go:204] [ 58834: 58838] Signal 58834, PID: 58838, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.453055 465088 task_exit.go:204] [ 58834: 58838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.453177 465088 task_signals.go:204] [ 58834: 58837] Signal 58834, PID: 58837, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.453319 465088 task_exit.go:204] [ 58834: 58838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.453373 465088 task_exit.go:204] [ 58834: 58838] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.453523 465088 task_exit.go:204] [ 58834: 58837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.456765 465088 task_exit.go:204] [ 58834: 58837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.456840 465088 task_exit.go:204] [ 58834: 58837] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.456906 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:44.458070 465088 task_exit.go:204] [ 58834: 58834] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.467951 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.468396 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.752373 465088 usertrap_amd64.go:212] [ 58820: 58820] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:44.752474 465088 usertrap_amd64.go:122] [ 58820: 58820] Allocate a new trap: 0xc006f3e840 43 D0312 10:47:44.752538 465088 usertrap_amd64.go:225] [ 58820: 58820] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:44.790450 465088 task_exit.go:204] [ 58820: 58820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.790656 465088 task_exit.go:204] [ 58820: 58820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.793863 465088 task_signals.go:204] [ 58820: 58823] Signal 58820, PID: 58823, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.793949 465088 task_exit.go:204] [ 58820: 58823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.794102 465088 task_exit.go:204] [ 58820: 58823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.794144 465088 task_exit.go:204] [ 58820: 58823] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.794361 465088 task_signals.go:204] [ 58820: 58827] Signal 58820, PID: 58827, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:44.794480 465088 task_exit.go:204] [ 58820: 58827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:44.797251 465088 task_exit.go:204] [ 58820: 58827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:44.797308 465088 task_exit.go:204] [ 58820: 58827] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:44.797381 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:44.798833 465088 task_exit.go:204] [ 58820: 58820] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(0xffffffffffffffff, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:44 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x101) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffedc6) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x306) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x200) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x200) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xc2b) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2c56) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x400) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xab9e) 10:47:44 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) r0 = socket$inet_icmp(0x2, 0x2, 0x1) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x5, 0xffffffffffffffff, 0x7fffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) (async) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) (async) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x5, 0xffffffffffffffff, 0x7fffffff}) (async) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, 0x0, 0x0) (async) creat(&(0x7f0000000000)='./file0\x00', 0x80) (async) ioctl$TUNDETACHFILTER(r2, 0x5450, 0x0) (async) 10:47:44 executing program 0: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e, 0x800) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000500)=0x81) (async) pwritev(r1, &(0x7f0000001640)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="0e367cea9ce4dd441a3477fb3ffc37e54bc2e0633861047aa715b7a95edd4293e52a20ec338b1995b19139eb1a952c489e4d01764c54bb76e192e7afb4d221b67775180bee23d7f7b929081f9a5e95a40601045613e1d53ac0d4923bbb9938ec2bbd5f6b69d2edffae6dcb540727a652cc877a99e68b2b1201491131e8a9764f68da272cd0dc29ad88090ac138a21aa50ec0a1bff37e5165", 0x98}, {&(0x7f0000001600)="b01a9cc8a2623573bda5851e5e6d15b76982e28bea64802b907d", 0x1a}], 0x3, 0xfff, 0x4) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x81, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000016c0)=0x9) recvfrom$inet(r2, &(0x7f0000001700)=""/122, 0x7a, 0x40002002, &(0x7f0000001780)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0), 0x80200, 0x0) pipe2(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c800) (async) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000001840)=0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f0000001880)=r5) (async) fsetxattr$security_evm(r0, &(0x7f00000018c0), &(0x7f0000001900)=@v1={0x2, "69526058cb22b56f21726c11b67716"}, 0x10, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001940)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001b40)={{r6, 0x81, 0x0, 0x2, 0x0, 0x1ff, 0x6, 0x1, 0x8001, 0x3, 0x20, 0x2, 0x8001, 0x8001, 0x4}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) r9 = open(&(0x7f0000001c00)='./file0\x00', 0x8201, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r9, 0xf502, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000002040), 0x100000, 0x0) ioctl$KDENABIO(r10, 0x4b36) (async) r11 = syz_open_procfs(0x0, &(0x7f0000002080)='net/netfilter\x00') close(r11) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f00000020c0)={r7, r6, "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", "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"}) (async) r12 = open(&(0x7f00000030c0)='./file0\x00', 0x80400, 0x1dc) write$binfmt_elf32(r12, &(0x7f0000003100)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x40, 0x9, 0x81, 0x7, 0x2, 0x3e, 0x1, 0x12a, 0x38, 0x39b, 0x1, 0x4, 0x20, 0x1, 0x7, 0x4, 0x5}, [{0x6, 0x40, 0x6, 0x6, 0x9, 0x46f, 0x993, 0x200}, {0x6, 0x9, 0x9, 0x1, 0x5, 0x7, 0xfffff000, 0x80}], "bdb86bdbc2608f97688a950160514dc7e76e8183d4aa0029c41a349cc7c1eaa3", ['\x00', '\x00', '\x00']}, 0x398) (async) r13 = openat$incfs(r2, &(0x7f00000034c0)='.pending_reads\x00', 0x181200, 0x18) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r13, 0x5000943f, &(0x7f0000003500)={{r3}, r8, 0x2, @unused=[0x8000000000000000, 0x4, 0x1bc7e28d, 0x4], @name="a28b9f582c4808f3de760b7cebf065019c79f5e047d34d57958e90168ef1aed2eb871bc2275b13f69a7d2c704c170842fbeb800df15b8ebed76f5d10dd69ecbc87a3e3864d6465854ca7447f0f4ff761d9ad3614316a889e0dbcba10e8464e389d5c0c2f37279a665fc2248c7b3e82051f37e73aa0a2cb81066eadf112eb7ac25a96ab439c21abaa932839922b2c02f8098bb075e30d3f0b907240f3f07e210a8a22d4effaa70ccabca095feda356c20744feec92d679ed5a27ec99b7401aa4b06c040ae1bc7a6cf4d46d39adb834a9d0b005abb6b670b49960e92356cd6c32ee8e1cd11adb99b944685ca55a55f331f1e52d44093234c0d0e523c8b7cf58fd23e1c6888a1be510b6547c696ee686f6eb4c589d3ec469fc3ffd47621282872118d6dcef2876c2e17273c647f152de8d8715a888dc9df13d7a2970f047e982253082fe45ce38a36a4787d7f06f4d881ee486f396da355fde9565dd67344bbb7ec7196f601ae013c4813e7931cfd20f40fcbd37b1e5c48a13cd219772ff31f4a0ece3089ab746178c8675a0e4f67948cecd0164f55f70ec1335e793963cc3d6ca0e8acacf759b8970f2649848a28e7db70bd1c6e54f1770532c7f5a46ccf2d3aa651c19b515df56e0aa3ba89904733e00e74563ab8231b15f7d3b5455215ceb46a5bc36b357dcbf6a3b220a49395bd238b15576350e658bac55961ba661d664ad73ba7925f3e3dc99dad802a9cc8bab34a7f4f10c866306ef0bf475e5fecc712917e64a031fe3b2275de9b934cb56fe29617c38dad31d489e35c91ad1bf4f65318d43a10b8cb8fd4003d0c74b04a9d461f829535bb8d1d315e1bde00a545ba132479e8c865b6ab49db6061dac163a9bd546567763ed5fb58d2d7a4fe210eabf2df96e696a3796f3e3cbafe8ac446fb6146f94f3d7a06031f4f37c56bebb853511490b39c9dba5d940ddba3f849b2c39f454d1fc0de62e257a4cbe05a6dd1762078cdca4ba57b8cdd65f4eb821fab523259de38fc3bf42877757950ab9c7cc2f53ba41f9ad7dacfc6a8200d48717e17c6bef50b384e42bcd78616f2149412b7c8aeadea465ef7f3227666ef5f949b8987be262a70bfc7dd126c1c771c9f9e7306b90ac0fd2c8f0cffbc3692e239e336651d91d81f0b980a85b88470d0ff23799dcb78e5d53b67cd69cf6926e6527a2815726ba97aa4dc189de2537997f0a5d96f853beb1ed679df2997a6e175ef0db429c8e903bbb4ac566e48afd68302ead6bb4ac1345afdaa04137f0f3c23134ff683633a1f745f838d47e1d3c902095d684f6975deac20053ca897cdb7cb5fc439429983c9213ff3b746ea6bb1163d046aaf10db43206fdf9f2b6a8c5efd578dc585eb4c48e8a7ee1cc9b07f6c1a753ff660018a67e4709d6cf0decf87a0133108aec551f37592e69c0224225a7114aeeab8af6aa2029207daccfdd09b7d3c7bee2785ca1c3e37d5fd25ea6c0b5b2ec1d62fd880c17bceb535e8b626a50863d27f817a1045792048a504d2727ce5f80898a0c0e0fc0e9dd78fad37d9280466bd4704b322db35bc942193c231238d03b8c5ff5119fd09b9e1a5b64b637e1660aa5923efd44cb38406e8cfe8de044161b72046a72c8a35baf0cecb4de343233971cd6dd30e4fe18bd233e77011bc57180aa20f589d4bd73fef578d85ed48794da6a388d2ffaa99393e379bc376cd5c111ad85ebc824b2fd8eb3c93a74c45737ae6c2be15785182f66a3772020f8b800b0280a51bd2e2ec61172d5883af09306171a03d5a50c7e2ea73bcbc27a33a725866821c3e79ee902fef7aaaddc81aa324d84d2f05ce2b8065755e7f98de2b084fb29b66f54f16c1b9c4b3621ad6ee2b0781f4300e117cfc6ff62caa6107d2428426c8bb259aaa1d54f00f4e25e0baed6310cf5696cb194b515aae16c32aedbc161e85f6b29d683a2cafb697f9b190b8288d4084257b8abdd097f412d2c27f1db5d3b0122eb0d178439105a5067bc13e25981c3ed7804c96cec4758750bdb44246b30f98e5b8e38b48593b035196f80ed24020147b0218efb3588c3ae0ff85381f261629c4bd1d80131868ce41a5ecbd6ac543a048bf3e00db2e5a85437dcf485e50a20c8049d24f2cfa7eb7813e329fcf0186e4e03b46426fee5f0e2c4cb2128dcac00ab238fce8e7261b5489df6f9a3692a91ca0089a2e83e63665168fde57a88e885e0b49ee9b6004a0c90cf7db8296143887b33d38bdb0d68d64e186f1646afee1f5ba75f5ec99dce70b79e9a7e5738dd48d0d190f3c03f0f334707f51ce9b4ec87ec138ceab522c26ace65ea82a3805460bc0cfdca01029d5a103040dbf79febc1904e6f75973057faa3978cbe3f034542b227429f2c1e996d8178260b947bd39dc1fd48ee96d5d71ad6178c21bff8db8c3bac1eda01f69edfe347423fcc79740722e780bd1d1590ed79d5e15e5e3784a05fe1071a287fce750ad46e74e748a0cebccd2f5f8f0aafaa76886a009ba2bbd761ad02b5e2160e2eec83e964ba97111de812b138631c77ce4fb74c5ffb8315393095dd236271fc1dfcb573b80b40ef0659eec38721abf7addb15c02583e6a4d9dd75ccbe5069877a3d99777e68516ba5459952a9ad5dd2f1113eab652d60b3b3b458157e06056980fafb45b004cf5a91306fba93e2c7e9bd0fc8b2375a6e97dcd4cedb93320b1abbe8a1267f7ddd46b3b5ad7919664c38cef77f23015406d2eca2b81e36750a0b0e1b20bba4f09b8f07ac5cd917ee2d037bbb9d16fc4ca1614cfa73820e0431c7335d84f35d93984836a6122fb1a4fd601e6b0c52c4c89071b65edb936dc68c56ce09a1d7ccbb9948a78b5cf89b5348da1eecb6e850de690c8e36b1869c3bc66324a651dc8e7bcc9c3a32ffe5c73b85c643385c14c688cca868ce19a1bc6debd015de380ade425ce5b175127dee64e8fed0385b814a545f8ae3825ddec13a17444bd5b80a461a8e177cde7a9abf8df844ff8e20b3746e80bfb9a8f9fd7998934ec5c5dc5fd441d9715ee74426a3f077cab22ee1e4f9292f6124a1ca1292d2562e3b160dae3cb042f4889173b881938c17bb8b56694fe0b155b1f789395416cf2276d7568579a132163e840206e7c4437ac2aca59f12ddcde45fd93d40a946ed604a83b0aa00b129295d50876e3730c6ac95a9480796ede7f8f44393dc30b44247705ebbd84a64b4521204ce512aae2e870a55865016c000ebfadecdfc24a9eca65b8702c28cccb1f6de8b8fa02d6202e1393c22738c875748c7e641d9e7bdda55a98a7a9bd14ffcc3cb505ec6cec20ec959fbbf966915d70d45928c2ca65e236e09a496d07883051e37b0b1bd5ddbe9b1cad43fc8a5e8c6657919e1208cd58c17218367857e0b8f9ea7dc6a22509600518e7d123c4b676702a1f4b4678915fc95c777a2a9e03a1825cb136541443ed9f40940d6333213651cc1fe5e2208eb1af64544f2d4c1a15c66ab4b5a22d6a1f9b033b582cbb2da64e5da86a9801cfd2dc475bde26593e2386f24cf93d1336120aa600335e8046f59060e2c3c1a90425b728546cfc7757424abaea1ccbd327cfd014eff71cd2c4147a104ca12f4d624a92c922b012b50a24f088847b7e5da51bd6861f8ae0f0f2e3dfef1420d8da45f39464ebe2f801724cf9dfeea06037ee52df8c0a5dd4f6461c1b322a6e3cc8d5b28ccd2fbd38c42025e8e88a29b278fff38424ab09ce7aed19f9354e9374de9243f0e582cb0be3462850098690fa86c029bcf5f8d983e1e3ab3f86cb17e16904c76262fc687e08ea85d1877b472a2dc7214ccce22f8ed0e4fb50bb828e2268b5b8325d9b15b2c4dc03ad1fb4c991db001201a84760867435261060f9548d3cb69e0bf861005570d8c4bc3cd1ead5d8084b7eff367a2db8eb3435d10eee236a3999f6bb07db162984763e19771d4bdbe2c5a06fdeba01fa836d9d69337db10c401af73d89574fb6e6e67763516d10ac919af6bc947ca24092e96aed1c598512cc7b1f7ec1292aec028479b5f78a044be7b0bceef96c5b66dff1dc3e192b636c7c13cae477c8e17a418c3d3b7f1080e6aabd23322695bea4c52ee596d56aebfd16ca593c95d8319b450d86e1ee49964bffc15683a8a903d459bab5ce6ea42f76646584559da19698e0afe7f48bb883ce8af05c011ef6cf0f655a592ab03e11900ffd01e7164f36170136decbc69d64002751d5dfa0979f1051425b3fbdc7d15e33c28519dec0b7672c2f118d269c7a969cbcb7f2c985c50be648eedc8818636637d2a8f579601931596e90e70763036657d9d98bc96a0e3860d5435dff5a3eda8d912af5bf0b071b1049d7521ed6ab1b2bdc1e3296b5127c5d34431fcde96edf7e6ee1529bbad6e06318dbb7e6596dbb25d62220b21fa971e193e55b78b93408709fd9115bf5e3b2a829abc75ae4ff8b3b4c27b9dc939ba68fbb9d89ddae5de3313d8746e3394ac9c9b5b76a1153c79118ed5078c775c8237e25fd9b02c623db3f93254265a0ab7621539aa36ecedb1dc843f18fb27197ddb4fce21262c781588017be8cbe57bbef354d43e45362b610839322adf0e5c92431fa6c2d5f3b7bf643173657abac7be639a14ce2cfb74d9188f0b77ef362a19a136cb5dca507067e5dff1fb35b478db090b8d06a23b2452a88849f8a240831fd2da92a12752accb91f893675a17b2feb3c0df4f72690363eed8e397256467f3c4220aad1a7ab1262b936d48033eb26eb401971150aa2c2772bfc6d17ccc872c21499eaeaa609c4a6541c922afbc8492de720ac5d79c49416ce110eb7cb5cf0671f4693df450bf03fa6338ab0112b4a818c061feef6ed5aee7e27f91bc28579dcb234a3d4c39666940d386b11a1f161cba8f7daf42606120a8cfc811eaec1068a67fd91b3cfd23a57309227695794ecd969f1376122e3ae2c16a449e4217dfc801e1ae3194e3f60cddadcd0b78521800f32b7dc5a76f5867ab79a9bde01af80d5a1ee6fba86fe2eb1f70c46541f8afa824afa60419528d6906fba003ea92a57f20aeae281a835425528896bb5d95b1f32340c75f1afda2af30af469d70c408c802e974cb2bef8ef6a0072a818320eaeac6b53aed06d2242af1e71299d05f9f60d332ff5f92d6e09f949d3f2e778e5facc30a481f14da9701b802ea75b950a01a9032a7dabb8b79e21a8f807cec2d27800b0f799b1b5f0271c1bc565206623a7a7b6d026edd865cdd95c5f7a94d59865ddf58eec8a2d31528c6a2f581d314b62435e8d5353ae5b0e83a9650ddd149274afb413c5ec98ce5e76a4574c03fdf33b7c95067b150f7fc7df699dea2c1d6b46c635d684f46d16d178ba2b54972d4e45fe342f53de219ad1c50ddddd017fac25a1283b92dd89621cf6f5e99cf9c6b767af7e2c0dc309178157a72d47bf95641a8c404ece36e45e46c6e84b375b9aa380502ca03ad42c2ad06d0a414b14838827c6217a791c6a0c89785ab8f19b7bd3a9c118213053d873a0a0ae3e2485e592a987c5049918ac7398927de85d16efa9e327765bb7f71c196390a5b6a348d7c4f63db7f822a43ceef68bb0e26a5e15420fbb215ac8405dc853e153f045990c8c0fe8c127e6318f9adcf8d6ca77475d485a7977df789393f1d8a6a8fc5a54e67a794a630beacc184272dd95b81cd83a05f994f547f20af8890d04a92e085d2f4874c882b4f472036a6e450763b8acb196"}) (async) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x30, r13, 0x7924b000) (async) fchownat(r13, &(0x7f0000004500)='./file0\x00', 0xee01, 0x0, 0x1000) D0312 10:47:44.858908 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:44.859727 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.893649 465088 usertrap_amd64.go:212] [ 58840: 58840] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:44.893777 465088 usertrap_amd64.go:122] [ 58840: 58840] Allocate a new trap: 0xc007ec8de0 40 D0312 10:47:44.894163 465088 usertrap_amd64.go:225] [ 58840: 58840] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:44.898992 465088 usertrap_amd64.go:212] [ 58840: 58840] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:44.899056 465088 usertrap_amd64.go:122] [ 58840: 58840] Allocate a new trap: 0xc007ec8de0 41 D0312 10:47:44.899125 465088 usertrap_amd64.go:225] [ 58840: 58840] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:44.911068 465088 usertrap_amd64.go:212] [ 58841: 58841] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:44.911676 465088 usertrap_amd64.go:122] [ 58841: 58841] Allocate a new trap: 0xc006f3ec60 40 D0312 10:47:44.915885 465088 usertrap_amd64.go:225] [ 58841: 58841] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:44.918851 465088 usertrap_amd64.go:212] [ 58841: 58841] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:44.918919 465088 usertrap_amd64.go:122] [ 58841: 58841] Allocate a new trap: 0xc006f3ec60 41 D0312 10:47:44.919013 465088 usertrap_amd64.go:225] [ 58841: 58841] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:44.923715 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.924329 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.924578 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.926934 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.928649 465088 usertrap_amd64.go:212] [ 58839: 58839] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:44.928747 465088 usertrap_amd64.go:122] [ 58839: 58839] Allocate a new trap: 0xc0032faff0 40 D0312 10:47:44.929521 465088 usertrap_amd64.go:225] [ 58839: 58839] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:44.937657 465088 usertrap_amd64.go:212] [ 58839: 58839] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:44.937777 465088 usertrap_amd64.go:122] [ 58839: 58839] Allocate a new trap: 0xc0032faff0 41 D0312 10:47:44.937860 465088 usertrap_amd64.go:225] [ 58839: 58839] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:44.952295 465088 usertrap_amd64.go:212] [ 58840: 58840] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:44.952412 465088 usertrap_amd64.go:122] [ 58840: 58840] Allocate a new trap: 0xc007ec8de0 42 D0312 10:47:44.952482 465088 usertrap_amd64.go:225] [ 58840: 58840] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:44.967675 465088 usertrap_amd64.go:212] [ 58841: 58841] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:44.967783 465088 usertrap_amd64.go:122] [ 58841: 58841] Allocate a new trap: 0xc006f3ec60 42 D0312 10:47:44.967855 465088 usertrap_amd64.go:225] [ 58841: 58841] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:44.972079 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.974740 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:44.984611 465088 usertrap_amd64.go:212] [ 58842: 58842] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:44.984754 465088 usertrap_amd64.go:122] [ 58842: 58842] Allocate a new trap: 0xc007ec8e10 39 D0312 10:47:44.988334 465088 usertrap_amd64.go:225] [ 58842: 58842] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:44.992605 465088 usertrap_amd64.go:212] [ 58842: 58842] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:44.992676 465088 usertrap_amd64.go:122] [ 58842: 58842] Allocate a new trap: 0xc007ec8e10 40 D0312 10:47:44.992768 465088 usertrap_amd64.go:225] [ 58842: 58842] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:44.996651 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:44.997106 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.016459 465088 usertrap_amd64.go:212] [ 58842: 58842] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:45.016547 465088 usertrap_amd64.go:122] [ 58842: 58842] Allocate a new trap: 0xc007ec8e10 41 D0312 10:47:45.016627 465088 usertrap_amd64.go:225] [ 58842: 58842] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:45.017931 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.018338 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.031782 465088 usertrap_amd64.go:212] [ 58840: 58840] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:45.031867 465088 usertrap_amd64.go:122] [ 58840: 58840] Allocate a new trap: 0xc007ec8de0 43 D0312 10:47:45.031928 465088 usertrap_amd64.go:225] [ 58840: 58840] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:45.032181 465088 usertrap_amd64.go:212] [ 58839: 58839] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:45.032249 465088 usertrap_amd64.go:122] [ 58839: 58839] Allocate a new trap: 0xc0032faff0 42 D0312 10:47:45.032301 465088 usertrap_amd64.go:225] [ 58839: 58839] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:45.053591 465088 usertrap_amd64.go:212] [ 58840: 58840] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:45.053683 465088 usertrap_amd64.go:122] [ 58840: 58840] Allocate a new trap: 0xc007ec8de0 44 D0312 10:47:45.053790 465088 usertrap_amd64.go:225] [ 58840: 58840] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:45.063975 465088 task_exit.go:204] [ 58840: 58840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.064171 465088 task_signals.go:204] [ 58840: 58845] Signal 58840, PID: 58845, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.064232 465088 task_signals.go:204] [ 58840: 58843] Signal 58840, PID: 58843, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.064392 465088 task_signals.go:204] [ 58840: 58846] Signal 58840, PID: 58846, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.064446 465088 task_signals.go:204] [ 58840: 58849] Signal 58840, PID: 58849, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.064521 465088 task_exit.go:204] [ 58840: 58849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.064680 465088 task_exit.go:204] [ 58840: 58843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.064897 465088 task_exit.go:204] [ 58840: 58846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.065202 465088 task_exit.go:204] [ 58840: 58845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.065519 465088 task_exit.go:204] [ 58840: 58845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.065575 465088 task_exit.go:204] [ 58840: 58845] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.065837 465088 task_exit.go:204] [ 58840: 58840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.065961 465088 task_exit.go:204] [ 58840: 58846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.066028 465088 task_exit.go:204] [ 58840: 58846] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.066187 465088 task_exit.go:204] [ 58840: 58849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.066233 465088 task_exit.go:204] [ 58840: 58849] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.069337 465088 task_exit.go:204] [ 58840: 58843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.069480 465088 task_exit.go:204] [ 58840: 58843] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.069722 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:45.069952 465088 task_exit.go:204] [ 58840: 58840] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.071052 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.071763 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:45 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x100020, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_fscache}, {@version_9p2000}, {@mmap}, {@privport}, {@noextend}], [{@euid_lt={'euid<', 0xee00}}]}}) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:45.078645 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.079490 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.091315 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.091699 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.098481 465088 usertrap_amd64.go:212] [ 58841: 58844] Found the pattern at ip 5652f292a27d:sysno 257 D0312 10:47:45.098617 465088 usertrap_amd64.go:122] [ 58841: 58844] Allocate a new trap: 0xc006f3ec60 43 D0312 10:47:45.098756 465088 usertrap_amd64.go:225] [ 58841: 58844] Apply the binary patch addr 5652f292a27d trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:45.099791 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.100705 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.102893 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.103683 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.121238 465088 usertrap_amd64.go:212] [ 58841: 58841] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:45.121361 465088 usertrap_amd64.go:122] [ 58841: 58841] Allocate a new trap: 0xc006f3ec60 44 D0312 10:47:45.121514 465088 usertrap_amd64.go:225] [ 58841: 58841] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:45.124649 465088 task_exit.go:204] [ 58841: 58841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.124806 465088 task_signals.go:204] [ 58841: 58850] Signal 58841, PID: 58850, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.124840 465088 task_signals.go:204] [ 58841: 58844] Signal 58841, PID: 58844, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.124888 465088 task_exit.go:204] [ 58841: 58850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.125109 465088 task_exit.go:204] [ 58841: 58850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.125153 465088 task_exit.go:204] [ 58841: 58850] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.125257 465088 task_signals.go:204] [ 58841: 58847] Signal 58841, PID: 58847, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.125361 465088 task_exit.go:204] [ 58841: 58844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.125597 465088 task_exit.go:204] [ 58841: 58847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.125747 465088 task_exit.go:204] [ 58841: 58841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.125901 465088 task_exit.go:204] [ 58841: 58844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.125942 465088 task_exit.go:204] [ 58841: 58844] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.131508 465088 task_exit.go:204] [ 58841: 58847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.131575 465088 task_exit.go:204] [ 58841: 58847] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.131673 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 10:47:45 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='#%\x00', 0x7) r1 = signalfd4(r0, &(0x7f0000000100)={[0x80000000000000]}, 0x8, 0x80000) close_range(r1, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) D0312 10:47:45.134294 465088 task_exit.go:204] [ 58841: 58841] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.137964 465088 usertrap_amd64.go:212] [ 58839: 58839] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:45.138087 465088 usertrap_amd64.go:122] [ 58839: 58839] Allocate a new trap: 0xc0032faff0 43 D0312 10:47:45.138165 465088 usertrap_amd64.go:225] [ 58839: 58839] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:45.141487 465088 task_exit.go:204] [ 58839: 58839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.141734 465088 task_exit.go:204] [ 58839: 58839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.141939 465088 task_signals.go:204] [ 58839: 58851] Signal 58839, PID: 58851, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.142037 465088 task_exit.go:204] [ 58839: 58851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.142251 465088 task_exit.go:204] [ 58839: 58851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.142321 465088 task_exit.go:204] [ 58839: 58851] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.142683 465088 task_signals.go:204] [ 58839: 58852] Signal 58839, PID: 58852, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.142804 465088 task_exit.go:204] [ 58839: 58852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.146455 465088 task_exit.go:204] [ 58839: 58852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.146528 465088 task_exit.go:204] [ 58839: 58852] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.146646 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:45.146853 465088 usertrap_amd64.go:212] [ 58853: 58853] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:45.146963 465088 usertrap_amd64.go:122] [ 58853: 58853] Allocate a new trap: 0xc007ec8f60 40 D0312 10:47:45.147251 465088 task_exit.go:204] [ 58839: 58839] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.148263 465088 usertrap_amd64.go:225] [ 58853: 58853] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) 10:47:45 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x101) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffedc6) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x306) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x200) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xc2b) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) (async, rerun: 64) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) (async, rerun: 64) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2c56) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000000) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x400) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) (async, rerun: 64) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xab9e) (rerun: 64) D0312 10:47:45.155567 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.156057 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.160606 465088 usertrap_amd64.go:212] [ 58853: 58853] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:45.160733 465088 usertrap_amd64.go:122] [ 58853: 58853] Allocate a new trap: 0xc007ec8f60 41 D0312 10:47:45.160819 465088 usertrap_amd64.go:225] [ 58853: 58853] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:45.162442 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.163112 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.177029 465088 usertrap_amd64.go:212] [ 58842: 58842] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:45.177152 465088 usertrap_amd64.go:122] [ 58842: 58842] Allocate a new trap: 0xc007ec8e10 42 D0312 10:47:45.177233 465088 usertrap_amd64.go:225] [ 58842: 58842] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:45.180918 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.181459 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.207337 465088 usertrap_amd64.go:212] [ 58856: 58856] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:45.207442 465088 usertrap_amd64.go:122] [ 58856: 58856] Allocate a new trap: 0xc00ade4ff0 40 D0312 10:47:45.207921 465088 usertrap_amd64.go:225] [ 58856: 58856] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:45.212556 465088 usertrap_amd64.go:212] [ 58856: 58856] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:45.212682 465088 usertrap_amd64.go:122] [ 58856: 58856] Allocate a new trap: 0xc00ade4ff0 41 D0312 10:47:45.212750 465088 usertrap_amd64.go:225] [ 58856: 58856] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:45.216024 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.216317 465088 usertrap_amd64.go:212] [ 58855: 58855] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:45.216539 465088 usertrap_amd64.go:122] [ 58855: 58855] Allocate a new trap: 0xc007f0cc90 40 D0312 10:47:45.216908 465088 usertrap_amd64.go:225] [ 58855: 58855] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:45.217094 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.219151 465088 usertrap_amd64.go:212] [ 58855: 58855] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:45.219215 465088 usertrap_amd64.go:122] [ 58855: 58855] Allocate a new trap: 0xc007f0cc90 41 D0312 10:47:45.219272 465088 usertrap_amd64.go:225] [ 58855: 58855] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:45.222436 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.225050 465088 usertrap_amd64.go:212] [ 58853: 58853] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:45.225142 465088 usertrap_amd64.go:122] [ 58853: 58853] Allocate a new trap: 0xc007ec8f60 42 D0312 10:47:45.225244 465088 usertrap_amd64.go:225] [ 58853: 58853] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:45.225320 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.230235 465088 usertrap_amd64.go:212] [ 58856: 58856] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:45.230344 465088 usertrap_amd64.go:122] [ 58856: 58856] Allocate a new trap: 0xc00ade4ff0 42 D0312 10:47:45.230513 465088 usertrap_amd64.go:225] [ 58856: 58856] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:45.266291 465088 usertrap_amd64.go:212] [ 58855: 58855] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:45.266433 465088 usertrap_amd64.go:122] [ 58855: 58855] Allocate a new trap: 0xc007f0cc90 42 D0312 10:47:45.266503 465088 usertrap_amd64.go:225] [ 58855: 58855] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:45.308165 465088 usertrap_amd64.go:212] [ 58853: 58853] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:45.308293 465088 usertrap_amd64.go:122] [ 58853: 58853] Allocate a new trap: 0xc007ec8f60 43 D0312 10:47:45.308383 465088 usertrap_amd64.go:225] [ 58853: 58853] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:45.325586 465088 task_exit.go:204] [ 58853: 58853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.325936 465088 task_signals.go:204] [ 58853: 58858] Signal 58853, PID: 58858, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.326071 465088 task_exit.go:204] [ 58853: 58858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.326876 465088 task_exit.go:204] [ 58853: 58853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.328919 465088 task_exit.go:204] [ 58853: 58858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.329057 465088 task_exit.go:204] [ 58853: 58858] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.329138 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:45.330489 465088 usertrap_amd64.go:212] [ 58855: 58855] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:45.330620 465088 usertrap_amd64.go:122] [ 58855: 58855] Allocate a new trap: 0xc007f0cc90 43 D0312 10:47:45.330566 465088 task_exit.go:204] [ 58853: 58853] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.330702 465088 usertrap_amd64.go:225] [ 58855: 58855] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) 10:47:45 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x100020, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_fscache}, {@version_9p2000}, {@mmap}, {@privport}, {@noextend}], [{@euid_lt={'euid<', 0xee00}}]}}) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x100020, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_fscache}, {@version_9p2000}, {@mmap}, {@privport}, {@noextend}], [{@euid_lt={'euid<', 0xee00}}]}}) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) D0312 10:47:45.343682 465088 task_exit.go:204] [ 58855: 58855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.343898 465088 task_exit.go:204] [ 58855: 58855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.344167 465088 task_signals.go:204] [ 58855: 58859] Signal 58855, PID: 58859, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.344273 465088 task_exit.go:204] [ 58855: 58859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.346542 465088 task_exit.go:204] [ 58855: 58859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.346585 465088 task_exit.go:204] [ 58855: 58859] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.346681 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:45.347448 465088 task_exit.go:204] [ 58855: 58855] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.364182 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.365737 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.374889 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.375355 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.403413 465088 usertrap_amd64.go:212] [ 58863: 58863] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:45.403547 465088 usertrap_amd64.go:122] [ 58863: 58863] Allocate a new trap: 0xc00d0201e0 40 D0312 10:47:45.404091 465088 usertrap_amd64.go:225] [ 58863: 58863] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:45.406256 465088 usertrap_amd64.go:212] [ 58863: 58863] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:45.406397 465088 usertrap_amd64.go:122] [ 58863: 58863] Allocate a new trap: 0xc00d0201e0 41 D0312 10:47:45.406504 465088 usertrap_amd64.go:225] [ 58863: 58863] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:45.410763 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.411112 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.413436 465088 usertrap_amd64.go:212] [ 58856: 58856] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:45.413497 465088 usertrap_amd64.go:122] [ 58856: 58856] Allocate a new trap: 0xc00ade4ff0 43 D0312 10:47:45.413562 465088 usertrap_amd64.go:225] [ 58856: 58856] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:45.419329 465088 task_exit.go:204] [ 58856: 58856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.419517 465088 task_signals.go:204] [ 58856: 58860] Signal 58856, PID: 58860, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.419625 465088 task_exit.go:204] [ 58856: 58856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.419751 465088 task_signals.go:204] [ 58856: 58857] Signal 58856, PID: 58857, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.419776 465088 task_signals.go:204] [ 58856: 58864] Signal 58856, PID: 58864, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.419838 465088 task_exit.go:204] [ 58856: 58857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.420036 465088 task_exit.go:204] [ 58856: 58857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.420071 465088 task_exit.go:204] [ 58856: 58857] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.420181 465088 task_exit.go:204] [ 58856: 58864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.421068 465088 task_exit.go:204] [ 58856: 58860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.421273 465088 task_exit.go:204] [ 58856: 58860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.421321 465088 task_exit.go:204] [ 58856: 58860] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.421501 465088 task_signals.go:204] [ 58856: 58861] Signal 58856, PID: 58861, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.421577 465088 task_signals.go:204] [ 58856: 58862] Signal 58856, PID: 58862, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.421649 465088 task_exit.go:204] [ 58856: 58862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.421835 465088 task_exit.go:204] [ 58856: 58862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.421872 465088 task_exit.go:204] [ 58856: 58862] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.421988 465088 task_exit.go:204] [ 58856: 58864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.422028 465088 task_exit.go:204] [ 58856: 58864] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.422105 465088 task_exit.go:204] [ 58856: 58861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.425086 465088 task_exit.go:204] [ 58856: 58861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.425189 465088 task_exit.go:204] [ 58856: 58861] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.425275 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:45.429264 465088 task_exit.go:204] [ 58856: 58856] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.453344 465088 usertrap_amd64.go:212] [ 58863: 58863] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:45.453419 465088 usertrap_amd64.go:122] [ 58863: 58863] Allocate a new trap: 0xc00d0201e0 42 D0312 10:47:45.453477 465088 usertrap_amd64.go:225] [ 58863: 58863] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:45.464046 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.464443 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.502461 465088 usertrap_amd64.go:212] [ 58863: 58863] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:45.502619 465088 usertrap_amd64.go:122] [ 58863: 58863] Allocate a new trap: 0xc00d0201e0 43 D0312 10:47:45.502734 465088 usertrap_amd64.go:225] [ 58863: 58863] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:45.537488 465088 usertrap_amd64.go:212] [ 58863: 58863] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:45.537639 465088 usertrap_amd64.go:122] [ 58863: 58863] Allocate a new trap: 0xc00d0201e0 44 D0312 10:47:45.537725 465088 usertrap_amd64.go:225] [ 58863: 58863] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:45.561499 465088 task_exit.go:204] [ 58863: 58863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.561720 465088 task_exit.go:204] [ 58863: 58863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.561690 465088 task_signals.go:204] [ 58863: 58865] Signal 58863, PID: 58865, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.561827 465088 task_exit.go:204] [ 58863: 58865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.562023 465088 task_exit.go:204] [ 58863: 58865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.562080 465088 task_exit.go:204] [ 58863: 58865] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.562426 465088 task_signals.go:204] [ 58863: 58866] Signal 58863, PID: 58866, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.562544 465088 task_exit.go:204] [ 58863: 58866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.564853 465088 task_exit.go:204] [ 58863: 58866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.564922 465088 task_exit.go:204] [ 58863: 58866] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.565023 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:45.571193 465088 task_exit.go:204] [ 58863: 58863] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.593311 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:45.597352 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.840309 465088 usertrap_amd64.go:212] [ 58842: 58842] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:45.840403 465088 usertrap_amd64.go:122] [ 58842: 58842] Allocate a new trap: 0xc007ec8e10 43 D0312 10:47:45.840495 465088 usertrap_amd64.go:225] [ 58842: 58842] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:45.843079 465088 task_exit.go:204] [ 58842: 58842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.843304 465088 task_exit.go:204] [ 58842: 58842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.843301 465088 task_signals.go:204] [ 58842: 58854] Signal 58842, PID: 58854, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.843444 465088 task_exit.go:204] [ 58842: 58854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.843666 465088 task_signals.go:204] [ 58842: 58848] Signal 58842, PID: 58848, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:45.843674 465088 task_exit.go:204] [ 58842: 58854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.843745 465088 task_exit.go:204] [ 58842: 58854] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.843913 465088 task_exit.go:204] [ 58842: 58848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:45.846731 465088 task_exit.go:204] [ 58842: 58848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:45.846830 465088 task_exit.go:204] [ 58842: 58848] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:45.846980 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:45.850178 465088 task_exit.go:204] [ 58842: 58842] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(0xffffffffffffffff, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:45.864103 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} 10:47:45 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x100020, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_fscache}, {@version_9p2000}, {@mmap}, {@privport}, {@noextend}], [{@euid_lt={'euid<', 0xee00}}]}}) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:45.865226 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:45 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='#%\x00', 0x7) r1 = signalfd4(r0, &(0x7f0000000100)={[0x80000000000000]}, 0x8, 0x80000) close_range(r1, r1, 0x0) (async, rerun: 64) socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) getsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:47:45 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(r1, 0x0, 0x0, 0xffffffff, 0x400) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x88800) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x101000, 0x15) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) faccessat2(r6, &(0x7f0000000000)='\x00', 0x3, 0x1100) write$P9_RSETATTR(r6, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0x7) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000080)={0x1, 0x1, 0x1000, 0x0, 0x0, 0xff56, 0x0, 0x0}) close(r7) write$P9_RSETATTR(r3, &(0x7f0000000100)={0x7, 0x1b, 0x1}, 0x7) accept(r4, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r8, r4) D0312 10:47:45.932144 465088 usertrap_amd64.go:212] [ 58869: 58869] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:45.932296 465088 usertrap_amd64.go:122] [ 58869: 58869] Allocate a new trap: 0xc00e7ba9f0 40 D0312 10:47:45.934658 465088 usertrap_amd64.go:225] [ 58869: 58869] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:45.950045 465088 usertrap_amd64.go:212] [ 58869: 58869] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:45.950151 465088 usertrap_amd64.go:122] [ 58869: 58869] Allocate a new trap: 0xc00e7ba9f0 41 D0312 10:47:45.950246 465088 usertrap_amd64.go:225] [ 58869: 58869] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:45.953017 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.956863 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.968078 465088 usertrap_amd64.go:212] [ 58868: 58868] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:45.968272 465088 usertrap_amd64.go:122] [ 58868: 58868] Allocate a new trap: 0xc007ec93b0 39 D0312 10:47:45.968693 465088 usertrap_amd64.go:225] [ 58868: 58868] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:45.970629 465088 usertrap_amd64.go:212] [ 58868: 58868] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:45.970682 465088 usertrap_amd64.go:122] [ 58868: 58868] Allocate a new trap: 0xc007ec93b0 40 D0312 10:47:45.970759 465088 usertrap_amd64.go:225] [ 58868: 58868] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:45.972362 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.976484 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:45.982949 465088 usertrap_amd64.go:212] [ 58870: 58870] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:45.983059 465088 usertrap_amd64.go:122] [ 58870: 58870] Allocate a new trap: 0xc0032fb320 40 D0312 10:47:45.983515 465088 usertrap_amd64.go:225] [ 58870: 58870] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:45.984931 465088 usertrap_amd64.go:212] [ 58870: 58870] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:45.985008 465088 usertrap_amd64.go:122] [ 58870: 58870] Allocate a new trap: 0xc0032fb320 41 D0312 10:47:45.985062 465088 usertrap_amd64.go:225] [ 58870: 58870] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:45.986627 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:45.991812 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.001334 465088 usertrap_amd64.go:212] [ 58867: 58867] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:46.001480 465088 usertrap_amd64.go:122] [ 58867: 58867] Allocate a new trap: 0xc00ff86b40 40 D0312 10:47:46.002028 465088 usertrap_amd64.go:225] [ 58867: 58867] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:46.004527 465088 usertrap_amd64.go:212] [ 58867: 58867] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:46.004683 465088 usertrap_amd64.go:122] [ 58867: 58867] Allocate a new trap: 0xc00ff86b40 41 D0312 10:47:46.004797 465088 usertrap_amd64.go:225] [ 58867: 58867] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:46.007056 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.007433 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.009542 465088 usertrap_amd64.go:212] [ 58870: 58870] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:46.009669 465088 usertrap_amd64.go:122] [ 58870: 58870] Allocate a new trap: 0xc0032fb320 42 D0312 10:47:46.009756 465088 usertrap_amd64.go:225] [ 58870: 58870] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:46.010283 465088 usertrap_amd64.go:212] [ 58869: 58869] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:46.010371 465088 usertrap_amd64.go:122] [ 58869: 58869] Allocate a new trap: 0xc00e7ba9f0 42 D0312 10:47:46.010464 465088 usertrap_amd64.go:225] [ 58869: 58869] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:46.019580 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.023163 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.031086 465088 usertrap_amd64.go:212] [ 58870: 58870] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:46.031204 465088 usertrap_amd64.go:122] [ 58870: 58870] Allocate a new trap: 0xc0032fb320 43 D0312 10:47:46.031330 465088 usertrap_amd64.go:225] [ 58870: 58870] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:46.031631 465088 usertrap_amd64.go:212] [ 58868: 58868] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:46.031704 465088 usertrap_amd64.go:122] [ 58868: 58868] Allocate a new trap: 0xc007ec93b0 41 D0312 10:47:46.031785 465088 usertrap_amd64.go:225] [ 58868: 58868] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:46.039162 465088 usertrap_amd64.go:212] [ 58867: 58867] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:46.039221 465088 usertrap_amd64.go:122] [ 58867: 58867] Allocate a new trap: 0xc00ff86b40 42 D0312 10:47:46.039272 465088 usertrap_amd64.go:225] [ 58867: 58867] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:46.052627 465088 task_exit.go:204] [ 58870: 58870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.052873 465088 task_exit.go:204] [ 58870: 58870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.054673 465088 task_signals.go:204] [ 58870: 58871] Signal 58870, PID: 58871, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.054882 465088 task_exit.go:204] [ 58870: 58871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.057411 465088 task_exit.go:204] [ 58870: 58871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.057527 465088 task_exit.go:204] [ 58870: 58871] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.057709 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:46.058225 465088 task_exit.go:204] [ 58870: 58870] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(r1, 0x0, 0x0, 0xffffffff, 0x400) (async, rerun: 32) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x88800) (rerun: 32) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x101000, 0x15) (async, rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) r6 = fcntl$dupfd(r5, 0x0, r5) faccessat2(r6, &(0x7f0000000000)='\x00', 0x3, 0x1100) (async) write$P9_RSETATTR(r6, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0x7) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000080)={0x1, 0x1, 0x1000, 0x0, 0x0, 0xff56, 0x0, 0x0}) close(r7) (async) write$P9_RSETATTR(r3, &(0x7f0000000100)={0x7, 0x1b, 0x1}, 0x7) accept(r4, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) dup2(r8, r4) D0312 10:47:46.085054 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.085475 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.138141 465088 usertrap_amd64.go:212] [ 58867: 58867] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:46.138214 465088 usertrap_amd64.go:122] [ 58867: 58867] Allocate a new trap: 0xc00ff86b40 43 D0312 10:47:46.138317 465088 usertrap_amd64.go:225] [ 58867: 58867] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:46.143959 465088 usertrap_amd64.go:212] [ 58869: 58869] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:46.144059 465088 usertrap_amd64.go:122] [ 58869: 58869] Allocate a new trap: 0xc00e7ba9f0 43 D0312 10:47:46.144163 465088 usertrap_amd64.go:225] [ 58869: 58869] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:46.156569 465088 usertrap_amd64.go:212] [ 58867: 58867] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:46.156654 465088 usertrap_amd64.go:122] [ 58867: 58867] Allocate a new trap: 0xc00ff86b40 44 D0312 10:47:46.156705 465088 usertrap_amd64.go:225] [ 58867: 58867] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:46.165344 465088 task_exit.go:204] [ 58867: 58867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.165837 465088 task_signals.go:204] [ 58867: 58875] Signal 58867, PID: 58875, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.166579 465088 task_exit.go:204] [ 58867: 58867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.166758 465088 task_signals.go:204] [ 58867: 58874] Signal 58867, PID: 58874, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.166955 465088 task_exit.go:204] [ 58867: 58875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.167430 465088 task_exit.go:204] [ 58867: 58875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.167470 465088 task_exit.go:204] [ 58867: 58875] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.167572 465088 task_exit.go:204] [ 58867: 58874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.171371 465088 task_exit.go:204] [ 58867: 58874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.171434 465088 task_exit.go:204] [ 58867: 58874] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.171510 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:46.172545 465088 task_exit.go:204] [ 58867: 58867] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) close(0xffffffffffffffff) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) dup2(r0, r0) pipe2$watch_queue(&(0x7f0000000040), 0x80) D0312 10:47:46.180757 465088 usertrap_amd64.go:212] [ 58877: 58877] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:46.180845 465088 usertrap_amd64.go:122] [ 58877: 58877] Allocate a new trap: 0xc007ec9470 40 D0312 10:47:46.181423 465088 usertrap_amd64.go:225] [ 58877: 58877] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:46.185855 465088 usertrap_amd64.go:212] [ 58877: 58877] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:46.185932 465088 usertrap_amd64.go:122] [ 58877: 58877] Allocate a new trap: 0xc007ec9470 41 D0312 10:47:46.186024 465088 usertrap_amd64.go:225] [ 58877: 58877] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:46.186533 465088 usertrap_amd64.go:212] [ 58869: 58869] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:46.186601 465088 usertrap_amd64.go:122] [ 58869: 58869] Allocate a new trap: 0xc00e7ba9f0 44 D0312 10:47:46.186734 465088 usertrap_amd64.go:225] [ 58869: 58869] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:46.188408 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.189297 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.190591 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.190912 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.201512 465088 usertrap_amd64.go:212] [ 58877: 58877] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:46.201605 465088 usertrap_amd64.go:122] [ 58877: 58877] Allocate a new trap: 0xc007ec9470 42 D0312 10:47:46.201709 465088 usertrap_amd64.go:225] [ 58877: 58877] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:46.209208 465088 task_exit.go:204] [ 58869: 58869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.209540 465088 task_signals.go:204] [ 58869: 58872] Signal 58869, PID: 58872, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.209790 465088 task_exit.go:204] [ 58869: 58869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.209911 465088 task_exit.go:204] [ 58869: 58872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.209755 465088 task_signals.go:204] [ 58869: 58876] Signal 58869, PID: 58876, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.212858 465088 task_exit.go:204] [ 58869: 58872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.212936 465088 task_exit.go:204] [ 58869: 58872] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.214090 465088 task_exit.go:204] [ 58869: 58876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.218512 465088 task_exit.go:204] [ 58869: 58876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.218887 465088 task_exit.go:204] [ 58869: 58876] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.219109 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:46.219751 465088 task_exit.go:204] [ 58869: 58869] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='#%\x00', 0x7) r1 = signalfd4(r0, &(0x7f0000000100)={[0x80000000000000]}, 0x8, 0x80000) close_range(r1, r1, 0x0) (async) close_range(r1, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) D0312 10:47:46.227133 465088 usertrap_amd64.go:212] [ 58868: 58868] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:46.227252 465088 usertrap_amd64.go:122] [ 58868: 58868] Allocate a new trap: 0xc007ec93b0 42 D0312 10:47:46.227347 465088 usertrap_amd64.go:225] [ 58868: 58868] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:46.229132 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.229549 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.234114 465088 task_exit.go:204] [ 58868: 58868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.234380 465088 task_exit.go:204] [ 58868: 58868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.234465 465088 task_signals.go:204] [ 58868: 58878] Signal 58868, PID: 58878, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.234570 465088 task_exit.go:204] [ 58868: 58878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.234721 465088 task_exit.go:204] [ 58868: 58878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.234758 465088 task_exit.go:204] [ 58868: 58878] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.235304 465088 task_signals.go:204] [ 58868: 58873] Signal 58868, PID: 58873, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.235368 465088 task_exit.go:204] [ 58868: 58873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.238177 465088 task_exit.go:204] [ 58868: 58873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.238228 465088 task_exit.go:204] [ 58868: 58873] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.238325 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:46.239535 465088 task_exit.go:204] [ 58868: 58868] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.247357 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.247891 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(0xffffffffffffffff, r6) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:46.303153 465088 usertrap_amd64.go:212] [ 58882: 58882] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:46.303308 465088 usertrap_amd64.go:122] [ 58882: 58882] Allocate a new trap: 0xc00ade54a0 39 D0312 10:47:46.303767 465088 usertrap_amd64.go:225] [ 58882: 58882] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:46.309410 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.309863 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.312037 465088 usertrap_amd64.go:212] [ 58879: 58879] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:46.312117 465088 usertrap_amd64.go:122] [ 58879: 58879] Allocate a new trap: 0xc00ade5470 40 D0312 10:47:46.319405 465088 usertrap_amd64.go:225] [ 58879: 58879] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:46.320215 465088 usertrap_amd64.go:212] [ 58882: 58882] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:46.320301 465088 usertrap_amd64.go:122] [ 58882: 58882] Allocate a new trap: 0xc00ade54a0 40 D0312 10:47:46.320407 465088 usertrap_amd64.go:225] [ 58882: 58882] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:46.322762 465088 usertrap_amd64.go:212] [ 58879: 58879] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:46.322923 465088 usertrap_amd64.go:122] [ 58879: 58879] Allocate a new trap: 0xc00ade5470 41 D0312 10:47:46.323020 465088 usertrap_amd64.go:225] [ 58879: 58879] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:46.333097 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.335614 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.338059 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.338794 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.352743 465088 usertrap_amd64.go:212] [ 58882: 58882] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:46.352822 465088 usertrap_amd64.go:122] [ 58882: 58882] Allocate a new trap: 0xc00ade54a0 41 D0312 10:47:46.352887 465088 usertrap_amd64.go:225] [ 58882: 58882] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:46.357364 465088 usertrap_amd64.go:212] [ 58879: 58879] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:46.357444 465088 usertrap_amd64.go:122] [ 58879: 58879] Allocate a new trap: 0xc00ade5470 42 D0312 10:47:46.357511 465088 usertrap_amd64.go:225] [ 58879: 58879] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:46.386743 465088 usertrap_amd64.go:212] [ 58879: 58879] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:46.386860 465088 usertrap_amd64.go:122] [ 58879: 58879] Allocate a new trap: 0xc00ade5470 43 D0312 10:47:46.386945 465088 usertrap_amd64.go:225] [ 58879: 58879] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:46.393600 465088 usertrap_amd64.go:212] [ 58881: 58881] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:46.393711 465088 usertrap_amd64.go:122] [ 58881: 58881] Allocate a new trap: 0xc00cf312f0 40 D0312 10:47:46.394153 465088 usertrap_amd64.go:225] [ 58881: 58881] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:46.401148 465088 task_exit.go:204] [ 58879: 58879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.401359 465088 task_exit.go:204] [ 58879: 58879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.401929 465088 task_signals.go:204] [ 58879: 58885] Signal 58879, PID: 58885, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.402025 465088 task_exit.go:204] [ 58879: 58885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.404687 465088 task_exit.go:204] [ 58879: 58885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.404748 465088 task_exit.go:204] [ 58879: 58885] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.404838 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:46.405038 465088 task_exit.go:204] [ 58879: 58879] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) (async) close(0xffffffffffffffff) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) (async) dup2(r0, r0) pipe2$watch_queue(&(0x7f0000000040), 0x80) D0312 10:47:46.409972 465088 usertrap_amd64.go:212] [ 58881: 58881] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:46.410064 465088 usertrap_amd64.go:122] [ 58881: 58881] Allocate a new trap: 0xc00cf312f0 41 D0312 10:47:46.410141 465088 usertrap_amd64.go:225] [ 58881: 58881] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:46.422211 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.422656 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.424643 465088 usertrap_amd64.go:212] [ 58877: 58877] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:46.424747 465088 usertrap_amd64.go:122] [ 58877: 58877] Allocate a new trap: 0xc007ec9470 43 D0312 10:47:46.424849 465088 usertrap_amd64.go:225] [ 58877: 58877] Apply the binary patch addr 55c5b5e1be1a trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:46.430938 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.431286 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.434075 465088 usertrap_amd64.go:212] [ 58877: 58877] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:46.434141 465088 usertrap_amd64.go:122] [ 58877: 58877] Allocate a new trap: 0xc007ec9470 44 D0312 10:47:46.434224 465088 usertrap_amd64.go:225] [ 58877: 58877] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:46.440345 465088 usertrap_amd64.go:212] [ 58881: 58881] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:46.440457 465088 usertrap_amd64.go:122] [ 58881: 58881] Allocate a new trap: 0xc00cf312f0 42 D0312 10:47:46.440532 465088 usertrap_amd64.go:225] [ 58881: 58881] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:46.444609 465088 task_exit.go:204] [ 58877: 58877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.444742 465088 task_signals.go:204] [ 58877: 58883] Signal 58877, PID: 58883, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.444782 465088 task_signals.go:204] [ 58877: 58880] Signal 58877, PID: 58880, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.444796 465088 task_signals.go:204] [ 58877: 58886] Signal 58877, PID: 58886, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.444898 465088 task_exit.go:204] [ 58877: 58883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.445204 465088 task_exit.go:204] [ 58877: 58886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.445444 465088 task_exit.go:204] [ 58877: 58880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.445632 465088 task_exit.go:204] [ 58877: 58883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.445727 465088 task_exit.go:204] [ 58877: 58883] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.445885 465088 task_exit.go:204] [ 58877: 58877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.447430 465088 task_exit.go:204] [ 58877: 58886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.447545 465088 task_exit.go:204] [ 58877: 58886] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.452153 465088 task_exit.go:204] [ 58877: 58880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.452640 465088 task_exit.go:204] [ 58877: 58880] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.452839 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:46.453172 465088 task_exit.go:204] [ 58877: 58877] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(r1, 0x0, 0x0, 0xffffffff, 0x400) pipe2$9p(&(0x7f0000000000), 0x88800) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x88800) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x101000, 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) faccessat2(r6, &(0x7f0000000000)='\x00', 0x3, 0x1100) write$P9_RSETATTR(r6, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0x7) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000080)={0x1, 0x1, 0x1000, 0x0, 0x0, 0xff56, 0x0, 0x0}) (async) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000080)={0x1, 0x1, 0x1000, 0x0, 0x0, 0xff56, 0x0, 0x0}) close(r7) write$P9_RSETATTR(r3, &(0x7f0000000100)={0x7, 0x1b, 0x1}, 0x7) accept(r4, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) (async) accept(r4, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r8, r4) D0312 10:47:46.468024 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.468429 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.470523 465088 usertrap_amd64.go:212] [ 58881: 58881] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:46.470665 465088 usertrap_amd64.go:122] [ 58881: 58881] Allocate a new trap: 0xc00cf312f0 43 D0312 10:47:46.470883 465088 usertrap_amd64.go:225] [ 58881: 58881] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:46.474544 465088 task_exit.go:204] [ 58881: 58881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.474878 465088 task_exit.go:204] [ 58881: 58881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.475054 465088 task_signals.go:204] [ 58881: 58887] Signal 58881, PID: 58887, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.475185 465088 task_exit.go:204] [ 58881: 58887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.477219 465088 task_exit.go:204] [ 58881: 58887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.477278 465088 task_exit.go:204] [ 58881: 58887] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.477372 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 10:47:46 executing program 0: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/88}, 0x60, 0x0, 0x3800) r0 = msgget(0x1, 0x200) D0312 10:47:46.477755 465088 task_exit.go:204] [ 58881: 58881] Transitioning from exit state TaskExitZombie to TaskExitDead msgsnd(r0, &(0x7f0000000080)={0x0, "44caa581f78e4517743d87e762d879dd60150e09436e42ecd3797a4963d2d5f3b74fc2ce6c101e3734eba064a7872f0e3b5ea5d6204fe6c92f26d71ccb9daf6e97ad34e51d2fd482571a0e2b18d53247bde64cf751300bc21ae6e25ce71c4b9b78b365e5a79ff9e8a58603466ebe61378fb36a219ad4c88e25d41fc93c6cdcfe06ab3ea26f1233cac9c5023fde69a094b4b10c524439daf26008b86ec07891a1b417aed1241138b029679f4e2014ed26a4b3b0eff476711585079c3e2404aa034026b0760273dd3b8a5f46b1cfcc87382b110f29dfa19a107f8ae6d6efede09f95b30f78982fb35525db749685f3917a4314fc40fb9d22ba6d270553cf57704e00f81a0fa95bfb90bfb1517fd93167b4c81b951cc855d69f91eb1c007af6c951840812685d29e9bb36378465157b1547d04c08dfa7a61617cb2a32936f9f103d13e48dad334f975b91b2dacc8ecf081db39e10ed92cfc61d7b52f3b873a4a9dc266d0c89eddbc025af10f607d6cc50f0f93a426271692430754441f2a81f821b8418d0bd152888595fc68aadf9e3242095019c500baca4180270e96a5c55adccb5576b0f0fc1548da56911b41e8a2b362abdbdce1ee7159778def7d44e3bacaca72954bd001aecc7084280ff04a1b2ae139bd62c45b2af63f0fb07ccf21ebb50f947faad6051b17528b376323cc034ed0d1ac29d282293f879fadf1f77221fe972426cf7dd676111357cf8308a32f7e8c05275a75a3c5e95d3d768729379cafbdb94e3470df5acea2bb0e4edc6b7fbd7a959586a57bc110d38ab183b089a327962a6e98fbe52591cc156b82c3b6bbfb567ddf4dc1cb52687862a5a7b9966a04ce85820087bd7e63b5a033a5590ec8209f2357650f72fc7939e2a5a59d9abc0073fbb09af738fa1591b16a9e879d72ebe7a2aeef10cfbf1b77f37e2564aa852bbcecae7ba80e02ffb32119b02408e9d6ab2014ebd401a836e7387c5f9d06926a3ea90a2646d17d0bb1e7c256693b0733b60124aee91c9a8119b280bbd6ce19fb959523e463f787c7928f23be63592b27001069a3fe73a44117ee12137abce62e905bbebe6af61d2bd5f1849ff336549c39c2232616d4e7de618d2ba1c343435380f70c9781a3878e8f41a88383f1ab1f60deabdc3e8a7062b751186d4dba757908ab9d1f19a0b1137e9ad429e2f9914758d5ee6e42de00dc743c6aa8883acbabfae81ed9e371845e639d7a934ac001a69687d75e85e527777267703b54c5a3e0611049ed47ae1ebfecb238f70d4eef39154479bb05689a76c834ea919888a1442a207d72241a457836a5a03712653c60559deb87a8946fdaa4e25ca0fa6e96bc3d8bf8a3c980040337f6a8e9bc5215a1fde2cf213ce914846005f6ecd8616ccf85430cf5f16192307d726d504a1900135baf6a249f2e3907fe9125d973be25e67c86c16a9013bc7e97a8f9540c2d6058ca6c38a09cec4f84b9c57ec983ae012f0ecf1e0327b5915852999d2bfbee7e249d4e69d0f2aca9b68e4fbe67a56fa6aab3e08981e15991c2edfec44c3950f9565aa4d57fa132d048a32c8ccb9c14e8387b7fa55c44c8ef242433cf734ba7b957b12242947da96ad19bda14a3cae77fcf6fd4cc483de0a3ca2270b65c96d4732e8606a6ef6908cef23a9e45e980a076855373dd75a03afa569c33c7ae585473f7c2097e3f4d7672cddadc5d59dd8c69fae5e79e734526f8157ad897b5bfb29f25df94f0f826b5f94de5dd9c3684785289adbe7dc65a26feb635ca948e8a5b4d446224322dc5b07d1a23fba7c20acf34bcfffa2b0222921dec39185159d26d84d1168162956c485a93b713f8865aae87aef1c4827f7219f7f16c7c1be7f48ad1b720337df71fc246bb1ae34563ea05da03c9c122cdc87a744c35a20e11b0d086b6cb2d8477f5959aa9b0f0023ef91f7f99a219634065be5eb64a37bc7001f0a1220a9ea5bc312c9750a15fe592b69f0b3a5ebdc9c437f527fa23345da8957606e09e0bb0fad2ae436b2b4addf4071c5d8bca1325c0901a1c3d8d1eb828d321f7df6b41e22043b1077e9306ec4fe923f07eefd0d361b0c1d4e66b557fa829ef32f082cd4624586c9e6a8cfb13ec7b53a2f046297238963575e5f01ed4998573b167ce2779832ef4adc6eb205c3d072baf6774df9656381b28a3cfd432ca27373f9a5aeb81c396927cc2de85b94bc87929c25d0f252c25705b828a600db4e860408581c0f5cf68969e68076368f459515a56fa3d296f68b1f2c42d78439f7cfa1925b323e5b1ebf18272ed6b8b81dfe6c6f33d8c88249ba2143252aa440e5c597849f5daba002cb533187bc901302e031fbfe11891dd71c284f9ea4e8bd17134b3a878c89ebc70e1bba639d19c03184c10bac1178d924464712169ef8707550062a830af82c6f36052cf5a19da544dcb5a635f10ae26e932d53bb2527a27f7a27ba1a13265510b1b9360b08ff94a8fa9ae92d54f0574150c36c0eb4347bac0fe722906fd18db315527a08436085549fc0914ebabad19ce294b39faa2deb4818b236160e31ee3dcbad903801d2e005691321581f96ec6ea9eb7f7ab764b690e57af09575df75be22ebe31602696823d3af9fe440f875ff6674cd422abe1f34f96a5bc7b3c5aef1fd5dc26bfd54a4e6eb1b7192fde36185409edbb8b3eb56dff54b7dd849021f47ce645db465b30aeace4086a1e885a2c1a24b6af8487b105caffba4fe35f1fb19fb87dafdd2fb275d74b387d69ab866726f52df15847f34cd39ef2dbe8559f8327ef1e22216c1e8026d49a14b193efe8855226acf71699ec54eeed5501f4dcdf538083769ba7f530b702ecda6f6b06ad562315b6951e288eb0868a3c9e8639e8225877521bc9474ec71e8a4c4c3cbda8f55d82b4cf4c6eeb8731cb6456ddcbe0cac597ee30d6f2b7d881fa13324454cfa5a19134590fb557ef8981b4d2d82dc723890934e2bf52b6ccb157e522d9869d915804be5044c01c05fea2c815cd92a644942e37f48ed8f92eef0e1a9c118282fa48899bfae2af71759e4c01f4a191dcaac0cccc31348a7dd7191714ecb9cc5764c878d03b4410191efd799a3b1447c2c2b88cbe02fd7c0a671556b48d1cce7873927cab2810cf3f6ff060eba15f5d7268b9681b5cd3c9c3339a922068607a2b354c1170dc657a7ae99f1e9fef6b941cadb86a9265f846b7ef64aede7da3c24ea1e87a6dc5177966657aab55930e27779f01d94f98211130dad1415b542c288e5c9389d141a2d09c4f29b6bafbcef3b119581ceccea9a0acb6d1951a74f4f4b51390014a40ab0eea5a54339b45a7955feb490251b4424a34f19e1c56f3e84c32c35a49e4882a6a23b54eda5ee24bb4c7e2b90888e4689a0a180f039e63b2d750cf9fce18eac3436a7442407efdab055f3dd34c19b928e2f602b7a3ce0b63687c6b52c868328cad98c586227e62d405be762309d8f6c1d65d4408ebcda9b2644e2a1f9cbf59e4e0bb910cd1d1e0d80bee5e5fc93c80626f2de1270990c9e767b17c5664f34a1241b927eb7816c09a54e7018b1757cc0d14276ee2093d184997be415457ff2a16fe11b799b4923d8d6552072f88479d778d50b1adf8150129655e7cccf321879b7df4dfcdbd29a0e3bf506d7ac5ab4d6022f760d94e685edbb779033ff503f35885f59b9436a70f41d45835a7169ce235ebc5fd372e93064c44eb82f10fa76fecd10acb8bdabaed3dd07e8b4abc65bdcf6921323f9b168b9fe4aa15757dc7d55354113bd3735a6c3fa39226677dfeefdd8b1bec7e5572b3527aab00df17a5196e70d27f946c8696292a9c057497ab2795336a4a1d6b5557f97197067ad16a1dc6edec4bf6c0f18b3c58b8d24847914e22ee0faaaf176df3736af636e7fbb41f2fe3e4bc2d290e325bb412823922a627d48028d24f0054d09ce1c9bf7a5b42abec162314d87c3441600c5a76de025aeca61155270e5e31aefbf5e8f483dab0685ca6fd41229999646e9bde07d4d84005516ea19f61fe159a2b0ee49c8eeb9210b7db1c968f692dc3f2f865316dd25afc4a10656a4a62a44ac1907640a014dba46b9c5130a89cc1a12dc3d3fd5c40a7d8812dabdc0cd72ee715bc2d12151bfe088e5bb85ae8fa86e58f50fe0222524c7176000af2d0fdf85f60e4b72237b1bea9fec7e5601019ab1a58a265f40320dbf7639362709beb607ee25bfdf65f691fc581b8f8b9147c5d910cb154501f03c5c2b7c0f5fb4f8534b4529d284890513254819d5251eb2e1518f8d2a8d972f1a4ed0225e69c5ffb3461aad82f754aa15522d56d55af04bd7338d64b67ecb953521482396a3bf09615f6b5ae267a039d5c4fdd61b251f8e04f19aada5438bdb05b12c78a88145ab35370dc1018246cc81252471a869d1788cebfff12106fa3d6b79f24df39fe9fbc81776ba139b9996cfc71fa5bc80f1edc9031a02397a5d8f7a24331cc4dff28bd9deb067c3090e08dd8334675fd798926880296661997d7b0695e3b75bc91a9414962ad08543df72655a4f76bab9f2987fd3a23b91a6e48c4a3e495b4b52c9eb31fe76f443566f3ba90b8c87e5eee4b56d89e4f60e738a2b516ef3eb2eb38443b07fd75b6d6c9dde6e91916d90cd96ea9f16457f4c39fc69f410fefad89d0b76dd1679393d377f1281b035de4957b08e6915d9c36dd941ce5c8fa664fa7731a5a157caa7d51d2be137118f26e75510cf211525f7e807ec194db7f2ddd0c616966d3b284a1013c3461df8b06ac36b54d68e5bf34fe92515702fff6e26fecd5ad6c596ba1b8c19acaf68293a557f4027ad40df183c61807bbf44992834f72d65d508b9c3789182b7089500eea2f0d7098c221fc86e474156930932991f8156f77aec0a3118b02a87379d11139481c3c0ac7153c5b0249c20052229fb56cc5e601ddc2cedaa9f9ca7314790f80e6f55db950543dbb433181a79b8311d6744a6bc56a3dfe4a6c72fc54a0cd953ae71dd422cb20974e73b8f92c1a585f2911dbedc756f952491f26fb4185494fc7c50d99ea52883a09f997e6a8cd1f8ea6c0553166695573b98a2d3d0d3cbb5ab35ef8cbef67eb123e0edd60e683d638e9f859b4e631a673ff77c720dff3f96d1c803ee78f8e7fcc852d8a843dd95ed1a0ed3896a071ca80975463ecf2ac35d554381ee19310a53fa709957afe1d0b04dd1f83e4a890cac3afba301ba50834170445a17bb6ac6a26668bc1c5dbdbac178972336823fc430e1c9f18d0ed8b92da4428952ce8466ebfc531eab68f3b0905f06346bbf88c4e70ed94bbd32efcc41cfb7d6be4c2a21f72f2724fd2b22567aadbdee61e1b574b6ab9fbd4221f8fded997d3fdd3924d7cd46463f44abcbdff091af778b7257c2ddd9f92a1a02f71bf5fbac4b10565c4911d1b637d6fcfe579def48cf19c5cfa39e77e3f608b913985e7fd05be90884ef794d490b2dfe2141bea1dae973d06f75560c904d8ab47cf9cfd01f6c1c86ed7960e68c3078dc020f3d90a9650e64560e6136068a57bac48ecacc64668317d31df66c774f870d2cba69c150bab294ba89d5fbd08ec539e6f360d63426080e6c9f31a32202901b0708761f400a71ae28a5efed777c7f637ab56a2b3c02770c109ab77fcbee06fe3ed82854a210e329941a2006886cca5ad01cebe5de475c180068dc24705ac77c7689f576c7e43c9354e3e470c1a9dc05c023451c9e94f7ee03d53d24f2e114d62a2b970d1ad33758252f09e5f670c77b49ddf28512733738e3ab888efd954a202421164bc80bac2d338937"}, 0x1008, 0xaafaae712fda944d) msgsnd(r0, &(0x7f00000010c0)={0x2, "52abfc10827244b6c6c4761840ac63d41f1579d1770bfb946d13b72ca08278e93e471fdf4c5902ec61eedd4992f5839ef1d8fbe59130960cbae18304b38cd9ae00cf84f5e38cbd7937d2b77ce9ac2b588e0f4a1f5ad8e2659fb0dd79a8136bacb5e8a69d2d774982ff5cd0756c29d3de291f950f8f5a9ed93f222e82699625"}, 0x87, 0x800) msgsnd(r0, &(0x7f0000001180)={0x2, "a42dc609be31c19c2d6bd591291533e81590a0e01bac2a8069bcde1d92e625aca2d7c772141700b8fa3ad1dea0a65af74a4d2cdd0699bf829bdc3fd41636b233b7061680efed8f58cfd9966ca2bbbe102b5c04a2d8ba2cd93cf9b97d33c0fccbb962dabbc83aec66f0ce218657d74f2ab85ee06e7e015ebd3c0d9ac07e602381be1e10ed1e097f5fdd3306a1b03d187aa91a5f5a249d57fb8c44e59e2983626052e3686221d7674efd98adfe34a5dc07545428aef8e3e8ce86"}, 0xc1, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001280)=""/62) msgrcv(0xffffffffffffffff, &(0x7f00000012c0)={0x0, ""/1}, 0x9, 0x2, 0x800) r1 = msgget(0x0, 0x88) msgrcv(r1, &(0x7f0000001300)={0x0, ""/86}, 0x5e, 0x1, 0x3800) msgrcv(r0, &(0x7f0000001380)={0x0, ""/220}, 0xe4, 0x1, 0x3000) r2 = msgget(0x3, 0x2) msgrcv(r2, &(0x7f0000001480)={0x0, ""/87}, 0x5f, 0x3, 0x1000) msgsnd(r0, &(0x7f0000001500)={0x1, "29aed7dfb6e127d169b382f51c7e2ec5b7ad72e97a9537d6de16b4c8cefca9d718be1b4016963329d9ef2abda1383fc4e2dcb7b35d1aabba339b7907bd733f24a3d9daa292ae823660a6b0ff24c4"}, 0x56, 0x0) msgsnd(r2, &(0x7f0000001580)={0x3, "6d7a49809fb81dd70d2febee5079b38246f97e99c6a4592c682f13c3c5a707b63b73387ae4f234a913e6d67efc8f075bb04d32b100c0abfc6d64ad468e1b6bb4543c300597f7b4c4306107a7bf5be2beb41c13a8087fb50b4ce6847b91663f29a1a8ac521006a9e320b226f72bf9c200664164fa07ec5c6c896df4ae34669da8efcd51c90e5ca030384e4bbecc8bbb93914b238ab46f585355d16480705be9e7e7baf9b7fa69c7ac22eeba8caae1880939ea1fa2ad9d4c350ae07597798cb34d40cbf32383031390c81feb6fb794e47b272940d49d38"}, 0xde, 0x0) msgrcv(r0, &(0x7f0000001680)={0x0, ""/247}, 0xff, 0x6, 0x800) r3 = msgget$private(0x0, 0x388) msgsnd(r0, &(0x7f0000001780)={0x0, "a57095cd94a5f58eeaad11db102b65b7a270e814e7"}, 0x1d, 0x800) msgget$private(0x0, 0x8) msgsnd(0xffffffffffffffff, &(0x7f00000017c0)={0x2, "19ac56"}, 0xb, 0x800) r4 = msgget(0x3, 0x8) msgrcv(r4, &(0x7f0000001800)={0x0, ""/59}, 0x43, 0x2, 0x1000) msgrcv(r0, &(0x7f0000001880)={0x0, ""/4096}, 0x1008, 0x2, 0x1000) r5 = msgget$private(0x0, 0x2) msgrcv(r5, &(0x7f00000028c0)={0x0, ""/45}, 0x35, 0x3, 0x2800) r6 = msgget(0x0, 0x44) msgrcv(r6, &(0x7f0000002900)={0x0, ""/210}, 0xda, 0x0, 0x1000) msgrcv(r3, &(0x7f0000002a00)={0x0, ""/138}, 0x92, 0x0, 0x0) r7 = msgget$private(0x0, 0x101) msgrcv(r7, &(0x7f0000002ac0)={0x0, ""/144}, 0x98, 0x3, 0x3800) msgsnd(0x0, &(0x7f0000002b80)={0x2, "61a7652cb7d18ae8a754f3cc2e3b56f4b3aef745f17d236cf59d46553647ae53ccbead8355cf682d080c2f67137f0364c3a4c3b3a59de051af321c8afa160181abf69a964aea13f311b4626411ca0048f65fe918af037f6f39bf1ac1f4f675b1b426031b748ce88907f73bea564a86e3a4fd9af2cf806e44ac"}, 0x81, 0x800) D0312 10:47:46.489383 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.492761 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.499313 465088 usertrap_amd64.go:212] [ 58888: 58888] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:46.499408 465088 usertrap_amd64.go:122] [ 58888: 58888] Allocate a new trap: 0xc002a42ed0 40 D0312 10:47:46.499816 465088 usertrap_amd64.go:225] [ 58888: 58888] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:46.502571 465088 usertrap_amd64.go:212] [ 58888: 58888] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:46.502765 465088 usertrap_amd64.go:122] [ 58888: 58888] Allocate a new trap: 0xc002a42ed0 41 D0312 10:47:46.502895 465088 usertrap_amd64.go:225] [ 58888: 58888] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:46.515947 465088 usertrap_amd64.go:212] [ 58882: 58882] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:46.516064 465088 usertrap_amd64.go:122] [ 58882: 58882] Allocate a new trap: 0xc00ade54a0 42 D0312 10:47:46.516151 465088 usertrap_amd64.go:225] [ 58882: 58882] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:46.525203 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.527893 465088 usertrap_amd64.go:212] [ 58889: 58889] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:46.527967 465088 usertrap_amd64.go:122] [ 58889: 58889] Allocate a new trap: 0xc0032fb4d0 40 D0312 10:47:46.528360 465088 usertrap_amd64.go:225] [ 58889: 58889] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:46.530665 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.536365 465088 usertrap_amd64.go:212] [ 58889: 58889] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:46.536444 465088 usertrap_amd64.go:122] [ 58889: 58889] Allocate a new trap: 0xc0032fb4d0 41 D0312 10:47:46.536524 465088 usertrap_amd64.go:225] [ 58889: 58889] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:46.546605 465088 usertrap_amd64.go:212] [ 58891: 58891] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:46.546793 465088 usertrap_amd64.go:122] [ 58891: 58891] Allocate a new trap: 0xc007f0d2c0 40 D0312 10:47:46.547226 465088 usertrap_amd64.go:225] [ 58891: 58891] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:46.548642 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.548892 465088 usertrap_amd64.go:212] [ 58891: 58891] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:46.549025 465088 usertrap_amd64.go:122] [ 58891: 58891] Allocate a new trap: 0xc007f0d2c0 41 D0312 10:47:46.549146 465088 usertrap_amd64.go:225] [ 58891: 58891] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:46.549204 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.552259 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.552653 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.586855 465088 usertrap_amd64.go:212] [ 58889: 58889] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:46.586962 465088 usertrap_amd64.go:122] [ 58889: 58889] Allocate a new trap: 0xc0032fb4d0 42 D0312 10:47:46.586972 465088 usertrap_amd64.go:212] [ 58888: 58888] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:46.587032 465088 usertrap_amd64.go:225] [ 58889: 58889] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:46.587045 465088 usertrap_amd64.go:122] [ 58888: 58888] Allocate a new trap: 0xc002a42ed0 42 D0312 10:47:46.587105 465088 usertrap_amd64.go:225] [ 58888: 58888] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:46.603056 465088 usertrap_amd64.go:212] [ 58891: 58891] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:46.603143 465088 usertrap_amd64.go:122] [ 58891: 58891] Allocate a new trap: 0xc007f0d2c0 42 D0312 10:47:46.603223 465088 usertrap_amd64.go:225] [ 58891: 58891] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:46.617791 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.619221 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.641407 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.642121 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.644041 465088 usertrap_amd64.go:212] [ 58888: 58888] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:46.644164 465088 usertrap_amd64.go:122] [ 58888: 58888] Allocate a new trap: 0xc002a42ed0 43 D0312 10:47:46.644271 465088 usertrap_amd64.go:225] [ 58888: 58888] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:46.676177 465088 task_exit.go:204] [ 58888: 58888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.676391 465088 task_signals.go:204] [ 58888: 58894] Signal 58888, PID: 58894, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.676633 465088 task_exit.go:204] [ 58888: 58888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.676827 465088 task_exit.go:204] [ 58888: 58894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.677155 465088 task_exit.go:204] [ 58888: 58894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.677219 465088 task_exit.go:204] [ 58888: 58894] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.677154 465088 task_signals.go:204] [ 58888: 58893] Signal 58888, PID: 58893, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.677350 465088 task_signals.go:204] [ 58888: 58896] Signal 58888, PID: 58896, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.677378 465088 task_signals.go:204] [ 58888: 58897] Signal 58888, PID: 58897, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.677471 465088 task_exit.go:204] [ 58888: 58893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.677624 465088 task_exit.go:204] [ 58888: 58897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.677853 465088 task_exit.go:204] [ 58888: 58897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.677920 465088 task_exit.go:204] [ 58888: 58897] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.678117 465088 task_exit.go:204] [ 58888: 58893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.678187 465088 task_exit.go:204] [ 58888: 58893] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.678276 465088 task_exit.go:204] [ 58888: 58896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.681319 465088 task_exit.go:204] [ 58888: 58896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.681374 465088 task_exit.go:204] [ 58888: 58896] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.681436 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:46.683104 465088 task_exit.go:204] [ 58888: 58888] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) close(0xffffffffffffffff) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) (async) dup2(r0, r0) pipe2$watch_queue(&(0x7f0000000040), 0x80) D0312 10:47:46.703869 465088 usertrap_amd64.go:212] [ 58889: 58889] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:46.703957 465088 usertrap_amd64.go:122] [ 58889: 58889] Allocate a new trap: 0xc0032fb4d0 43 D0312 10:47:46.704044 465088 usertrap_amd64.go:225] [ 58889: 58889] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:46.707806 465088 task_exit.go:204] [ 58889: 58889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.708025 465088 task_exit.go:204] [ 58889: 58889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.710062 465088 task_signals.go:204] [ 58889: 58892] Signal 58889, PID: 58892, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.710270 465088 task_exit.go:204] [ 58889: 58892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.710472 465088 task_exit.go:204] [ 58889: 58892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.710517 465088 task_exit.go:204] [ 58889: 58892] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.710678 465088 task_signals.go:204] [ 58889: 58898] Signal 58889, PID: 58898, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.710745 465088 task_exit.go:204] [ 58889: 58898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.711350 465088 task_exit.go:204] [ 58889: 58898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.711418 465088 task_exit.go:204] [ 58889: 58898] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.711536 465088 task_signals.go:204] [ 58889: 58899] Signal 58889, PID: 58899, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.711629 465088 task_exit.go:204] [ 58889: 58899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.711746 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.714237 465088 task_exit.go:204] [ 58889: 58899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.714299 465088 task_exit.go:204] [ 58889: 58899] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.714371 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:46.720466 465088 task_exit.go:204] [ 58889: 58889] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.723089 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.735800 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.736042 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.748246 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.750466 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.768684 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.769018 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.770481 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.770897 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.791373 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.791552 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.800329 465088 usertrap_amd64.go:212] [ 58901: 58901] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:46.800550 465088 usertrap_amd64.go:122] [ 58901: 58901] Allocate a new trap: 0xc00d020570 40 D0312 10:47:46.801107 465088 usertrap_amd64.go:225] [ 58901: 58901] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:46.820786 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.821030 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.832036 465088 usertrap_amd64.go:212] [ 58891: 58891] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:46.832154 465088 usertrap_amd64.go:122] [ 58891: 58891] Allocate a new trap: 0xc007f0d2c0 43 D0312 10:47:46.832242 465088 usertrap_amd64.go:225] [ 58891: 58891] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:46.842365 465088 usertrap_amd64.go:212] [ 58901: 58901] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:46.842516 465088 usertrap_amd64.go:122] [ 58901: 58901] Allocate a new trap: 0xc00d020570 41 D0312 10:47:46.842618 465088 usertrap_amd64.go:225] [ 58901: 58901] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:46.846708 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:46.846970 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:46.851300 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.851641 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:46 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @loopback}, &(0x7f0000000040)=0xc) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000080)={'gre0\x00', r0, 0x20, 0x8000, 0xfffffffb, 0x5, {{0xb, 0x4, 0x0, 0x2, 0x2c, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0xb, 0xa6, [@remote, @local]}, @lsrr={0x83, 0xb, 0x3e, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) setsockopt$inet6_mreq(r1, 0x29, 0xddc3c67d98d2a0e, &(0x7f0000000140)={@mcast2, r2}, 0x14) r3 = accept(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x410042, 0x0) r6 = accept$inet6(r5, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) r7 = accept4$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000380)={@empty, r8}, 0x14) setsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000003c0)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r2}, 0x14) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x0, 0x4e22, 0x200, 0x2, 0x80, 0x80, 0x32, 0x0, r9}, {0x2, 0x2, 0xfff, 0x80000000, 0x8, 0x81, 0x2, 0x7ff}, {0x101, 0x16, 0x3ff, 0x5}, 0x6, 0x6e6bb0, 0x0, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x39}, 0x4d3, 0x6c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x3501, 0x4, 0x0, 0x8, 0x4f2, 0x57d80dca, 0x5aa}}, 0xe8) r10 = accept4(r3, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x80, 0x100400) dup3(r10, r1, 0x80000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r7, 0x4008941a, &(0x7f0000000680)=0x2) r11 = socket(0x23, 0xa, 0xfffffffe) setsockopt$inet6_mtu(r11, 0x29, 0x17, &(0x7f00000006c0)=0x5, 0x4) r12 = dup2(r11, r11) ioctl$sock_inet_udp_SIOCOUTQ(r12, 0x5411, &(0x7f0000000700)) setsockopt$inet6_buf(r3, 0x29, 0x22, &(0x7f0000000740)="71db3eb1d19c451209b8bc4c051a8bebd83088622ffae58a37f0203bf5e8708ac68043f2b4f7eab732c34b03da56b5bd5605e84638dd733461e26038f17a318a7acce0", 0x43) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000007c0)={'batadv_slave_0\x00'}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000800)={r6, 0x4, 0x5dd, 0x8}) ioctl$int_out(r13, 0x5462, &(0x7f0000000840)) r14 = creat(&(0x7f0000000880)='./file0\x00', 0x54) fcntl$dupfd(r14, 0x406, r6) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast2}}}, &(0x7f00000009c0)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000000a00)={0xc000000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x40, "abf6fe39df1a15"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000001a00)={{0x0, 0x9, 0x1, 0x3, 0x2, 0x4, 0xa6, 0x3, 0x8, 0xffffff00, 0x5, 0x78, 0x8000, 0xfffffffffffffffc, 0x4ae9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000001a80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f000007b500)={0x1f, [{}, {0x0, r15}, {}, {}, {r16}, {}, {}, {r17}], 0x1, "2e775f6c058c9f"}) D0312 10:47:46.871384 465088 usertrap_amd64.go:212] [ 58901: 58901] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:46.871463 465088 usertrap_amd64.go:122] [ 58901: 58901] Allocate a new trap: 0xc00d020570 42 D0312 10:47:46.871532 465088 usertrap_amd64.go:225] [ 58901: 58901] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:46.945794 465088 usertrap_amd64.go:212] [ 58901: 58901] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:46.945907 465088 usertrap_amd64.go:122] [ 58901: 58901] Allocate a new trap: 0xc00d020570 43 D0312 10:47:46.945984 465088 usertrap_amd64.go:225] [ 58901: 58901] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:46.954802 465088 task_exit.go:204] [ 58901: 58901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.954990 465088 task_exit.go:204] [ 58901: 58901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.955134 465088 task_signals.go:204] [ 58901: 58903] Signal 58901, PID: 58903, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.955224 465088 task_exit.go:204] [ 58901: 58903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.955416 465088 task_exit.go:204] [ 58901: 58903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.955446 465088 task_exit.go:204] [ 58901: 58903] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.955412 465088 task_signals.go:204] [ 58901: 58905] Signal 58901, PID: 58905, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:46.955520 465088 task_exit.go:204] [ 58901: 58905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:46.958528 465088 task_exit.go:204] [ 58901: 58905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:46.958569 465088 task_exit.go:204] [ 58901: 58905] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:46.958632 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:46.960650 465088 task_exit.go:204] [ 58901: 58901] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:46 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x4880) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r1, r1) r2 = signalfd4(r1, &(0x7f0000000140)={[0x7ff]}, 0x8, 0x80800) write$P9_RWALK(r2, &(0x7f0000000180)={0x16, 0x6f, 0x2, {0x1, [{0x2, 0x2, 0x2}]}}, 0x16) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'team_slave_0\x00', {}, 0x3}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1_to_bond\x00', @local}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000280)={'virt_wifi0\x00', &(0x7f00000001c0)=@ethtool_dump={0x3e, 0xfffffeff, 0xd49, 0xae, "be4bbd9a00bee14aaf139d54ed0613125077e2c5e5c57812e44c61c43ee0fc49e998fa821d87e4ea304cde5cda6277c1bb65053fc361bada063570d5dc2e4e3539fc1784e0481bfd79b8c0d163df02128dadec16e453ed9bd95a8574cbd6f46a64dca40d2c87d050dd3a1bc9f8e952fdcc0f03ecc279688a53232a0cba6cc3af2decd64b7ada4d39d5772b145c7bbf16ebef2af5b75f0790408cbfb1ee2a2caa0c96c75371ca61a76e72cc16000c"}}) D0312 10:47:46.981475 465088 usertrap_amd64.go:212] [ 58904: 58904] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:46.981622 465088 usertrap_amd64.go:122] [ 58904: 58904] Allocate a new trap: 0xc00d020600 40 D0312 10:47:46.982025 465088 usertrap_amd64.go:225] [ 58904: 58904] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:46.990000 465088 usertrap_amd64.go:212] [ 58904: 58904] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:46.990102 465088 usertrap_amd64.go:122] [ 58904: 58904] Allocate a new trap: 0xc00d020600 41 D0312 10:47:46.990166 465088 usertrap_amd64.go:225] [ 58904: 58904] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:46.998060 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:46.998482 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:46.998617 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:46.999135 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.035206 465088 usertrap_amd64.go:212] [ 58904: 58904] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:47.035398 465088 usertrap_amd64.go:122] [ 58904: 58904] Allocate a new trap: 0xc00d020600 42 D0312 10:47:47.035537 465088 usertrap_amd64.go:225] [ 58904: 58904] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:47.047608 465088 usertrap_amd64.go:212] [ 58906: 58906] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:47.047759 465088 usertrap_amd64.go:122] [ 58906: 58906] Allocate a new trap: 0xc006f3f4d0 40 D0312 10:47:47.048222 465088 usertrap_amd64.go:225] [ 58906: 58906] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:47.055456 465088 usertrap_amd64.go:212] [ 58906: 58906] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:47.055533 465088 usertrap_amd64.go:122] [ 58906: 58906] Allocate a new trap: 0xc006f3f4d0 41 D0312 10:47:47.055621 465088 usertrap_amd64.go:225] [ 58906: 58906] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:47.057621 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.058973 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.091290 465088 usertrap_amd64.go:212] [ 58904: 58904] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:47.091403 465088 usertrap_amd64.go:122] [ 58904: 58904] Allocate a new trap: 0xc00d020600 43 D0312 10:47:47.091495 465088 usertrap_amd64.go:225] [ 58904: 58904] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:47.103186 465088 task_exit.go:204] [ 58904: 58904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.103464 465088 task_exit.go:204] [ 58904: 58904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.105086 465088 task_signals.go:204] [ 58904: 58907] Signal 58904, PID: 58907, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.105186 465088 task_exit.go:204] [ 58904: 58907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.105366 465088 usertrap_amd64.go:212] [ 58906: 58906] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:47.105455 465088 usertrap_amd64.go:122] [ 58906: 58906] Allocate a new trap: 0xc006f3f4d0 42 D0312 10:47:47.105518 465088 usertrap_amd64.go:225] [ 58906: 58906] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:47.108189 465088 task_exit.go:204] [ 58904: 58907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.108253 465088 task_exit.go:204] [ 58904: 58907] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.108339 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:47.108488 465088 task_exit.go:204] [ 58904: 58904] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @loopback}, &(0x7f0000000040)=0xc) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000080)={'gre0\x00', r0, 0x20, 0x8000, 0xfffffffb, 0x5, {{0xb, 0x4, 0x0, 0x2, 0x2c, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0xb, 0xa6, [@remote, @local]}, @lsrr={0x83, 0xb, 0x3e, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) setsockopt$inet6_mreq(r1, 0x29, 0xddc3c67d98d2a0e, &(0x7f0000000140)={@mcast2, r2}, 0x14) (async) r3 = accept(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x410042, 0x0) r6 = accept$inet6(r5, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) r7 = accept4$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000380)={@empty, r8}, 0x14) (async) setsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000003c0)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r2}, 0x14) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x0, 0x4e22, 0x200, 0x2, 0x80, 0x80, 0x32, 0x0, r9}, {0x2, 0x2, 0xfff, 0x80000000, 0x8, 0x81, 0x2, 0x7ff}, {0x101, 0x16, 0x3ff, 0x5}, 0x6, 0x6e6bb0, 0x0, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x39}, 0x4d3, 0x6c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x3501, 0x4, 0x0, 0x8, 0x4f2, 0x57d80dca, 0x5aa}}, 0xe8) r10 = accept4(r3, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x80, 0x100400) dup3(r10, r1, 0x80000) (async, rerun: 32) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r7, 0x4008941a, &(0x7f0000000680)=0x2) (async, rerun: 32) r11 = socket(0x23, 0xa, 0xfffffffe) setsockopt$inet6_mtu(r11, 0x29, 0x17, &(0x7f00000006c0)=0x5, 0x4) (async) r12 = dup2(r11, r11) ioctl$sock_inet_udp_SIOCOUTQ(r12, 0x5411, &(0x7f0000000700)) setsockopt$inet6_buf(r3, 0x29, 0x22, &(0x7f0000000740)="71db3eb1d19c451209b8bc4c051a8bebd83088622ffae58a37f0203bf5e8708ac68043f2b4f7eab732c34b03da56b5bd5605e84638dd733461e26038f17a318a7acce0", 0x43) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000007c0)={'batadv_slave_0\x00'}) (async) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000800)={r6, 0x4, 0x5dd, 0x8}) ioctl$int_out(r13, 0x5462, &(0x7f0000000840)) r14 = creat(&(0x7f0000000880)='./file0\x00', 0x54) fcntl$dupfd(r14, 0x406, r6) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast2}}}, &(0x7f00000009c0)=0xe8) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000000a00)={0xc000000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x40, "abf6fe39df1a15"}) (async, rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000001a00)={{0x0, 0x9, 0x1, 0x3, 0x2, 0x4, 0xa6, 0x3, 0x8, 0xffffff00, 0x5, 0x78, 0x8000, 0xfffffffffffffffc, 0x4ae9}, 0x8, [0x0]}) (rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000001a80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f000007b500)={0x1f, [{}, {0x0, r15}, {}, {}, {r16}, {}, {}, {r17}], 0x1, "2e775f6c058c9f"}) D0312 10:47:47.125140 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.125500 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.143728 465088 usertrap_amd64.go:212] [ 58906: 58906] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:47.143840 465088 usertrap_amd64.go:122] [ 58906: 58906] Allocate a new trap: 0xc006f3f4d0 43 D0312 10:47:47.143904 465088 usertrap_amd64.go:225] [ 58906: 58906] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:47.146545 465088 task_exit.go:204] [ 58906: 58906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.146730 465088 task_exit.go:204] [ 58906: 58906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.147050 465088 task_signals.go:204] [ 58906: 58908] Signal 58906, PID: 58908, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.147189 465088 task_exit.go:204] [ 58906: 58908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.149544 465088 task_exit.go:204] [ 58906: 58908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.149609 465088 task_exit.go:204] [ 58906: 58908] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.149687 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:47.151353 465088 task_exit.go:204] [ 58906: 58906] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.166331 465088 usertrap_amd64.go:212] [ 58909: 58909] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:47.166421 465088 usertrap_amd64.go:122] [ 58909: 58909] Allocate a new trap: 0xc0075f9320 40 D0312 10:47:47.166919 465088 usertrap_amd64.go:225] [ 58909: 58909] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:47.180863 465088 usertrap_amd64.go:212] [ 58909: 58909] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:47.181037 465088 usertrap_amd64.go:122] [ 58909: 58909] Allocate a new trap: 0xc0075f9320 41 D0312 10:47:47.181107 465088 usertrap_amd64.go:225] [ 58909: 58909] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:47.186618 465088 usertrap_amd64.go:212] [ 58882: 58882] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:47.186681 465088 usertrap_amd64.go:122] [ 58882: 58882] Allocate a new trap: 0xc00ade54a0 43 D0312 10:47:47.186733 465088 usertrap_amd64.go:225] [ 58882: 58882] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:47.188259 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.188649 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.192305 465088 task_exit.go:204] [ 58882: 58882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.192507 465088 task_exit.go:204] [ 58882: 58882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.193387 465088 task_signals.go:204] [ 58882: 58884] Signal 58882, PID: 58884, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.193478 465088 task_exit.go:204] [ 58882: 58884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.193675 465088 task_signals.go:204] [ 58882: 58890] Signal 58882, PID: 58890, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.193891 465088 task_exit.go:204] [ 58882: 58884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.193966 465088 task_exit.go:204] [ 58882: 58884] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.194163 465088 task_exit.go:204] [ 58882: 58890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.197599 465088 task_exit.go:204] [ 58882: 58890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.197680 465088 task_exit.go:204] [ 58882: 58890] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.197791 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:47.198677 465088 task_exit.go:204] [ 58882: 58882] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.205226 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.205696 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r3, r6) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:47 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x4880) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r1, r1) r2 = signalfd4(r1, &(0x7f0000000140)={[0x7ff]}, 0x8, 0x80800) write$P9_RWALK(r2, &(0x7f0000000180)={0x16, 0x6f, 0x2, {0x1, [{0x2, 0x2, 0x2}]}}, 0x16) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'team_slave_0\x00', {}, 0x3}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1_to_bond\x00', @local}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000280)={'virt_wifi0\x00', &(0x7f00000001c0)=@ethtool_dump={0x3e, 0xfffffeff, 0xd49, 0xae, "be4bbd9a00bee14aaf139d54ed0613125077e2c5e5c57812e44c61c43ee0fc49e998fa821d87e4ea304cde5cda6277c1bb65053fc361bada063570d5dc2e4e3539fc1784e0481bfd79b8c0d163df02128dadec16e453ed9bd95a8574cbd6f46a64dca40d2c87d050dd3a1bc9f8e952fdcc0f03ecc279688a53232a0cba6cc3af2decd64b7ada4d39d5772b145c7bbf16ebef2af5b75f0790408cbfb1ee2a2caa0c96c75371ca61a76e72cc16000c"}}) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) pipe2$9p(&(0x7f0000000100), 0x4880) (async) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) dup2(r1, r1) (async) signalfd4(r1, &(0x7f0000000140)={[0x7ff]}, 0x8, 0x80800) (async) write$P9_RWALK(r2, &(0x7f0000000180)={0x16, 0x6f, 0x2, {0x1, [{0x2, 0x2, 0x2}]}}, 0x16) (async) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f00000000c0)) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'team_slave_0\x00', {}, 0x3}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1_to_bond\x00', @local}) (async) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000280)={'virt_wifi0\x00', &(0x7f00000001c0)=@ethtool_dump={0x3e, 0xfffffeff, 0xd49, 0xae, "be4bbd9a00bee14aaf139d54ed0613125077e2c5e5c57812e44c61c43ee0fc49e998fa821d87e4ea304cde5cda6277c1bb65053fc361bada063570d5dc2e4e3539fc1784e0481bfd79b8c0d163df02128dadec16e453ed9bd95a8574cbd6f46a64dca40d2c87d050dd3a1bc9f8e952fdcc0f03ecc279688a53232a0cba6cc3af2decd64b7ada4d39d5772b145c7bbf16ebef2af5b75f0790408cbfb1ee2a2caa0c96c75371ca61a76e72cc16000c"}}) (async) D0312 10:47:47.209252 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.209556 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.220066 465088 usertrap_amd64.go:212] [ 58909: 58909] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:47.220138 465088 usertrap_amd64.go:122] [ 58909: 58909] Allocate a new trap: 0xc0075f9320 42 D0312 10:47:47.220209 465088 usertrap_amd64.go:225] [ 58909: 58909] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:47.280468 465088 usertrap_amd64.go:212] [ 58912: 58912] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:47.280595 465088 usertrap_amd64.go:122] [ 58912: 58912] Allocate a new trap: 0xc00e7bae70 40 D0312 10:47:47.281152 465088 usertrap_amd64.go:225] [ 58912: 58912] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:47.282643 465088 usertrap_amd64.go:212] [ 58910: 58910] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:47.282699 465088 usertrap_amd64.go:122] [ 58910: 58910] Allocate a new trap: 0xc0075f9440 39 D0312 10:47:47.283044 465088 usertrap_amd64.go:225] [ 58910: 58910] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:47.290572 465088 usertrap_amd64.go:212] [ 58912: 58912] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:47.290663 465088 usertrap_amd64.go:122] [ 58912: 58912] Allocate a new trap: 0xc00e7bae70 41 D0312 10:47:47.290723 465088 usertrap_amd64.go:225] [ 58912: 58912] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:47.293642 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.294526 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.301438 465088 usertrap_amd64.go:212] [ 58910: 58910] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:47.301531 465088 usertrap_amd64.go:122] [ 58910: 58910] Allocate a new trap: 0xc0075f9440 40 D0312 10:47:47.301607 465088 usertrap_amd64.go:225] [ 58910: 58910] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:47.310997 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.311448 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.320670 465088 usertrap_amd64.go:212] [ 58910: 58910] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:47.320749 465088 usertrap_amd64.go:122] [ 58910: 58910] Allocate a new trap: 0xc0075f9440 41 D0312 10:47:47.320810 465088 usertrap_amd64.go:225] [ 58910: 58910] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:47.331072 465088 usertrap_amd64.go:212] [ 58912: 58912] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:47.331159 465088 usertrap_amd64.go:122] [ 58912: 58912] Allocate a new trap: 0xc00e7bae70 42 D0312 10:47:47.331234 465088 usertrap_amd64.go:225] [ 58912: 58912] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:47.349319 465088 usertrap_amd64.go:212] [ 58909: 58909] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:47.349406 465088 usertrap_amd64.go:122] [ 58909: 58909] Allocate a new trap: 0xc0075f9320 43 D0312 10:47:47.349497 465088 usertrap_amd64.go:225] [ 58909: 58909] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:47.357123 465088 task_exit.go:204] [ 58909: 58909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.357278 465088 task_signals.go:204] [ 58909: 58913] Signal 58909, PID: 58913, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.357318 465088 task_exit.go:204] [ 58909: 58909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.357437 465088 task_exit.go:204] [ 58909: 58913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.357587 465088 task_signals.go:204] [ 58909: 58911] Signal 58909, PID: 58911, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.358038 465088 task_exit.go:204] [ 58909: 58913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.358103 465088 task_exit.go:204] [ 58909: 58913] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.358281 465088 task_exit.go:204] [ 58909: 58911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.357677 465088 task_signals.go:204] [ 58909: 58914] Signal 58909, PID: 58914, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.358498 465088 task_exit.go:204] [ 58909: 58911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.358563 465088 task_exit.go:204] [ 58909: 58911] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.358645 465088 task_exit.go:204] [ 58909: 58914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.361625 465088 task_exit.go:204] [ 58909: 58914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.361684 465088 task_exit.go:204] [ 58909: 58914] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.361767 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:47.363229 465088 task_exit.go:204] [ 58909: 58909] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @loopback}, &(0x7f0000000040)=0xc) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000080)={'gre0\x00', r0, 0x20, 0x8000, 0xfffffffb, 0x5, {{0xb, 0x4, 0x0, 0x2, 0x2c, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0xb, 0xa6, [@remote, @local]}, @lsrr={0x83, 0xb, 0x3e, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000080)={'gre0\x00', r0, 0x20, 0x8000, 0xfffffffb, 0x5, {{0xb, 0x4, 0x0, 0x2, 0x2c, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0xb, 0xa6, [@remote, @local]}, @lsrr={0x83, 0xb, 0x3e, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) setsockopt$inet6_mreq(r1, 0x29, 0xddc3c67d98d2a0e, &(0x7f0000000140)={@mcast2, r2}, 0x14) r3 = accept(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x410042, 0x0) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x410042, 0x0) r6 = accept$inet6(r5, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) r7 = accept4$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000380)={@empty, r8}, 0x14) (async) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000380)={@empty, r8}, 0x14) setsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000003c0)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r2}, 0x14) (async) setsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000003c0)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r2}, 0x14) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@remote, 0x4e20, 0x0, 0x4e22, 0x200, 0x2, 0x80, 0x80, 0x32, 0x0, r9}, {0x2, 0x2, 0xfff, 0x80000000, 0x8, 0x81, 0x2, 0x7ff}, {0x101, 0x16, 0x3ff, 0x5}, 0x6, 0x6e6bb0, 0x0, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x39}, 0x4d3, 0x6c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x3501, 0x4, 0x0, 0x8, 0x4f2, 0x57d80dca, 0x5aa}}, 0xe8) accept4(r3, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x80, 0x100400) (async) r10 = accept4(r3, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x80, 0x100400) dup3(r10, r1, 0x80000) (async) dup3(r10, r1, 0x80000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r7, 0x4008941a, &(0x7f0000000680)=0x2) r11 = socket(0x23, 0xa, 0xfffffffe) setsockopt$inet6_mtu(r11, 0x29, 0x17, &(0x7f00000006c0)=0x5, 0x4) r12 = dup2(r11, r11) ioctl$sock_inet_udp_SIOCOUTQ(r12, 0x5411, &(0x7f0000000700)) (async) ioctl$sock_inet_udp_SIOCOUTQ(r12, 0x5411, &(0x7f0000000700)) setsockopt$inet6_buf(r3, 0x29, 0x22, &(0x7f0000000740)="71db3eb1d19c451209b8bc4c051a8bebd83088622ffae58a37f0203bf5e8708ac68043f2b4f7eab732c34b03da56b5bd5605e84638dd733461e26038f17a318a7acce0", 0x43) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000007c0)={'batadv_slave_0\x00'}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000800)={r6, 0x4, 0x5dd, 0x8}) ioctl$int_out(r13, 0x5462, &(0x7f0000000840)) r14 = creat(&(0x7f0000000880)='./file0\x00', 0x54) fcntl$dupfd(r14, 0x406, r6) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast2}}}, &(0x7f00000009c0)=0xe8) (async) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast2}}}, &(0x7f00000009c0)=0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000000a00)={0xc000000000000000, [], 0x40, "abf6fe39df1a15"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000000a00)={0xc000000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x40, "abf6fe39df1a15"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000001a00)={{0x0, 0x9, 0x1, 0x3, 0x2, 0x4, 0xa6, 0x3, 0x8, 0xffffff00, 0x5, 0x78, 0x8000, 0xfffffffffffffffc, 0x4ae9}, 0x8, [0x0]}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r12, 0xc0709411, &(0x7f0000001a00)={{0x0, 0x9, 0x1, 0x3, 0x2, 0x4, 0xa6, 0x3, 0x8, 0xffffff00, 0x5, 0x78, 0x8000, 0xfffffffffffffffc, 0x4ae9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000001a80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f000007b500)={0x1f, [{}, {0x0, r15}, {}, {}, {r16}, {}, {}, {r17}], 0x1, "2e775f6c058c9f"}) D0312 10:47:47.379396 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.380590 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.396681 465088 usertrap_amd64.go:212] [ 58891: 58891] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:47.396785 465088 usertrap_amd64.go:122] [ 58891: 58891] Allocate a new trap: 0xc007f0d2c0 44 D0312 10:47:47.396848 465088 usertrap_amd64.go:225] [ 58891: 58891] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:47.412696 465088 task_exit.go:204] [ 58891: 58891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.413052 465088 task_exit.go:204] [ 58891: 58891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.413465 465088 task_signals.go:204] [ 58891: 58895] Signal 58891, PID: 58895, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.413568 465088 task_exit.go:204] [ 58891: 58895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.413796 465088 task_exit.go:204] [ 58891: 58895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.413850 465088 task_exit.go:204] [ 58891: 58895] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.413990 465088 task_signals.go:204] [ 58891: 58900] Signal 58891, PID: 58900, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.414074 465088 task_exit.go:204] [ 58891: 58900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.414958 465088 task_exit.go:204] [ 58891: 58900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.414998 465088 task_exit.go:204] [ 58891: 58900] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.415596 465088 task_signals.go:204] [ 58891: 58902] Signal 58891, PID: 58902, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.415675 465088 task_exit.go:204] [ 58891: 58902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.417782 465088 task_exit.go:204] [ 58891: 58902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.418980 465088 task_exit.go:204] [ 58891: 58902] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.419131 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:47.425325 465088 task_exit.go:204] [ 58891: 58891] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 0: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/88}, 0x60, 0x0, 0x3800) (async) r0 = msgget(0x1, 0x200) msgsnd(r0, &(0x7f0000000080)={0x0, "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"}, 0x1008, 0xaafaae712fda944d) msgsnd(r0, &(0x7f00000010c0)={0x2, "52abfc10827244b6c6c4761840ac63d41f1579d1770bfb946d13b72ca08278e93e471fdf4c5902ec61eedd4992f5839ef1d8fbe59130960cbae18304b38cd9ae00cf84f5e38cbd7937d2b77ce9ac2b588e0f4a1f5ad8e2659fb0dd79a8136bacb5e8a69d2d774982ff5cd0756c29d3de291f950f8f5a9ed93f222e82699625"}, 0x87, 0x800) msgsnd(r0, &(0x7f0000001180)={0x2, "a42dc609be31c19c2d6bd591291533e81590a0e01bac2a8069bcde1d92e625aca2d7c772141700b8fa3ad1dea0a65af74a4d2cdd0699bf829bdc3fd41636b233b7061680efed8f58cfd9966ca2bbbe102b5c04a2d8ba2cd93cf9b97d33c0fccbb962dabbc83aec66f0ce218657d74f2ab85ee06e7e015ebd3c0d9ac07e602381be1e10ed1e097f5fdd3306a1b03d187aa91a5f5a249d57fb8c44e59e2983626052e3686221d7674efd98adfe34a5dc07545428aef8e3e8ce86"}, 0xc1, 0x0) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001280)=""/62) (async) msgrcv(0xffffffffffffffff, &(0x7f00000012c0)={0x0, ""/1}, 0x9, 0x2, 0x800) (async) r1 = msgget(0x0, 0x88) msgrcv(r1, &(0x7f0000001300)={0x0, ""/86}, 0x5e, 0x1, 0x3800) msgrcv(r0, &(0x7f0000001380)={0x0, ""/220}, 0xe4, 0x1, 0x3000) r2 = msgget(0x3, 0x2) msgrcv(r2, &(0x7f0000001480)={0x0, ""/87}, 0x5f, 0x3, 0x1000) (async) msgsnd(r0, &(0x7f0000001500)={0x1, "29aed7dfb6e127d169b382f51c7e2ec5b7ad72e97a9537d6de16b4c8cefca9d718be1b4016963329d9ef2abda1383fc4e2dcb7b35d1aabba339b7907bd733f24a3d9daa292ae823660a6b0ff24c4"}, 0x56, 0x0) (async) msgsnd(r2, &(0x7f0000001580)={0x3, "6d7a49809fb81dd70d2febee5079b38246f97e99c6a4592c682f13c3c5a707b63b73387ae4f234a913e6d67efc8f075bb04d32b100c0abfc6d64ad468e1b6bb4543c300597f7b4c4306107a7bf5be2beb41c13a8087fb50b4ce6847b91663f29a1a8ac521006a9e320b226f72bf9c200664164fa07ec5c6c896df4ae34669da8efcd51c90e5ca030384e4bbecc8bbb93914b238ab46f585355d16480705be9e7e7baf9b7fa69c7ac22eeba8caae1880939ea1fa2ad9d4c350ae07597798cb34d40cbf32383031390c81feb6fb794e47b272940d49d38"}, 0xde, 0x0) (async) msgrcv(r0, &(0x7f0000001680)={0x0, ""/247}, 0xff, 0x6, 0x800) (async) r3 = msgget$private(0x0, 0x388) (async, rerun: 64) msgsnd(r0, &(0x7f0000001780)={0x0, "a57095cd94a5f58eeaad11db102b65b7a270e814e7"}, 0x1d, 0x800) (async, rerun: 64) msgget$private(0x0, 0x8) (async) msgsnd(0xffffffffffffffff, &(0x7f00000017c0)={0x2, "19ac56"}, 0xb, 0x800) (async) r4 = msgget(0x3, 0x8) msgrcv(r4, &(0x7f0000001800)={0x0, ""/59}, 0x43, 0x2, 0x1000) (async) msgrcv(r0, &(0x7f0000001880)={0x0, ""/4096}, 0x1008, 0x2, 0x1000) (async) r5 = msgget$private(0x0, 0x2) msgrcv(r5, &(0x7f00000028c0)={0x0, ""/45}, 0x35, 0x3, 0x2800) (async) r6 = msgget(0x0, 0x44) msgrcv(r6, &(0x7f0000002900)={0x0, ""/210}, 0xda, 0x0, 0x1000) (async) msgrcv(r3, &(0x7f0000002a00)={0x0, ""/138}, 0x92, 0x0, 0x0) (async) r7 = msgget$private(0x0, 0x101) msgrcv(r7, &(0x7f0000002ac0)={0x0, ""/144}, 0x98, 0x3, 0x3800) msgsnd(0x0, &(0x7f0000002b80)={0x2, "61a7652cb7d18ae8a754f3cc2e3b56f4b3aef745f17d236cf59d46553647ae53ccbead8355cf682d080c2f67137f0364c3a4c3b3a59de051af321c8afa160181abf69a964aea13f311b4626411ca0048f65fe918af037f6f39bf1ac1f4f675b1b426031b748ce88907f73bea564a86e3a4fd9af2cf806e44ac"}, 0x81, 0x800) D0312 10:47:47.437240 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.437640 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.447901 465088 usertrap_amd64.go:212] [ 58917: 58917] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:47.448034 465088 usertrap_amd64.go:122] [ 58917: 58917] Allocate a new trap: 0xc00eb11590 40 D0312 10:47:47.448744 465088 usertrap_amd64.go:225] [ 58917: 58917] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:47.451019 465088 usertrap_amd64.go:212] [ 58917: 58917] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:47.451099 465088 usertrap_amd64.go:122] [ 58917: 58917] Allocate a new trap: 0xc00eb11590 41 D0312 10:47:47.451156 465088 usertrap_amd64.go:225] [ 58917: 58917] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:47.462444 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.462770 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.478699 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.479383 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.480009 465088 usertrap_amd64.go:212] [ 58917: 58917] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:47.480149 465088 usertrap_amd64.go:122] [ 58917: 58917] Allocate a new trap: 0xc00eb11590 42 D0312 10:47:47.480292 465088 usertrap_amd64.go:225] [ 58917: 58917] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:47.485188 465088 usertrap_amd64.go:212] [ 58910: 58910] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:47.486064 465088 usertrap_amd64.go:122] [ 58910: 58910] Allocate a new trap: 0xc0075f9440 42 D0312 10:47:47.486392 465088 usertrap_amd64.go:225] [ 58910: 58910] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:47.499236 465088 usertrap_amd64.go:212] [ 58912: 58912] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:47.499324 465088 usertrap_amd64.go:122] [ 58912: 58912] Allocate a new trap: 0xc00e7bae70 43 D0312 10:47:47.499381 465088 usertrap_amd64.go:225] [ 58912: 58912] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:47.530444 465088 usertrap_amd64.go:212] [ 58912: 58912] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:47.530566 465088 usertrap_amd64.go:122] [ 58912: 58912] Allocate a new trap: 0xc00e7bae70 44 D0312 10:47:47.530662 465088 usertrap_amd64.go:225] [ 58912: 58912] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:47.537259 465088 task_exit.go:204] [ 58912: 58912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.537497 465088 task_exit.go:204] [ 58912: 58912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.537577 465088 task_signals.go:204] [ 58912: 58920] Signal 58912, PID: 58920, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.537671 465088 task_signals.go:204] [ 58912: 58916] Signal 58912, PID: 58916, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.537702 465088 task_exit.go:204] [ 58912: 58920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.537925 465088 task_exit.go:204] [ 58912: 58920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.537980 465088 task_exit.go:204] [ 58912: 58920] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.538099 465088 task_exit.go:204] [ 58912: 58916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.538205 465088 task_signals.go:204] [ 58912: 58918] Signal 58912, PID: 58918, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.538298 465088 task_signals.go:204] [ 58912: 58922] Signal 58912, PID: 58922, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.538440 465088 task_exit.go:204] [ 58912: 58916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.538539 465088 task_exit.go:204] [ 58912: 58916] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.538673 465088 task_signals.go:204] [ 58912: 58924] Signal 58912, PID: 58924, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.538755 465088 task_exit.go:204] [ 58912: 58924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.538645 465088 task_signals.go:204] [ 58912: 58921] Signal 58912, PID: 58921, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.538888 465088 task_exit.go:204] [ 58912: 58921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.538973 465088 task_exit.go:204] [ 58912: 58918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.539120 465088 task_exit.go:204] [ 58912: 58918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.539161 465088 task_exit.go:204] [ 58912: 58918] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.539293 465088 task_exit.go:204] [ 58912: 58924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.539332 465088 task_exit.go:204] [ 58912: 58924] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.539442 465088 task_exit.go:204] [ 58912: 58922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.539605 465088 task_exit.go:204] [ 58912: 58922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.539648 465088 task_exit.go:204] [ 58912: 58922] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.546282 465088 task_exit.go:204] [ 58912: 58921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.546385 465088 task_exit.go:204] [ 58912: 58921] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.546469 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:47.546967 465088 task_exit.go:204] [ 58912: 58912] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x4880) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r1, r1) signalfd4(r1, &(0x7f0000000140)={[0x7ff]}, 0x8, 0x80800) (async) r2 = signalfd4(r1, &(0x7f0000000140)={[0x7ff]}, 0x8, 0x80800) write$P9_RWALK(r2, &(0x7f0000000180)={0x16, 0x6f, 0x2, {0x1, [{0x2, 0x2, 0x2}]}}, 0x16) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'team_slave_0\x00', {}, 0x3}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1_to_bond\x00', @local}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000280)={'virt_wifi0\x00', &(0x7f00000001c0)=@ethtool_dump={0x3e, 0xfffffeff, 0xd49, 0xae, "be4bbd9a00bee14aaf139d54ed0613125077e2c5e5c57812e44c61c43ee0fc49e998fa821d87e4ea304cde5cda6277c1bb65053fc361bada063570d5dc2e4e3539fc1784e0481bfd79b8c0d163df02128dadec16e453ed9bd95a8574cbd6f46a64dca40d2c87d050dd3a1bc9f8e952fdcc0f03ecc279688a53232a0cba6cc3af2decd64b7ada4d39d5772b145c7bbf16ebef2af5b75f0790408cbfb1ee2a2caa0c96c75371ca61a76e72cc16000c"}}) D0312 10:47:47.571434 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.575213 465088 usertrap_amd64.go:212] [ 58923: 58923] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:47.575295 465088 usertrap_amd64.go:122] [ 58923: 58923] Allocate a new trap: 0xc00d9fd0e0 40 D0312 10:47:47.575331 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.580444 465088 usertrap_amd64.go:225] [ 58923: 58923] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:47.593302 465088 usertrap_amd64.go:212] [ 58923: 58923] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:47.593355 465088 usertrap_amd64.go:122] [ 58923: 58923] Allocate a new trap: 0xc00d9fd0e0 41 D0312 10:47:47.593447 465088 usertrap_amd64.go:225] [ 58923: 58923] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:47.597259 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.597594 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.641642 465088 usertrap_amd64.go:212] [ 58923: 58923] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:47.641725 465088 usertrap_amd64.go:122] [ 58923: 58923] Allocate a new trap: 0xc00d9fd0e0 42 D0312 10:47:47.641783 465088 usertrap_amd64.go:225] [ 58923: 58923] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:47.650026 465088 usertrap_amd64.go:212] [ 58917: 58917] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:47.650110 465088 usertrap_amd64.go:122] [ 58917: 58917] Allocate a new trap: 0xc00eb11590 43 D0312 10:47:47.650169 465088 usertrap_amd64.go:225] [ 58917: 58917] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:47.656696 465088 task_exit.go:204] [ 58917: 58917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.656857 465088 task_exit.go:204] [ 58917: 58917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.657083 465088 task_signals.go:204] [ 58917: 58925] Signal 58917, PID: 58925, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.657180 465088 task_signals.go:204] [ 58917: 58926] Signal 58917, PID: 58926, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.657257 465088 task_exit.go:204] [ 58917: 58925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.657510 465088 task_signals.go:204] [ 58917: 58928] Signal 58917, PID: 58928, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.657620 465088 task_exit.go:204] [ 58917: 58925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.657658 465088 task_exit.go:204] [ 58917: 58925] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.657771 465088 task_exit.go:204] [ 58917: 58926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.658668 465088 task_exit.go:204] [ 58917: 58926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.658715 465088 task_exit.go:204] [ 58917: 58926] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.658836 465088 task_exit.go:204] [ 58917: 58928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.669676 465088 task_exit.go:204] [ 58917: 58928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.669750 465088 task_exit.go:204] [ 58917: 58928] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.669813 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:47.670016 465088 task_exit.go:204] [ 58917: 58917] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.670972 465088 usertrap_amd64.go:212] [ 58927: 58927] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:47.672046 465088 usertrap_amd64.go:122] [ 58927: 58927] Allocate a new trap: 0xc002a43440 40 D0312 10:47:47.672500 465088 usertrap_amd64.go:225] [ 58927: 58927] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) 10:47:47 executing program 1: r0 = timerfd_create(0x3, 0x80000) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "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"}, 0x100b) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000001080), 0x2, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = signalfd(r3, &(0x7f0000000000)={[0x40000]}, 0x8) r5 = openat$dir(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x800, 0x40) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f0000001100)) ioctl$TUNSETGROUP(r4, 0x5451, 0xee01) D0312 10:47:47.690022 465088 usertrap_amd64.go:212] [ 58927: 58927] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:47.690123 465088 usertrap_amd64.go:122] [ 58927: 58927] Allocate a new trap: 0xc002a43440 41 D0312 10:47:47.690198 465088 usertrap_amd64.go:225] [ 58927: 58927] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:47.693491 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.694047 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.695451 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.695738 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.726354 465088 usertrap_amd64.go:212] [ 58927: 58927] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:47.726447 465088 usertrap_amd64.go:122] [ 58927: 58927] Allocate a new trap: 0xc002a43440 42 D0312 10:47:47.726546 465088 usertrap_amd64.go:225] [ 58927: 58927] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:47.750632 465088 usertrap_amd64.go:212] [ 58923: 58923] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:47.750703 465088 usertrap_amd64.go:122] [ 58923: 58923] Allocate a new trap: 0xc00d9fd0e0 43 D0312 10:47:47.750759 465088 usertrap_amd64.go:225] [ 58923: 58923] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:47.772087 465088 usertrap_amd64.go:212] [ 58932: 58932] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:47.772197 465088 usertrap_amd64.go:122] [ 58932: 58932] Allocate a new trap: 0xc007f0d950 40 D0312 10:47:47.772651 465088 usertrap_amd64.go:225] [ 58932: 58932] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:47.775001 465088 usertrap_amd64.go:212] [ 58932: 58932] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:47.775115 465088 usertrap_amd64.go:122] [ 58932: 58932] Allocate a new trap: 0xc007f0d950 41 D0312 10:47:47.775205 465088 usertrap_amd64.go:225] [ 58932: 58932] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:47.778995 465088 usertrap_amd64.go:212] [ 58927: 58927] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:47.779069 465088 usertrap_amd64.go:122] [ 58927: 58927] Allocate a new trap: 0xc002a43440 43 D0312 10:47:47.779125 465088 usertrap_amd64.go:225] [ 58927: 58927] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:47.780771 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.781153 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.796835 465088 usertrap_amd64.go:212] [ 58932: 58932] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:47.796925 465088 usertrap_amd64.go:122] [ 58932: 58932] Allocate a new trap: 0xc007f0d950 42 D0312 10:47:47.797030 465088 usertrap_amd64.go:225] [ 58932: 58932] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:47.799917 465088 task_exit.go:204] [ 58927: 58927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.804971 465088 task_exit.go:204] [ 58927: 58927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.805104 465088 task_signals.go:204] [ 58927: 58937] Signal 58927, PID: 58937, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.805231 465088 task_signals.go:204] [ 58927: 58936] Signal 58927, PID: 58936, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.805371 465088 task_exit.go:204] [ 58927: 58937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.805562 465088 task_exit.go:204] [ 58927: 58937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.805593 465088 task_exit.go:204] [ 58927: 58937] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.805778 465088 task_exit.go:204] [ 58927: 58936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.808345 465088 task_exit.go:204] [ 58927: 58936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.808421 465088 task_exit.go:204] [ 58927: 58936] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.808529 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:47.809064 465088 task_exit.go:204] [ 58927: 58927] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 2: ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x5450, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'hsr0\x00', @multicast}) D0312 10:47:47.823572 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.824059 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.830458 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.831080 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.842672 465088 usertrap_amd64.go:212] [ 58932: 58932] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:47.842766 465088 usertrap_amd64.go:122] [ 58932: 58932] Allocate a new trap: 0xc007f0d950 43 D0312 10:47:47.842856 465088 usertrap_amd64.go:225] [ 58932: 58932] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:47.853474 465088 task_exit.go:204] [ 58932: 58932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.853663 465088 task_signals.go:204] [ 58932: 58938] Signal 58932, PID: 58938, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.853791 465088 task_exit.go:204] [ 58932: 58938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.854028 465088 task_exit.go:204] [ 58932: 58938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.854100 465088 task_exit.go:204] [ 58932: 58938] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.858272 465088 task_exit.go:204] [ 58932: 58932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.858369 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:47.860131 465088 task_exit.go:204] [ 58932: 58932] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:47 executing program 1: r0 = timerfd_create(0x3, 0x80000) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "c8082450ef59e5b97934e8c4842f9c8c9ce17f36870e4b15d7f4c1e3667c2fd2574421140ab9f9c5097ba8ae9b51b7364e981213b72175ccfab904a52202b9d3f92188b606dd9b5db8f245e60641f8ad1e798de8ff14d3c156f6dab082943e796549f22057a376c03314fa31973968ee2898f3e9e6d21bac6b38515e849921acc735266aa99876be7fcc67581c32e19a51451c9e8c38019771c1c65afe12e766f1bd14501cbeec315cc453946ed461472eebc9219404a70af044b2d03f5c319870e2a521ce7bf0a00d512b07bdab04fe55dbd30d36fd7ebd9736e9aae26f03808af0d52783deff8931fdcc3944bba56b91fe73122e48d360245af6d1e93a9b8a86e9910f102373bc22b18c98ecdbf7d1d03faebfd7a70a66eac366fe182ed4b82d12c714f01f1494d0e614cd3bbadac2073f1060c660789fbdeb3ab1c7dcccfdb83dbac79f4c75b9f732193260e6a59d3cf09abfd50d79d8fe08cd5b3311acf7108575787af9facbd45f2ce6713c1a3f03023e440e5bfbba60659fe10395acf78fd36698a0bdecdeefaac52a829892230f73aa31ddfa0751334efe01387becf5dca01d4f1fa711dbc49fa34bac9ac709a0d4c486e13d2bdee1282d42c30a6f70a60e75550e83ae776fefaa3c3f40caf7ae3c980dad79aa68ff7a56b8a6229a59fdecb7c74b71a70bf613084f31cdc12cb1ee6a32c617f1b473099db4164d4c307aeedb89725c4c14d4c9e1b9e47767cb6e82293c386cc8c2ecc314a8d3fa1ca0919be4e174b0d99d3ead79b6f73c30c73413035b49d0085febef53ee502b252338bd3d30ca17a8fd7f1b20c997884f9e8c1733039c74d4f0e6ce21e5de0fe96da661418918bbc6f30de6cd528bcf9d48d98fbcfc87c50fd2c095439362a10f7283251649fe0821053508143b32bbcbfb8fa1e71dba168ae797f450e82d3b6c8c44972ab00e7858bf447835054330280a6f69891c64f26968d19f5026dfeb132c5392f41c2a58fd5ef2db5ac57c2bf898089af75b2829301ab0c14e2fd660ec922cd5a742a62438293466d373ea88bcec9e1a8b44004c0919ccbd6d07621934b2e9c63e86f1b3494d79c69d0b8878947b1c43106f8e1a663c5987992116150fd7ad14a3f8b8290cd61417cad153d7f8727c65a81adff36d71d428585b26fbbcbab70a3a8639495a395cb82898aaf596b721accf6c789e77cd5776ed0a043312d5881e2644261031f6a173660dc0d5e1b9ad552018312321b0b774e4e6805f87cb5ba0a4ad1c9c5adfb8d4627e4e3d6316b29486dda976a8def070badc17ffb984384969866a2fcf811ab126b0ced2d9a87cde5700be885156c811d46816f0283990e4e203165ebd3dc7fe85c162fa2a172e92d7037825125dc492bc5e5a2822886c6f33981914081fc475ecd0c86883fc05d706843cad766b7833680ceed77e998cbc69aaeb1128cdb8700819a12922d486ae4c20c31c912a76a6096016f8e93b8a91991ef23c91d62c04c3d861e00dbe134621517162910b516bcf70f3ee31f65f342cf38c86fe6384dd778a29e7276ea8213d019e2afece43fa6c3fe5f62511a6fc3641c8c4b24c96392fd2816bfe8158b25b5fb0eed31db9b51b3a07dd767254923694c80bc1605e302adc22b027bcdf5efced7e25fb46cf0cc3b3aa73609cd4efc450f4527428fa113a5265669e469b6c4d06fb3e1fb6503b9604bfb7407f0abe6870bb857b5e3c95646037b33801c94de169c925317dd20b92e763716cae3c45dbd50c992a4866d8cdef1a2623b22a538dedafa3fc9f14155e190b34f5c8942f8815fd956cbae4ad38ac3c17e2ed0215d9cd9d5479fa6c0996e805b45576677bcb7679c17b8405d16b858b0f91f2d681edc148235641987a339a394d723a93ba88c776aa8cc67224dfbaf9b0dacf10ea782c40969fcb20f2e4d9a35d9a1135e7a82eb5e7787794e006f5b87a724255b66cc45b2f010cd42f5a45e89143ab96fbaa1388bcc5e73583876f11004ff2d7fdac1588357c9689b78b51d7df6bdec71ae43536d85f57fef8a56da8412b8248a45b3def6c20cc9ee81b3e85783c2764c2b074172c34c029b64856daa171eed42ad69994dd3632d2217be5c0bf7f93a26dfafd062405e9523589e025c6881e42c322854cb4771bb820b5e4efd3aa5cfc93daf71c7e2516503ac62cebe5dd71a6eb30469d4eeb35ccb9164e9c655172d1e419ef2c5b9241f8f1cbf9e22fcc84093e7f439c8b1e3f16c22fc5adae97fe61091a06d651431bb7854afb02bd4a78129a3fc575ec1504f9db31ce917749678b7a94643d6863583b290c8602c63221bf81086c4b4711ef1d9e401ceea2b6fcd3eed55e01ed062e109808bc26f54f56f1b74c1c7519c8165305f47b5d42f6af2604f0399c869900730041b539ff4e1300041c826034a7a2516a378a64ce52d17e7fe52402a2b8b606ceba9daa84f994d9bf216163ea49ee7645f050345013c6800bbf9fa4553e9462fdfd9e96e77c5ef29e5a7822016ad5f615e8345486635d0e071416d8c1dd722cf3731a4b8e1a45c84a9ad6353c347552e73e86e42c64e7300f5cebcc18ad28cb30194e02d5671abfb24ee3155ed8654c8ad92e6b4fde09cae5138bdcc7d38418e3b14aecd160c152eff7c9a9d2f05731159e562ff885dea89aaf3c5ae2a7f9b231876de574644c7c654832b9b763d061d211113a583c999d8bf8812dc6cb17c08923cb2b80958c7ec0af1e82582e9ea84332420a9930e3117a7fc2c601df3b3b32bfee2b381207999f3031d03c52b9f357dae413d31183fba833d16ad9ab3b825760f005d610a788ea43415304ae8de66014a22fed308f9084d3a91e28d27e71fdb402518442ebc32d2147d521ebc74cee4fd57d01c54478d7d49151825968cd9b8391757f08ab016a440382f88d7b5a4831f99288b57f0878beb2026afd5e2b9a3e1827561a381206a9f0c8024b80494715d90e82690988bab054071b472b9ad66bfff4f36e20ccec6b604054e28ca5cdc8a11d962d5d552de61448cee94191f7428a3b0d692cc9d8e14d8a461773b2c88024d337e636319654758d4bf85bc22ccbf44007dc46d71cce950d4b06e2d9f04fd17ac27ef69598c6856fc573e624f33f35ff5412427d503ff4afdc06d9176c005165759f9e812e036e9a33948de3ffdddcab45f5d10503147f187bc8c9dac2744f93bbd3e4965d49452e5932be25ef1d3b987e432247dca148c3e73e258366781244473369efb466bdce6e215ec78ea488d5cb15c648945934c5f824abd30526e760c850872ae78e47a53bae934a15e5dc7d8c1c8f3f29da219c4c5873a31ceb72683a1c9a44d1a64e450697ae7d47e5abc08ae05ba8e232d35671f03e41830abf8557517c27e00343211ec60e7f19e7132f38dcf6a7ef031b507c433b28cf7d27b6a0f49a3b25c4ad66376ee2a3cc1683f93a52a6e97f796ad366b044e69b5a36431f10a62beba8aa5ce1d01ec58b3a3ba2da83d1e68d627058601ca4fbc24a6f2d8532badc2d8c99d656d6b90a9fd9e6c5cac21c03c960bc25fd04f65ff4101835e8de925cfe844245e4928952fd8e9fd0284752a4457ccb9d5df8da02573127d4c861549cc69f684aa32279574354a44b574fcc081fe536fa202814b6a272b75ce64f106e7c66c40d7134a60334f52bbe716fd8726e28e14b54c895f45eb814c9ae1cac1312d3f84a6fcbca71581e3cf6ab25dfc765197b6f31cee39dcc1c63ac86ce59327c748355afdabdd9c4157f3f8e0352e76ce3863cae992156b1127a9ce4b7e46f65a206854ddb6fd666e8a47dd1d906a0e4168cafb1b7b829b9a524056343da6099d481851b914b1a519b4f2ab13fdc93964be9fe3f6d76eb8e2c58d1d038d9fecca1aa3f41a1ad9b3e4d867c97b1fc93be7a17e0edc989818bc3ad1dac00f3b2583eee081d59c6222be8511f122eb6af2a93918e4bc66b7aa1ce08624f1fddea6bcbec9111441cce418d317be60bdfa5dbbb4e45507c39e55895ba1aeaf5d0fb0c8e806a8eae0b14947f1efc51b8541383fb7e3fd63a0e69778388e791550536bbb4573b7e12ee84119950930dd06389b55a97df88954f30ea6a6384291414932e23e8e9919096714155f22fc14c17ee8cb13a7c795aadc2ffab754890152e3975b489c2eb42e4361f8d9006b873f60e49873f53ddc17f8cc1d851de996b1dd847325c93465f35ff0f6465afe6beebbd936c2af27559d2cf241120a77b2e67bd97da6d07c54eed8fd3a25b90aec6dfc902e8f127837dca7d196503267131ed21576be14e4ed06d55980ebde76f53e9732bc21154b9623f627d612c7030b959a157d5f0725e698cf7b5dc71e3e520056a4ddc234dadb540df18b1bab6aea1e80c317591a51b0987d9bf3e5a84dc06f89a5cc9b37e6f850e0024acb406dbe4145298c64163d25f8d0bf71653b02fe3f94bb38751b533581545b5396e19f5626c2a291da53a0202ed93858eb6bad3f61d3479651d0811a64738e4f8b1d97ed2ba945450bfabb0205de1b82b69e6b769879d625700dd8b803642ef51563e22658708e241d1ae1ea732d7abfecffc04793282f1c2a28d622afc021c7311eb7e3ff0683117c1d9cc333296e5a451afabce15d4a11e161ba1e7a49fa14d3e40489336446b086e3f02f3543065bde2d4ff77d2d137e41b920607fa26fabd13202a4ab38247ac482ce5057c91fdcd8cddb00c4defed40d32fe0d5551a230dae411bbf1fd10cf71b64ee5b517e2c9e2d5167aa34a68748557f6ea48b129d6d5b0785d0b950d84ad1d1d736a839e876ccc63491933ee52a548c293ed92eda0079a2d00dce6516a01962fa502757d2e6b55525d40748e67862f6b73be8452840a9a0afa3f229c3facfacb71dbadbb702f40391d2e53e8fd39095e6bf89d5654112fb3bbd9f4351ba937ef0790448dc3fe4640e86ef3d6379205a436ed81c420e82f911190d61a6d9ab331ef89c3e580fa2d337962e7d196b933b347af532425aece1c4d9078b882ae1015e851ee12c3254f6b43ea17fcbaa5b4c00817f1509b69c7c401d501904947862f23c070a8a606df9df160747ef729fbe86b8d5a1a21e74080b17cae4ca5a48997dce6528bc7f9e5d08fa8821b9fd1e9ee2b9d96ae42fc59e8354cc8b126897a450dbfa24205a54cb5a6f43e513ea9e8b341798259b15e6fd7f8d33eb13d69db3f6b5358e0b4be35fc3d5781b4139edc6183a2f40088d9d63f60de138bd781d7e003e15a88382c586a7a83d4ef277783f31c51ddf886b09d0e7a5257e04d03662f473ca81ecb8f242df350953cba270c6d706bfba814a59dac67ab1185b09b3225c31015eabf8c955f02e4e87c6c4e2bdd96530813609e821a5f22a83cdd816445c925bae5dab41a44a4c766ae288086c8195c80d328370775c3c4783c19d587af433582a13d9b3a0f672a041dba621da8cef3f237d9c4bec39d07f385eb14c6cf1b84eba46f3cd1fd621ec6b03e076e980226d0676fabfe6f03e3ff32a283d219136e93f27c704c5165526046f2dfb9eab4a02f4e2337b7f150ef28b915b178490b0a896f227f29609cc7d212ce7067d884ccf589cba8cff1ee2a684125c9edc2269b95cde36df050d2bb4698013f88b228b50b215df894a5660f91698c4484f75daff065555323d627be40ba8595d60a0cea2a481655bc24fad9b20f3e4056a17fe5d92a1379f7eaecdc39890beff6a5e4576299e549879f8e2581181967099da9340e8842b0d79f48b31ba565d6efd03e668c0ef70a77d62ea90"}, 0x100b) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000001080), 0x2, 0x0) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = signalfd(r3, &(0x7f0000000000)={[0x40000]}, 0x8) (async) r5 = openat$dir(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x800, 0x40) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f0000001100)) (async) ioctl$TUNSETGROUP(r4, 0x5451, 0xee01) D0312 10:47:47.871893 465088 usertrap_amd64.go:212] [ 58939: 58939] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:47.871995 465088 usertrap_amd64.go:122] [ 58939: 58939] Allocate a new trap: 0xc0032fb8c0 40 D0312 10:47:47.872921 465088 usertrap_amd64.go:225] [ 58939: 58939] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:47.882640 465088 usertrap_amd64.go:212] [ 58939: 58939] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:47.882717 465088 usertrap_amd64.go:122] [ 58939: 58939] Allocate a new trap: 0xc0032fb8c0 41 D0312 10:47:47.882808 465088 usertrap_amd64.go:225] [ 58939: 58939] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:47.889059 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.891316 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.894845 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.895164 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.902648 465088 usertrap_amd64.go:212] [ 58939: 58939] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:47.902720 465088 usertrap_amd64.go:122] [ 58939: 58939] Allocate a new trap: 0xc0032fb8c0 42 D0312 10:47:47.902778 465088 usertrap_amd64.go:225] [ 58939: 58939] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:47.937889 465088 usertrap_amd64.go:212] [ 58940: 58940] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:47.937990 465088 usertrap_amd64.go:122] [ 58940: 58940] Allocate a new trap: 0xc007ec96b0 40 D0312 10:47:47.938435 465088 usertrap_amd64.go:225] [ 58940: 58940] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:47.938706 465088 usertrap_amd64.go:212] [ 58939: 58939] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:47.938771 465088 usertrap_amd64.go:122] [ 58939: 58939] Allocate a new trap: 0xc0032fb8c0 43 D0312 10:47:47.938853 465088 usertrap_amd64.go:225] [ 58939: 58939] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:47.941264 465088 usertrap_amd64.go:212] [ 58940: 58940] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:47.941333 465088 usertrap_amd64.go:122] [ 58940: 58940] Allocate a new trap: 0xc007ec96b0 41 D0312 10:47:47.941404 465088 usertrap_amd64.go:225] [ 58940: 58940] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:47.943080 465088 task_exit.go:204] [ 58939: 58939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.943196 465088 task_signals.go:204] [ 58939: 58941] Signal 58939, PID: 58941, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:47.943284 465088 task_exit.go:204] [ 58939: 58941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:47.943301 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:47.943485 465088 task_exit.go:204] [ 58939: 58939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.943690 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.945815 465088 task_exit.go:204] [ 58939: 58941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:47.945873 465088 task_exit.go:204] [ 58939: 58941] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.945988 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:47.946134 465088 task_exit.go:204] [ 58939: 58939] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:47.950886 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:47.951169 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:47.959882 465088 usertrap_amd64.go:212] [ 58940: 58940] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:47.960074 465088 usertrap_amd64.go:122] [ 58940: 58940] Allocate a new trap: 0xc007ec96b0 42 D0312 10:47:47.960253 465088 usertrap_amd64.go:225] [ 58940: 58940] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:48.015324 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.018581 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.027836 465088 usertrap_amd64.go:212] [ 58940: 58940] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:48.027915 465088 usertrap_amd64.go:122] [ 58940: 58940] Allocate a new trap: 0xc007ec96b0 43 D0312 10:47:48.027980 465088 usertrap_amd64.go:225] [ 58940: 58940] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:48.032058 465088 task_exit.go:204] [ 58940: 58940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.032330 465088 task_signals.go:204] [ 58940: 58943] Signal 58940, PID: 58943, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.032398 465088 task_exit.go:204] [ 58940: 58940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.032491 465088 task_signals.go:204] [ 58940: 58942] Signal 58940, PID: 58942, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.032536 465088 task_exit.go:204] [ 58940: 58943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.032768 465088 task_exit.go:204] [ 58940: 58943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.032813 465088 task_exit.go:204] [ 58940: 58943] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.032999 465088 task_signals.go:204] [ 58940: 58944] Signal 58940, PID: 58944, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.033020 465088 task_exit.go:204] [ 58940: 58942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.033198 465088 task_exit.go:204] [ 58940: 58944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.033417 465088 task_exit.go:204] [ 58940: 58942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.033539 465088 task_exit.go:204] [ 58940: 58942] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.035959 465088 task_exit.go:204] [ 58940: 58944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.036048 465088 task_exit.go:204] [ 58940: 58944] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.036113 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:48.042820 465088 task_exit.go:204] [ 58940: 58940] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.062451 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.068027 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.149354 465088 usertrap_amd64.go:212] [ 58910: 58910] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:48.149475 465088 usertrap_amd64.go:122] [ 58910: 58910] Allocate a new trap: 0xc0075f9440 43 D0312 10:47:48.149567 465088 usertrap_amd64.go:225] [ 58910: 58910] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:48.159691 465088 task_exit.go:204] [ 58910: 58910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.159930 465088 task_exit.go:204] [ 58910: 58910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.161130 465088 task_signals.go:204] [ 58910: 58915] Signal 58910, PID: 58915, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.161236 465088 task_exit.go:204] [ 58910: 58915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.161453 465088 task_exit.go:204] [ 58910: 58915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.161499 465088 task_exit.go:204] [ 58910: 58915] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.161690 465088 task_signals.go:204] [ 58910: 58919] Signal 58910, PID: 58919, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.161754 465088 task_exit.go:204] [ 58910: 58919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.163864 465088 task_exit.go:204] [ 58910: 58919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.163919 465088 task_exit.go:204] [ 58910: 58919] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.163988 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:48.164233 465088 task_exit.go:204] [ 58910: 58910] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r3, r6) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:48 executing program 2: ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x5450, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'hsr0\x00', @multicast}) 10:47:48 executing program 1: r0 = timerfd_create(0x3, 0x80000) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "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"}, 0x100b) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000001080), 0x2, 0x0) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r4 = signalfd(r3, &(0x7f0000000000)={[0x40000]}, 0x8) (async) r5 = openat$dir(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x800, 0x40) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f0000001100)) (async) ioctl$TUNSETGROUP(r4, 0x5451, 0xee01) D0312 10:47:48.204668 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.205112 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.260982 465088 usertrap_amd64.go:212] [ 58946: 58946] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:48.261068 465088 usertrap_amd64.go:122] [ 58946: 58946] Allocate a new trap: 0xc007ec96e0 40 D0312 10:47:48.264843 465088 usertrap_amd64.go:225] [ 58946: 58946] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:48.280837 465088 usertrap_amd64.go:212] [ 58946: 58946] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:48.280959 465088 usertrap_amd64.go:122] [ 58946: 58946] Allocate a new trap: 0xc007ec96e0 41 D0312 10:47:48.281037 465088 usertrap_amd64.go:225] [ 58946: 58946] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:48.286168 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.286815 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.290411 465088 usertrap_amd64.go:212] [ 58947: 58947] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:48.290547 465088 usertrap_amd64.go:122] [ 58947: 58947] Allocate a new trap: 0xc00d9fd740 39 D0312 10:47:48.291063 465088 usertrap_amd64.go:225] [ 58947: 58947] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:48.304489 465088 usertrap_amd64.go:212] [ 58947: 58947] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:48.304542 465088 usertrap_amd64.go:122] [ 58947: 58947] Allocate a new trap: 0xc00d9fd740 40 D0312 10:47:48.304591 465088 usertrap_amd64.go:225] [ 58947: 58947] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:48.314764 465088 usertrap_amd64.go:212] [ 58945: 58945] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:48.314873 465088 usertrap_amd64.go:122] [ 58945: 58945] Allocate a new trap: 0xc00eb115c0 40 D0312 10:47:48.315258 465088 usertrap_amd64.go:225] [ 58945: 58945] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:48.316704 465088 usertrap_amd64.go:212] [ 58945: 58945] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:48.316739 465088 usertrap_amd64.go:122] [ 58945: 58945] Allocate a new trap: 0xc00eb115c0 41 D0312 10:47:48.316804 465088 usertrap_amd64.go:225] [ 58945: 58945] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:48.329260 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.329652 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.343126 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.344000 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.346701 465088 usertrap_amd64.go:212] [ 58946: 58946] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:48.346777 465088 usertrap_amd64.go:122] [ 58946: 58946] Allocate a new trap: 0xc007ec96e0 42 D0312 10:47:48.346837 465088 usertrap_amd64.go:225] [ 58946: 58946] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:48.367345 465088 usertrap_amd64.go:212] [ 58947: 58947] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:48.367921 465088 usertrap_amd64.go:122] [ 58947: 58947] Allocate a new trap: 0xc00d9fd740 41 D0312 10:47:48.368024 465088 usertrap_amd64.go:225] [ 58947: 58947] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:48.439106 465088 usertrap_amd64.go:212] [ 58923: 58923] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:48.439212 465088 usertrap_amd64.go:122] [ 58923: 58923] Allocate a new trap: 0xc00d9fd0e0 44 D0312 10:47:48.439275 465088 usertrap_amd64.go:225] [ 58923: 58923] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:48.441776 465088 usertrap_amd64.go:212] [ 58945: 58945] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:48.441836 465088 usertrap_amd64.go:122] [ 58945: 58945] Allocate a new trap: 0xc00eb115c0 42 D0312 10:47:48.441901 465088 usertrap_amd64.go:225] [ 58945: 58945] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:48.447555 465088 task_exit.go:204] [ 58923: 58923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.447833 465088 task_exit.go:204] [ 58923: 58923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.449938 465088 task_signals.go:204] [ 58923: 58930] Signal 58923, PID: 58930, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.450014 465088 task_signals.go:204] [ 58923: 58934] Signal 58923, PID: 58934, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.450043 465088 task_signals.go:204] [ 58923: 58931] Signal 58923, PID: 58931, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.449961 465088 task_signals.go:204] [ 58923: 58929] Signal 58923, PID: 58929, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.450077 465088 task_exit.go:204] [ 58923: 58930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.450352 465088 task_exit.go:204] [ 58923: 58930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.450422 465088 task_exit.go:204] [ 58923: 58930] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.450574 465088 task_signals.go:204] [ 58923: 58935] Signal 58923, PID: 58935, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.450713 465088 task_exit.go:204] [ 58923: 58935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.450950 465088 task_exit.go:204] [ 58923: 58935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.451009 465088 task_exit.go:204] [ 58923: 58935] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.451153 465088 task_exit.go:204] [ 58923: 58934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.451446 465088 task_exit.go:204] [ 58923: 58931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.451620 465088 task_signals.go:204] [ 58923: 58933] Signal 58923, PID: 58933, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.451715 465088 task_exit.go:204] [ 58923: 58929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.451898 465088 task_exit.go:204] [ 58923: 58929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.452698 465088 task_exit.go:204] [ 58923: 58929] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.452867 465088 task_exit.go:204] [ 58923: 58934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.452929 465088 task_exit.go:204] [ 58923: 58934] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.453060 465088 task_exit.go:204] [ 58923: 58933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.453185 465088 task_exit.go:204] [ 58923: 58931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.453227 465088 task_exit.go:204] [ 58923: 58931] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.455960 465088 task_exit.go:204] [ 58923: 58933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.456009 465088 task_exit.go:204] [ 58923: 58933] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.456107 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:48.468918 465088 task_exit.go:204] [ 58923: 58923] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.470716 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.474302 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.502576 465088 task_signals.go:470] [ 7: 9] Notified of signal 23 D0312 10:47:48.507231 465088 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler 10:47:48 executing program 0: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/88}, 0x60, 0x0, 0x3800) (async) r0 = msgget(0x1, 0x200) msgsnd(r0, &(0x7f0000000080)={0x0, "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"}, 0x1008, 0xaafaae712fda944d) (async, rerun: 32) msgsnd(r0, &(0x7f00000010c0)={0x2, "52abfc10827244b6c6c4761840ac63d41f1579d1770bfb946d13b72ca08278e93e471fdf4c5902ec61eedd4992f5839ef1d8fbe59130960cbae18304b38cd9ae00cf84f5e38cbd7937d2b77ce9ac2b588e0f4a1f5ad8e2659fb0dd79a8136bacb5e8a69d2d774982ff5cd0756c29d3de291f950f8f5a9ed93f222e82699625"}, 0x87, 0x800) (async, rerun: 32) msgsnd(r0, &(0x7f0000001180)={0x2, "a42dc609be31c19c2d6bd591291533e81590a0e01bac2a8069bcde1d92e625aca2d7c772141700b8fa3ad1dea0a65af74a4d2cdd0699bf829bdc3fd41636b233b7061680efed8f58cfd9966ca2bbbe102b5c04a2d8ba2cd93cf9b97d33c0fccbb962dabbc83aec66f0ce218657d74f2ab85ee06e7e015ebd3c0d9ac07e602381be1e10ed1e097f5fdd3306a1b03d187aa91a5f5a249d57fb8c44e59e2983626052e3686221d7674efd98adfe34a5dc07545428aef8e3e8ce86"}, 0xc1, 0x0) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000001280)=""/62) msgrcv(0xffffffffffffffff, &(0x7f00000012c0)={0x0, ""/1}, 0x9, 0x2, 0x800) r1 = msgget(0x0, 0x88) msgrcv(r1, &(0x7f0000001300)={0x0, ""/86}, 0x5e, 0x1, 0x3800) (async) msgrcv(r0, &(0x7f0000001380)={0x0, ""/220}, 0xe4, 0x1, 0x3000) (async) r2 = msgget(0x3, 0x2) msgrcv(r2, &(0x7f0000001480)={0x0, ""/87}, 0x5f, 0x3, 0x1000) (async) msgsnd(r0, &(0x7f0000001500)={0x1, "29aed7dfb6e127d169b382f51c7e2ec5b7ad72e97a9537d6de16b4c8cefca9d718be1b4016963329d9ef2abda1383fc4e2dcb7b35d1aabba339b7907bd733f24a3d9daa292ae823660a6b0ff24c4"}, 0x56, 0x0) msgsnd(r2, &(0x7f0000001580)={0x3, "6d7a49809fb81dd70d2febee5079b38246f97e99c6a4592c682f13c3c5a707b63b73387ae4f234a913e6d67efc8f075bb04d32b100c0abfc6d64ad468e1b6bb4543c300597f7b4c4306107a7bf5be2beb41c13a8087fb50b4ce6847b91663f29a1a8ac521006a9e320b226f72bf9c200664164fa07ec5c6c896df4ae34669da8efcd51c90e5ca030384e4bbecc8bbb93914b238ab46f585355d16480705be9e7e7baf9b7fa69c7ac22eeba8caae1880939ea1fa2ad9d4c350ae07597798cb34d40cbf32383031390c81feb6fb794e47b272940d49d38"}, 0xde, 0x0) msgrcv(r0, &(0x7f0000001680)={0x0, ""/247}, 0xff, 0x6, 0x800) r3 = msgget$private(0x0, 0x388) (async) msgsnd(r0, &(0x7f0000001780)={0x0, "a57095cd94a5f58eeaad11db102b65b7a270e814e7"}, 0x1d, 0x800) msgget$private(0x0, 0x8) (async) msgsnd(0xffffffffffffffff, &(0x7f00000017c0)={0x2, "19ac56"}, 0xb, 0x800) r4 = msgget(0x3, 0x8) msgrcv(r4, &(0x7f0000001800)={0x0, ""/59}, 0x43, 0x2, 0x1000) msgrcv(r0, &(0x7f0000001880)={0x0, ""/4096}, 0x1008, 0x2, 0x1000) r5 = msgget$private(0x0, 0x2) msgrcv(r5, &(0x7f00000028c0)={0x0, ""/45}, 0x35, 0x3, 0x2800) (async) r6 = msgget(0x0, 0x44) msgrcv(r6, &(0x7f0000002900)={0x0, ""/210}, 0xda, 0x0, 0x1000) (async) msgrcv(r3, &(0x7f0000002a00)={0x0, ""/138}, 0x92, 0x0, 0x0) r7 = msgget$private(0x0, 0x101) msgrcv(r7, &(0x7f0000002ac0)={0x0, ""/144}, 0x98, 0x3, 0x3800) (async) msgsnd(0x0, &(0x7f0000002b80)={0x2, "61a7652cb7d18ae8a754f3cc2e3b56f4b3aef745f17d236cf59d46553647ae53ccbead8355cf682d080c2f67137f0364c3a4c3b3a59de051af321c8afa160181abf69a964aea13f311b4626411ca0048f65fe918af037f6f39bf1ac1f4f675b1b426031b748ce88907f73bea564a86e3a4fd9af2cf806e44ac"}, 0x81, 0x800) D0312 10:47:48.513427 465088 usertrap_amd64.go:212] [ 58946: 58946] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:48.513524 465088 usertrap_amd64.go:122] [ 58946: 58946] Allocate a new trap: 0xc007ec96e0 43 D0312 10:47:48.513604 465088 usertrap_amd64.go:225] [ 58946: 58946] Apply the binary patch addr 55c5b5e1be1a trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:48.514714 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.516642 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.520308 465088 usertrap_amd64.go:212] [ 58946: 58946] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:48.520368 465088 usertrap_amd64.go:122] [ 58946: 58946] Allocate a new trap: 0xc007ec96e0 44 D0312 10:47:48.520459 465088 usertrap_amd64.go:225] [ 58946: 58946] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:48.526032 465088 task_exit.go:204] [ 58946: 58946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.526152 465088 task_signals.go:204] [ 58946: 58950] Signal 58946, PID: 58950, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.526245 465088 task_signals.go:204] [ 58946: 58948] Signal 58946, PID: 58948, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.526254 465088 task_exit.go:204] [ 58946: 58946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.526318 465088 task_exit.go:204] [ 58946: 58948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.526406 465088 task_exit.go:204] [ 58946: 58950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.526540 465088 task_signals.go:204] [ 58946: 58952] Signal 58946, PID: 58952, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.526636 465088 task_exit.go:204] [ 58946: 58950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.526665 465088 task_exit.go:204] [ 58946: 58950] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.526805 465088 task_exit.go:204] [ 58946: 58948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.526840 465088 task_exit.go:204] [ 58946: 58948] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.526919 465088 task_exit.go:204] [ 58946: 58952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.529762 465088 task_exit.go:204] [ 58946: 58952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.529844 465088 task_exit.go:204] [ 58946: 58952] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.529918 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:48.533271 465088 task_exit.go:204] [ 58946: 58946] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.534514 465088 usertrap_amd64.go:212] [ 58945: 58945] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:48.534586 465088 usertrap_amd64.go:122] [ 58945: 58945] Allocate a new trap: 0xc00eb115c0 43 D0312 10:47:48.534681 465088 usertrap_amd64.go:225] [ 58945: 58945] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) 10:47:48 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) D0312 10:47:48.538969 465088 task_exit.go:204] [ 58945: 58945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.539105 465088 task_signals.go:204] [ 58945: 58951] Signal 58945, PID: 58951, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.539225 465088 task_exit.go:204] [ 58945: 58951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.539352 465088 task_signals.go:204] [ 58945: 58953] Signal 58945, PID: 58953, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.539498 465088 task_exit.go:204] [ 58945: 58953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.539687 465088 task_exit.go:204] [ 58945: 58945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.540060 465088 task_exit.go:204] [ 58945: 58951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.540129 465088 task_exit.go:204] [ 58945: 58951] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.541876 465088 task_exit.go:204] [ 58945: 58953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.542709 465088 task_exit.go:204] [ 58945: 58953] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.542803 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:48.542913 465088 task_exit.go:204] [ 58945: 58945] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.546908 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.547306 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:48 executing program 2: ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x5450, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'hsr0\x00', @multicast}) D0312 10:47:48.552218 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.555274 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.567450 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.567816 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.570832 465088 usertrap_amd64.go:212] [ 58947: 58947] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:48.570884 465088 usertrap_amd64.go:122] [ 58947: 58947] Allocate a new trap: 0xc00d9fd740 42 D0312 10:47:48.570952 465088 usertrap_amd64.go:225] [ 58947: 58947] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:48.623175 465088 usertrap_amd64.go:212] [ 58955: 58955] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:48.623338 465088 usertrap_amd64.go:122] [ 58955: 58955] Allocate a new trap: 0xc002a435f0 40 D0312 10:47:48.623838 465088 usertrap_amd64.go:225] [ 58955: 58955] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:48.629752 465088 usertrap_amd64.go:212] [ 58955: 58955] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:48.629808 465088 usertrap_amd64.go:122] [ 58955: 58955] Allocate a new trap: 0xc002a435f0 41 D0312 10:47:48.629888 465088 usertrap_amd64.go:225] [ 58955: 58955] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:48.632994 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.633303 465088 usertrap_amd64.go:212] [ 58957: 58957] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:48.633394 465088 usertrap_amd64.go:122] [ 58957: 58957] Allocate a new trap: 0xc00ade5ce0 40 D0312 10:47:48.633928 465088 usertrap_amd64.go:225] [ 58957: 58957] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:48.635513 465088 usertrap_amd64.go:212] [ 58956: 58956] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:48.635603 465088 usertrap_amd64.go:122] [ 58956: 58956] Allocate a new trap: 0xc00eb11650 40 D0312 10:47:48.635757 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.636097 465088 usertrap_amd64.go:225] [ 58956: 58956] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:48.637321 465088 usertrap_amd64.go:212] [ 58957: 58957] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:48.637410 465088 usertrap_amd64.go:122] [ 58957: 58957] Allocate a new trap: 0xc00ade5ce0 41 D0312 10:47:48.637488 465088 usertrap_amd64.go:225] [ 58957: 58957] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:48.640130 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.641494 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.647069 465088 usertrap_amd64.go:212] [ 58956: 58956] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:48.647136 465088 usertrap_amd64.go:122] [ 58956: 58956] Allocate a new trap: 0xc00eb11650 41 D0312 10:47:48.647196 465088 usertrap_amd64.go:225] [ 58956: 58956] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:48.651938 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.652252 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.660249 465088 usertrap_amd64.go:212] [ 58957: 58957] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:48.660309 465088 usertrap_amd64.go:122] [ 58957: 58957] Allocate a new trap: 0xc00ade5ce0 42 D0312 10:47:48.660358 465088 usertrap_amd64.go:225] [ 58957: 58957] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:48.663239 465088 usertrap_amd64.go:212] [ 58955: 58955] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:48.663317 465088 usertrap_amd64.go:122] [ 58955: 58955] Allocate a new trap: 0xc002a435f0 42 D0312 10:47:48.663403 465088 usertrap_amd64.go:225] [ 58955: 58955] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:48.674236 465088 usertrap_amd64.go:212] [ 58956: 58956] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:48.674287 465088 usertrap_amd64.go:122] [ 58956: 58956] Allocate a new trap: 0xc00eb11650 42 D0312 10:47:48.674359 465088 usertrap_amd64.go:225] [ 58956: 58956] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:48.693155 465088 usertrap_amd64.go:212] [ 58957: 58957] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:48.693261 465088 usertrap_amd64.go:122] [ 58957: 58957] Allocate a new trap: 0xc00ade5ce0 43 D0312 10:47:48.693401 465088 usertrap_amd64.go:225] [ 58957: 58957] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:48.707196 465088 task_exit.go:204] [ 58957: 58957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.707412 465088 task_exit.go:204] [ 58957: 58957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.707497 465088 task_signals.go:204] [ 58957: 58960] Signal 58957, PID: 58960, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.707615 465088 task_exit.go:204] [ 58957: 58960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.707850 465088 task_exit.go:204] [ 58957: 58960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.707935 465088 task_exit.go:204] [ 58957: 58960] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.708108 465088 task_signals.go:204] [ 58957: 58958] Signal 58957, PID: 58958, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.708216 465088 task_exit.go:204] [ 58957: 58958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.710993 465088 task_exit.go:204] [ 58957: 58958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.711094 465088 task_exit.go:204] [ 58957: 58958] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.711178 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:48.716382 465088 task_exit.go:204] [ 58957: 58957] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:48 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0xc1, 0x3, 0xc4, "e4a717dddaf3c5f410b88ef7ffbcbf88", "64e60d6bce1b39f439badf49b1dcac4ad2ce741c9c5894b68f2f58d8b4c366f7aa123cd1f31c57a3d48dfb97657abc3026d0698d7546ed3504bb82b5822402bbb36f4cf3f879374df08c89590d91036a1320ceb4266f1f89d210b2b9623eac737d098459905459e7d434502d80c4751e28a307bf0ef2ad4f89a9473567ed3e50f25cc291884d73e727c14c6af03a9d8de79a1391cc283de854128c4fd86070e690805d2d4899fada635478f0"}, 0xc1, 0x4) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$netlink(0x10, 0x3, 0xf) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000200)) D0312 10:47:48.744028 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.744573 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.769459 465088 usertrap_amd64.go:212] [ 58956: 58956] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:48.769536 465088 usertrap_amd64.go:122] [ 58956: 58956] Allocate a new trap: 0xc00eb11650 43 D0312 10:47:48.769619 465088 usertrap_amd64.go:225] [ 58956: 58956] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:48.771982 465088 task_exit.go:204] [ 58956: 58956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.772199 465088 task_signals.go:204] [ 58956: 58961] Signal 58956, PID: 58961, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.772332 465088 task_exit.go:204] [ 58956: 58956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.772499 465088 task_exit.go:204] [ 58956: 58961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.775094 465088 task_exit.go:204] [ 58956: 58961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.775237 465088 task_exit.go:204] [ 58956: 58961] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.775439 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:48.775686 465088 task_exit.go:204] [ 58956: 58956] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:48 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) D0312 10:47:48.783744 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.784162 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.793756 465088 usertrap_amd64.go:212] [ 58965: 58965] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:48.794093 465088 usertrap_amd64.go:122] [ 58965: 58965] Allocate a new trap: 0xc007f8b7a0 40 D0312 10:47:48.797692 465088 usertrap_amd64.go:225] [ 58965: 58965] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:48.800320 465088 usertrap_amd64.go:212] [ 58965: 58965] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:48.800370 465088 usertrap_amd64.go:122] [ 58965: 58965] Allocate a new trap: 0xc007f8b7a0 41 D0312 10:47:48.800429 465088 usertrap_amd64.go:225] [ 58965: 58965] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:48.802503 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.802880 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.823055 465088 usertrap_amd64.go:212] [ 58966: 58966] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:48.823257 465088 usertrap_amd64.go:122] [ 58966: 58966] Allocate a new trap: 0xc00eb11710 40 D0312 10:47:48.823687 465088 usertrap_amd64.go:225] [ 58966: 58966] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:48.827721 465088 usertrap_amd64.go:212] [ 58966: 58966] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:48.827760 465088 usertrap_amd64.go:212] [ 58965: 58965] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:48.827802 465088 usertrap_amd64.go:122] [ 58965: 58965] Allocate a new trap: 0xc007f8b7a0 42 D0312 10:47:48.827770 465088 usertrap_amd64.go:122] [ 58966: 58966] Allocate a new trap: 0xc00eb11710 41 D0312 10:47:48.827872 465088 usertrap_amd64.go:225] [ 58965: 58965] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:48.828073 465088 usertrap_amd64.go:225] [ 58966: 58966] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:48.830960 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:48.832055 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.853519 465088 usertrap_amd64.go:212] [ 58966: 58966] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:48.853636 465088 usertrap_amd64.go:122] [ 58966: 58966] Allocate a new trap: 0xc00eb11710 42 D0312 10:47:48.853702 465088 usertrap_amd64.go:225] [ 58966: 58966] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:48.880453 465088 usertrap_amd64.go:212] [ 58965: 58965] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:48.880562 465088 usertrap_amd64.go:122] [ 58965: 58965] Allocate a new trap: 0xc007f8b7a0 43 D0312 10:47:48.880649 465088 usertrap_amd64.go:225] [ 58965: 58965] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:48.888855 465088 usertrap_amd64.go:212] [ 58955: 58955] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:48.888996 465088 usertrap_amd64.go:122] [ 58955: 58955] Allocate a new trap: 0xc002a435f0 43 D0312 10:47:48.889065 465088 usertrap_amd64.go:225] [ 58955: 58955] Apply the binary patch addr 5652f299ce1a trap addr 60d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:48.894007 465088 task_exit.go:204] [ 58965: 58965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.894207 465088 task_exit.go:204] [ 58965: 58965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.895470 465088 task_signals.go:204] [ 58965: 58967] Signal 58965, PID: 58967, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.895539 465088 task_exit.go:204] [ 58965: 58967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.897980 465088 task_exit.go:204] [ 58965: 58967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.898053 465088 task_exit.go:204] [ 58965: 58967] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.898156 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:48.905032 465088 task_exit.go:204] [ 58965: 58965] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.926615 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:48.927207 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:48.966224 465088 usertrap_amd64.go:212] [ 58966: 58966] Found the pattern at ip 55c5b5e1be1a:sysno 230 D0312 10:47:48.966322 465088 usertrap_amd64.go:122] [ 58966: 58966] Allocate a new trap: 0xc00eb11710 43 D0312 10:47:48.966380 465088 usertrap_amd64.go:225] [ 58966: 58966] Apply the binary patch addr 55c5b5e1be1a trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:48.978626 465088 usertrap_amd64.go:212] [ 58966: 58966] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:48.978728 465088 usertrap_amd64.go:122] [ 58966: 58966] Allocate a new trap: 0xc00eb11710 44 D0312 10:47:48.978802 465088 usertrap_amd64.go:225] [ 58966: 58966] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:48.985416 465088 task_exit.go:204] [ 58966: 58966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.985601 465088 task_signals.go:204] [ 58966: 58969] Signal 58966, PID: 58969, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985663 465088 task_signals.go:204] [ 58966: 58970] Signal 58966, PID: 58970, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985618 465088 task_signals.go:204] [ 58966: 58972] Signal 58966, PID: 58972, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985737 465088 task_signals.go:204] [ 58966: 58971] Signal 58966, PID: 58971, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985767 465088 task_signals.go:204] [ 58966: 58968] Signal 58966, PID: 58968, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985781 465088 task_signals.go:204] [ 58966: 58973] Signal 58966, PID: 58973, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.985870 465088 task_exit.go:204] [ 58966: 58970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.985960 465088 task_signals.go:204] [ 58966: 58974] Signal 58966, PID: 58974, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:48.986064 465088 task_exit.go:204] [ 58966: 58974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.986286 465088 task_exit.go:204] [ 58966: 58970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.986367 465088 task_exit.go:204] [ 58966: 58970] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.986448 465088 task_exit.go:204] [ 58966: 58966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.986551 465088 task_exit.go:204] [ 58966: 58971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.986697 465088 task_exit.go:204] [ 58966: 58971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.986738 465088 task_exit.go:204] [ 58966: 58971] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.986813 465088 task_exit.go:204] [ 58966: 58968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.986936 465088 task_exit.go:204] [ 58966: 58968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.986979 465088 task_exit.go:204] [ 58966: 58968] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.987056 465088 task_exit.go:204] [ 58966: 58973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.987200 465088 task_exit.go:204] [ 58966: 58973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.987228 465088 task_exit.go:204] [ 58966: 58973] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.987320 465088 task_exit.go:204] [ 58966: 58969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.987391 465088 task_exit.go:204] [ 58966: 58972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:48.987472 465088 task_exit.go:204] [ 58966: 58974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.987522 465088 task_exit.go:204] [ 58966: 58974] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.987692 465088 task_exit.go:204] [ 58966: 58969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.987756 465088 task_exit.go:204] [ 58966: 58969] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.990455 465088 task_exit.go:204] [ 58966: 58972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:48.990522 465088 task_exit.go:204] [ 58966: 58972] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:48.990603 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:48.995297 465088 task_exit.go:204] [ 58966: 58966] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.016711 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.020803 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.188326 465088 usertrap_amd64.go:212] [ 58947: 58947] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:49.188464 465088 usertrap_amd64.go:122] [ 58947: 58947] Allocate a new trap: 0xc00d9fd740 43 D0312 10:47:49.188581 465088 usertrap_amd64.go:225] [ 58947: 58947] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:49.192891 465088 task_exit.go:204] [ 58947: 58947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.193208 465088 task_exit.go:204] [ 58947: 58947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.193530 465088 task_signals.go:204] [ 58947: 58949] Signal 58947, PID: 58949, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.193632 465088 task_exit.go:204] [ 58947: 58949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.193800 465088 task_exit.go:204] [ 58947: 58949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.193847 465088 task_exit.go:204] [ 58947: 58949] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.193988 465088 task_signals.go:204] [ 58947: 58954] Signal 58947, PID: 58954, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.194077 465088 task_exit.go:204] [ 58947: 58954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.197425 465088 task_exit.go:204] [ 58947: 58954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.197472 465088 task_exit.go:204] [ 58947: 58954] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.197551 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:49.199325 465088 task_exit.go:204] [ 58947: 58947] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, 0x14) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r5) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r5, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r6 = eventfd(0x2) dup2(r3, r6) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:49.203765 465088 task_signals.go:470] [ 7: 9388] Notified of signal 23 10:47:49 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0xc1, 0x3, 0xc4, "e4a717dddaf3c5f410b88ef7ffbcbf88", "64e60d6bce1b39f439badf49b1dcac4ad2ce741c9c5894b68f2f58d8b4c366f7aa123cd1f31c57a3d48dfb97657abc3026d0698d7546ed3504bb82b5822402bbb36f4cf3f879374df08c89590d91036a1320ceb4266f1f89d210b2b9623eac737d098459905459e7d434502d80c4751e28a307bf0ef2ad4f89a9473567ed3e50f25cc291884d73e727c14c6af03a9d8de79a1391cc283de854128c4fd86070e690805d2d4899fada635478f0"}, 0xc1, 0x4) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async, rerun: 32) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) fcntl$dupfd(r2, 0x0, r2) (async) r3 = socket$netlink(0x10, 0x3, 0xf) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000200)) D0312 10:47:49.203984 465088 task_signals.go:220] [ 7: 9388] Signal 23: delivering to handler 10:47:49 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) D0312 10:47:49.216743 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.218228 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.251521 465088 usertrap_amd64.go:212] [ 58976: 58976] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:49.251854 465088 usertrap_amd64.go:122] [ 58976: 58976] Allocate a new trap: 0xc007f0de00 40 D0312 10:47:49.252230 465088 usertrap_amd64.go:225] [ 58976: 58976] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:49.258371 465088 usertrap_amd64.go:212] [ 58976: 58976] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:49.258448 465088 usertrap_amd64.go:122] [ 58976: 58976] Allocate a new trap: 0xc007f0de00 41 D0312 10:47:49.258505 465088 usertrap_amd64.go:225] [ 58976: 58976] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:49.258695 465088 usertrap_amd64.go:212] [ 58975: 58975] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:49.258823 465088 usertrap_amd64.go:122] [ 58975: 58975] Allocate a new trap: 0xc002a43770 40 D0312 10:47:49.259272 465088 usertrap_amd64.go:225] [ 58975: 58975] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:49.261175 465088 usertrap_amd64.go:212] [ 58975: 58975] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:49.261266 465088 usertrap_amd64.go:122] [ 58975: 58975] Allocate a new trap: 0xc002a43770 41 D0312 10:47:49.261352 465088 usertrap_amd64.go:225] [ 58975: 58975] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:49.261555 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.262006 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.271377 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.271910 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.285840 465088 usertrap_amd64.go:212] [ 58976: 58976] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:49.285929 465088 usertrap_amd64.go:122] [ 58976: 58976] Allocate a new trap: 0xc007f0de00 42 D0312 10:47:49.285990 465088 usertrap_amd64.go:225] [ 58976: 58976] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:49.289612 465088 usertrap_amd64.go:212] [ 58975: 58975] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:49.289700 465088 usertrap_amd64.go:122] [ 58975: 58975] Allocate a new trap: 0xc002a43770 42 D0312 10:47:49.289760 465088 usertrap_amd64.go:225] [ 58975: 58975] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:49.294602 465088 usertrap_amd64.go:212] [ 58977: 58977] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:49.294764 465088 usertrap_amd64.go:122] [ 58977: 58977] Allocate a new trap: 0xc00ade5e60 39 D0312 10:47:49.295241 465088 usertrap_amd64.go:225] [ 58977: 58977] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:49.298074 465088 usertrap_amd64.go:212] [ 58977: 58977] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:49.298144 465088 usertrap_amd64.go:122] [ 58977: 58977] Allocate a new trap: 0xc00ade5e60 40 D0312 10:47:49.298223 465088 usertrap_amd64.go:225] [ 58977: 58977] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:49.309298 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.309821 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.328463 465088 usertrap_amd64.go:212] [ 58977: 58977] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:49.328560 465088 usertrap_amd64.go:122] [ 58977: 58977] Allocate a new trap: 0xc00ade5e60 41 D0312 10:47:49.328667 465088 usertrap_amd64.go:225] [ 58977: 58977] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:49.351121 465088 usertrap_amd64.go:212] [ 58976: 58976] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:49.351221 465088 usertrap_amd64.go:122] [ 58976: 58976] Allocate a new trap: 0xc007f0de00 43 D0312 10:47:49.351790 465088 usertrap_amd64.go:225] [ 58976: 58976] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:49.361934 465088 task_exit.go:204] [ 58976: 58976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.362628 465088 task_signals.go:204] [ 58976: 58978] Signal 58976, PID: 58978, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.362712 465088 task_exit.go:204] [ 58976: 58976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.362894 465088 task_signals.go:204] [ 58976: 58979] Signal 58976, PID: 58979, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.362967 465088 task_exit.go:204] [ 58976: 58978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.363272 465088 task_exit.go:204] [ 58976: 58978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.363338 465088 task_exit.go:204] [ 58976: 58978] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.364102 465088 task_exit.go:204] [ 58976: 58979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.369133 465088 task_exit.go:204] [ 58976: 58979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.369217 465088 task_exit.go:204] [ 58976: 58979] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.369307 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:49.370977 465088 task_exit.go:204] [ 58976: 58976] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.377623 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.378010 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.384220 465088 usertrap_amd64.go:212] [ 58975: 58975] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:49.384320 465088 usertrap_amd64.go:122] [ 58975: 58975] Allocate a new trap: 0xc002a43770 43 D0312 10:47:49.384383 465088 usertrap_amd64.go:225] [ 58975: 58975] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:49.392248 465088 task_exit.go:204] [ 58975: 58975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.392571 465088 task_signals.go:204] [ 58975: 58980] Signal 58975, PID: 58980, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.392678 465088 task_exit.go:204] [ 58975: 58975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.392507 465088 task_signals.go:204] [ 58975: 58982] Signal 58975, PID: 58982, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.393045 465088 task_exit.go:204] [ 58975: 58982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.393270 465088 task_exit.go:204] [ 58975: 58982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.393325 465088 task_exit.go:204] [ 58975: 58982] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.393685 465088 task_exit.go:204] [ 58975: 58980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.397260 465088 task_exit.go:204] [ 58975: 58980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.397326 465088 task_exit.go:204] [ 58975: 58980] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.397444 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:49.397798 465088 task_exit.go:204] [ 58975: 58975] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.406943 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.407387 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.452192 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.452610 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.465618 465088 usertrap_amd64.go:212] [ 58977: 58977] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:49.465689 465088 usertrap_amd64.go:122] [ 58977: 58977] Allocate a new trap: 0xc00ade5e60 42 D0312 10:47:49.465802 465088 usertrap_amd64.go:225] [ 58977: 58977] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:49.480705 465088 usertrap_amd64.go:212] [ 58955: 58955] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:49.480826 465088 usertrap_amd64.go:122] [ 58955: 58955] Allocate a new trap: 0xc002a435f0 44 D0312 10:47:49.481026 465088 usertrap_amd64.go:225] [ 58955: 58955] Apply the binary patch addr 5652f2929fa4 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0312 10:47:49.484367 465088 task_exit.go:204] [ 58955: 58955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.484607 465088 task_signals.go:204] [ 58955: 58959] Signal 58955, PID: 58959, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.484750 465088 task_signals.go:204] [ 58955: 58964] Signal 58955, PID: 58964, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.484790 465088 task_signals.go:204] [ 58955: 58963] Signal 58955, PID: 58963, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.484759 465088 task_signals.go:204] [ 58955: 58962] Signal 58955, PID: 58962, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.484880 465088 task_exit.go:204] [ 58955: 58955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.485058 465088 task_exit.go:204] [ 58955: 58962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.485300 465088 task_exit.go:204] [ 58955: 58962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.485390 465088 task_exit.go:204] [ 58955: 58962] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.485473 465088 task_exit.go:204] [ 58955: 58959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.485610 465088 task_exit.go:204] [ 58955: 58959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.485639 465088 task_exit.go:204] [ 58955: 58959] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.485748 465088 task_exit.go:204] [ 58955: 58964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.485941 465088 task_exit.go:204] [ 58955: 58964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.485996 465088 task_exit.go:204] [ 58955: 58964] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.486088 465088 task_exit.go:204] [ 58955: 58963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.489478 465088 task_exit.go:204] [ 58955: 58963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.489546 465088 task_exit.go:204] [ 58955: 58963] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.489650 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:49.489745 465088 task_exit.go:204] [ 58955: 58955] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:49 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0xc1, 0x3, 0xc4, "e4a717dddaf3c5f410b88ef7ffbcbf88", "64e60d6bce1b39f439badf49b1dcac4ad2ce741c9c5894b68f2f58d8b4c366f7aa123cd1f31c57a3d48dfb97657abc3026d0698d7546ed3504bb82b5822402bbb36f4cf3f879374df08c89590d91036a1320ceb4266f1f89d210b2b9623eac737d098459905459e7d434502d80c4751e28a307bf0ef2ad4f89a9473567ed3e50f25cc291884d73e727c14c6af03a9d8de79a1391cc283de854128c4fd86070e690805d2d4899fada635478f0"}, 0xc1, 0x4) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$netlink(0x10, 0x3, 0xf) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000200)) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0xc1, 0x3, 0xc4, "e4a717dddaf3c5f410b88ef7ffbcbf88", "64e60d6bce1b39f439badf49b1dcac4ad2ce741c9c5894b68f2f58d8b4c366f7aa123cd1f31c57a3d48dfb97657abc3026d0698d7546ed3504bb82b5822402bbb36f4cf3f879374df08c89590d91036a1320ceb4266f1f89d210b2b9623eac737d098459905459e7d434502d80c4751e28a307bf0ef2ad4f89a9473567ed3e50f25cc291884d73e727c14c6af03a9d8de79a1391cc283de854128c4fd86070e690805d2d4899fada635478f0"}, 0xc1, 0x4) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) fcntl$dupfd(r2, 0x0, r2) (async) socket$netlink(0x10, 0x3, 0xf) (async) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000200)) (async) 10:47:49 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) r2 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE(r2, 0x5000940c, 0x0) close(r1) r3 = gettid() tkill(r3, 0x401004000000016) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r4) D0312 10:47:49.498608 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.499099 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:49 executing program 1: r0 = getpid() getpgid(r0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000180)=0x18) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x5451, 0x0) D0312 10:47:49.553498 465088 usertrap_amd64.go:212] [ 58985: 58985] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:49.553655 465088 usertrap_amd64.go:122] [ 58985: 58985] Allocate a new trap: 0xc006f3fc50 40 D0312 10:47:49.554693 465088 usertrap_amd64.go:225] [ 58985: 58985] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:49.559246 465088 usertrap_amd64.go:212] [ 58984: 58984] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:49.559354 465088 usertrap_amd64.go:122] [ 58984: 58984] Allocate a new trap: 0xc00cf31a10 40 D0312 10:47:49.559792 465088 usertrap_amd64.go:225] [ 58984: 58984] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:49.562137 465088 usertrap_amd64.go:212] [ 58985: 58985] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:49.562214 465088 usertrap_amd64.go:212] [ 58984: 58984] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:49.562211 465088 usertrap_amd64.go:122] [ 58985: 58985] Allocate a new trap: 0xc006f3fc50 41 D0312 10:47:49.562259 465088 usertrap_amd64.go:122] [ 58984: 58984] Allocate a new trap: 0xc00cf31a10 41 D0312 10:47:49.562320 465088 usertrap_amd64.go:225] [ 58985: 58985] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:49.562334 465088 usertrap_amd64.go:225] [ 58984: 58984] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:49.565731 465088 usertrap_amd64.go:212] [ 58986: 58986] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:49.565831 465088 usertrap_amd64.go:122] [ 58986: 58986] Allocate a new trap: 0xc00eb11920 40 D0312 10:47:49.566179 465088 usertrap_amd64.go:225] [ 58986: 58986] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:49.567158 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.567662 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.579036 465088 usertrap_amd64.go:212] [ 58985: 58985] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:49.579164 465088 usertrap_amd64.go:122] [ 58985: 58985] Allocate a new trap: 0xc006f3fc50 42 D0312 10:47:49.579291 465088 usertrap_amd64.go:225] [ 58985: 58985] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:49.586007 465088 usertrap_amd64.go:212] [ 58986: 58986] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:49.586126 465088 usertrap_amd64.go:122] [ 58986: 58986] Allocate a new trap: 0xc00eb11920 41 D0312 10:47:49.586249 465088 usertrap_amd64.go:225] [ 58986: 58986] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:49.587063 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.590858 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.596019 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.596350 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.611853 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.621222 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.621441 465088 usertrap_amd64.go:212] [ 58984: 58984] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:49.621553 465088 usertrap_amd64.go:122] [ 58984: 58984] Allocate a new trap: 0xc00cf31a10 42 D0312 10:47:49.621650 465088 usertrap_amd64.go:225] [ 58984: 58984] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:49.632837 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.635987 465088 usertrap_amd64.go:212] [ 58986: 58986] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:49.636095 465088 usertrap_amd64.go:122] [ 58986: 58986] Allocate a new trap: 0xc00eb11920 42 D0312 10:47:49.636193 465088 usertrap_amd64.go:225] [ 58986: 58986] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:49.643018 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.651865 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.661088 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.672002 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.681823 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.691247 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.700982 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.711300 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.712108 465088 usertrap_amd64.go:212] [ 58986: 58986] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:49.712191 465088 usertrap_amd64.go:122] [ 58986: 58986] Allocate a new trap: 0xc00eb11920 43 D0312 10:47:49.712281 465088 usertrap_amd64.go:225] [ 58986: 58986] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:49.721045 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.731708 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.735489 465088 task_exit.go:204] [ 58986: 58986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.735857 465088 task_exit.go:204] [ 58986: 58986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.736122 465088 task_signals.go:204] [ 58986: 58989] Signal 58986, PID: 58989, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.736247 465088 task_exit.go:204] [ 58986: 58989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.738367 465088 task_exit.go:204] [ 58986: 58989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.738407 465088 task_exit.go:204] [ 58986: 58989] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.738488 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:49.740202 465088 task_exit.go:204] [ 58986: 58986] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:49 executing program 1: r0 = getpid() getpgid(r0) (async) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000180)=0x18) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x5451, 0x0) D0312 10:47:49.741964 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.751821 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.758610 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.760172 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.761115 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.771344 465088 usertrap_amd64.go:212] [ 58984: 58984] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:49.771416 465088 usertrap_amd64.go:122] [ 58984: 58984] Allocate a new trap: 0xc00cf31a10 43 D0312 10:47:49.771497 465088 usertrap_amd64.go:225] [ 58984: 58984] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:49.771549 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.781843 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.792114 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.799792 465088 usertrap_amd64.go:212] [ 58984: 58984] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:49.799874 465088 usertrap_amd64.go:122] [ 58984: 58984] Allocate a new trap: 0xc00cf31a10 44 D0312 10:47:49.799932 465088 usertrap_amd64.go:225] [ 58984: 58984] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:49.802238 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.811328 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.820253 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.820593 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.821074 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.825860 465088 task_signals.go:470] [ 58985: 58996] Notified of signal 22 D0312 10:47:49.826017 465088 task_signals.go:808] [ 58985: 58996] Signal 22: stopping 4 threads in thread group D0312 10:47:49.826117 465088 task_stop.go:118] [ 58985: 58996] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:49.826321 465088 task_stop.go:118] [ 58985: 58990] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:49.826460 465088 task_stop.go:118] [ 58985: 58985] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:49.826567 465088 task_signals.go:885] [ 58985: 58987] Completing group stop D0312 10:47:49.826628 465088 task_stop.go:118] [ 58985: 58987] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:49.826686 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:49.831011 465088 task_signals.go:828] [ 58985: 58985] Ending complete group stop with 0 threads pending D0312 10:47:49.831080 465088 task_stop.go:138] [ 58985: 58985] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:49.831144 465088 task_stop.go:138] [ 58985: 58987] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:49.831189 465088 task_stop.go:138] [ 58985: 58990] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:49.831239 465088 task_stop.go:138] [ 58985: 58996] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:49.831274 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.831461 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:49.831450 465088 task_run.go:182] [ 58985: 58990] Restarting syscall 1: not interrupted by handled signal D0312 10:47:49.831539 465088 task_run.go:179] [ 58985: 58985] Restarting syscall 202 with restart block: not interrupted by handled signal D0312 10:47:49.835485 465088 task_exit.go:204] [ 58984: 58984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.835731 465088 task_exit.go:204] [ 58984: 58984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.835858 465088 task_signals.go:204] [ 58984: 58991] Signal 58984, PID: 58991, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.835891 465088 task_signals.go:204] [ 58984: 58993] Signal 58984, PID: 58993, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.835998 465088 task_signals.go:204] [ 58984: 58988] Signal 58984, PID: 58988, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.836023 465088 task_signals.go:204] [ 58984: 58994] Signal 58984, PID: 58994, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.836044 465088 task_exit.go:204] [ 58984: 58991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.836316 465088 task_exit.go:204] [ 58984: 58991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.836310 465088 task_signals.go:204] [ 58984: 58992] Signal 58984, PID: 58992, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.836368 465088 task_exit.go:204] [ 58984: 58991] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.836536 465088 task_exit.go:204] [ 58984: 58993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.836760 465088 task_exit.go:204] [ 58984: 58993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.836841 465088 task_exit.go:204] [ 58984: 58993] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.836967 465088 task_exit.go:204] [ 58984: 58994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.837164 465088 task_exit.go:204] [ 58984: 58994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.837223 465088 task_exit.go:204] [ 58984: 58994] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.837422 465088 task_exit.go:204] [ 58984: 58992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.837588 465088 task_exit.go:204] [ 58984: 58992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.837645 465088 task_exit.go:204] [ 58984: 58992] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.837752 465088 task_exit.go:204] [ 58984: 58988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.840156 465088 task_exit.go:204] [ 58984: 58988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.840252 465088 task_exit.go:204] [ 58984: 58988] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.840334 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:49.840706 465088 task_exit.go:204] [ 58984: 58984] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.841310 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.842899 465088 usertrap_amd64.go:212] [ 58995: 58995] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:49.842980 465088 usertrap_amd64.go:122] [ 58995: 58995] Allocate a new trap: 0xc006f3fe60 40 10:47:49 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:49.845224 465088 usertrap_amd64.go:225] [ 58995: 58995] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:49.846640 465088 usertrap_amd64.go:212] [ 58995: 58995] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:49.846700 465088 usertrap_amd64.go:122] [ 58995: 58995] Allocate a new trap: 0xc006f3fe60 41 D0312 10:47:49.846816 465088 usertrap_amd64.go:225] [ 58995: 58995] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:49.847052 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.849185 465088 usertrap_amd64.go:212] [ 58985: 58985] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:49.849261 465088 usertrap_amd64.go:122] [ 58985: 58985] Allocate a new trap: 0xc006f3fc50 43 D0312 10:47:49.849333 465088 usertrap_amd64.go:225] [ 58985: 58985] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:49.851050 465088 task_signals.go:443] [ 58985: 58985] Discarding ignored signal 18 D0312 10:47:49.852019 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.852685 465088 task_exit.go:204] [ 58985: 58985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.852876 465088 task_exit.go:204] [ 58985: 58985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.853049 465088 task_signals.go:204] [ 58985: 58987] Signal 58985, PID: 58987, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.853197 465088 task_exit.go:204] [ 58985: 58987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.853456 465088 task_exit.go:204] [ 58985: 58987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.853514 465088 task_exit.go:204] [ 58985: 58987] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.853554 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.853939 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.855490 465088 task_signals.go:204] [ 58985: 58990] Signal 58985, PID: 58990, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.855596 465088 task_exit.go:204] [ 58985: 58990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.855831 465088 task_exit.go:204] [ 58985: 58990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.855909 465088 task_exit.go:204] [ 58985: 58990] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.856173 465088 task_signals.go:204] [ 58985: 58996] Signal 58985, PID: 58996, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.856284 465088 task_exit.go:204] [ 58985: 58996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.861679 465088 task_signals.go:481] [ 58985: 58985] No task notified of signal 18 D0312 10:47:49.863545 465088 task_exit.go:204] [ 58985: 58996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.863613 465088 task_exit.go:204] [ 58985: 58996] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.863715 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:49.865173 465088 task_exit.go:204] [ 58985: 58985] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.884060 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.884468 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.889457 465088 usertrap_amd64.go:212] [ 58995: 58995] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:49.889569 465088 usertrap_amd64.go:122] [ 58995: 58995] Allocate a new trap: 0xc006f3fe60 42 D0312 10:47:49.889639 465088 usertrap_amd64.go:225] [ 58995: 58995] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:49.931731 465088 usertrap_amd64.go:212] [ 58995: 58995] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:49.931798 465088 usertrap_amd64.go:122] [ 58995: 58995] Allocate a new trap: 0xc006f3fe60 43 D0312 10:47:49.931861 465088 usertrap_amd64.go:225] [ 58995: 58995] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:49.951930 465088 usertrap_amd64.go:212] [ 58997: 58997] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:49.952056 465088 usertrap_amd64.go:122] [ 58997: 58997] Allocate a new trap: 0xc007f8bcb0 40 D0312 10:47:49.952882 465088 usertrap_amd64.go:225] [ 58997: 58997] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:49.955791 465088 task_exit.go:204] [ 58995: 58995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.956075 465088 task_exit.go:204] [ 58995: 58995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.956622 465088 task_signals.go:204] [ 58995: 58999] Signal 58995, PID: 58999, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.956713 465088 task_exit.go:204] [ 58995: 58999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.956905 465088 task_exit.go:204] [ 58995: 58999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.956986 465088 task_exit.go:204] [ 58995: 58999] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.957720 465088 task_signals.go:204] [ 58995: 58998] Signal 58995, PID: 58998, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:49.957904 465088 task_exit.go:204] [ 58995: 58998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:49.958175 465088 usertrap_amd64.go:212] [ 58997: 58997] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:49.958251 465088 usertrap_amd64.go:122] [ 58997: 58997] Allocate a new trap: 0xc007f8bcb0 41 D0312 10:47:49.958313 465088 usertrap_amd64.go:225] [ 58997: 58997] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:49.961887 465088 task_exit.go:204] [ 58995: 58998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:49.961946 465088 task_exit.go:204] [ 58995: 58998] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.962017 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:49.966892 465088 task_exit.go:204] [ 58995: 58995] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:49.967208 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:49.971378 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:49.981981 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:49.983143 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.007647 465088 usertrap_amd64.go:212] [ 58997: 58997] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:50.007733 465088 usertrap_amd64.go:122] [ 58997: 58997] Allocate a new trap: 0xc007f8bcb0 42 D0312 10:47:50.007836 465088 usertrap_amd64.go:225] [ 58997: 58997] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:50.123444 465088 usertrap_amd64.go:212] [ 58997: 58997] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:50.123520 465088 usertrap_amd64.go:122] [ 58997: 58997] Allocate a new trap: 0xc007f8bcb0 43 D0312 10:47:50.123605 465088 usertrap_amd64.go:225] [ 58997: 58997] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:50.138577 465088 usertrap_amd64.go:212] [ 58997: 58997] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:50.138663 465088 usertrap_amd64.go:122] [ 58997: 58997] Allocate a new trap: 0xc007f8bcb0 44 D0312 10:47:50.138746 465088 usertrap_amd64.go:225] [ 58997: 58997] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:50.150616 465088 task_exit.go:204] [ 58997: 58997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.150837 465088 task_signals.go:204] [ 58997: 59001] Signal 58997, PID: 59001, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.150822 465088 task_signals.go:204] [ 58997: 59000] Signal 58997, PID: 59000, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.150860 465088 task_exit.go:204] [ 58997: 58997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.151052 465088 task_exit.go:204] [ 58997: 59001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.151167 465088 task_exit.go:204] [ 58997: 59000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.152922 465088 task_exit.go:204] [ 58997: 59000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.153039 465088 task_exit.go:204] [ 58997: 59000] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.153666 465088 task_exit.go:204] [ 58997: 59001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.153712 465088 task_exit.go:204] [ 58997: 59001] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.153798 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:50.153958 465088 task_exit.go:204] [ 58997: 58997] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.157877 465088 usertrap_amd64.go:212] [ 58977: 58977] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:50.157966 465088 usertrap_amd64.go:122] [ 58977: 58977] Allocate a new trap: 0xc00ade5e60 43 D0312 10:47:50.158031 465088 usertrap_amd64.go:225] [ 58977: 58977] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:50.163417 465088 task_exit.go:204] [ 58977: 58977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.163655 465088 task_exit.go:204] [ 58977: 58977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.165094 465088 task_signals.go:204] [ 58977: 58983] Signal 58977, PID: 58983, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.165188 465088 task_exit.go:204] [ 58977: 58983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.165439 465088 task_exit.go:204] [ 58977: 58983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.165502 465088 task_exit.go:204] [ 58977: 58983] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.165799 465088 task_signals.go:204] [ 58977: 58981] Signal 58977, PID: 58981, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.165923 465088 task_exit.go:204] [ 58977: 58981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.171064 465088 task_exit.go:204] [ 58977: 58981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.171162 465088 task_exit.go:204] [ 58977: 58981] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.171240 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:50.176225 465088 task_exit.go:204] [ 58977: 58977] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.179239 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.179599 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 10:47:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup(0xffffffffffffffff) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r6, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r7 = eventfd(0x2) dup2(r4, r7) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) 10:47:50 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) (async) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) (async, rerun: 32) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) (rerun: 32) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) (async, rerun: 64) r1 = dup(r0) (rerun: 64) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) r2 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE(r2, 0x5000940c, 0x0) close(r1) r3 = gettid() tkill(r3, 0x401004000000016) (async, rerun: 32) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) (rerun: 32) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r4) 10:47:50 executing program 1: r0 = getpid() getpgid(r0) (async) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000180)=0x18) (async) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x5451, 0x0) 10:47:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) D0312 10:47:50.198839 465088 task_signals.go:470] [ 7: 8376] Notified of signal 23 D0312 10:47:50.199011 465088 task_signals.go:179] [ 7: 8376] Restarting syscall 202: interrupted by signal 23 D0312 10:47:50.199049 465088 task_signals.go:220] [ 7: 8376] Signal 23: delivering to handler D0312 10:47:50.206941 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.210489 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.267145 465088 usertrap_amd64.go:212] [ 59005: 59005] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:50.267235 465088 usertrap_amd64.go:122] [ 59005: 59005] Allocate a new trap: 0xc002a43b60 39 D0312 10:47:50.268704 465088 usertrap_amd64.go:225] [ 59005: 59005] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:50.275539 465088 usertrap_amd64.go:212] [ 59002: 59002] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:50.275639 465088 usertrap_amd64.go:122] [ 59002: 59002] Allocate a new trap: 0xc0075f9d10 40 D0312 10:47:50.275968 465088 usertrap_amd64.go:225] [ 59002: 59002] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:50.277604 465088 usertrap_amd64.go:212] [ 59002: 59002] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:50.277748 465088 usertrap_amd64.go:122] [ 59002: 59002] Allocate a new trap: 0xc0075f9d10 41 D0312 10:47:50.277842 465088 usertrap_amd64.go:225] [ 59002: 59002] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:50.278782 465088 usertrap_amd64.go:212] [ 59005: 59005] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:50.278881 465088 usertrap_amd64.go:122] [ 59005: 59005] Allocate a new trap: 0xc002a43b60 40 D0312 10:47:50.278950 465088 usertrap_amd64.go:225] [ 59005: 59005] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:50.286491 465088 usertrap_amd64.go:212] [ 59004: 59004] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:50.286593 465088 usertrap_amd64.go:122] [ 59004: 59004] Allocate a new trap: 0xc00d9fdbc0 40 D0312 10:47:50.287211 465088 usertrap_amd64.go:225] [ 59004: 59004] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:50.289785 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.290254 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.302363 465088 usertrap_amd64.go:212] [ 59004: 59004] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:50.302529 465088 usertrap_amd64.go:122] [ 59004: 59004] Allocate a new trap: 0xc00d9fdbc0 41 D0312 10:47:50.302654 465088 usertrap_amd64.go:225] [ 59004: 59004] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:50.304422 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.304838 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.315994 465088 usertrap_amd64.go:212] [ 59002: 59002] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:50.316082 465088 usertrap_amd64.go:122] [ 59002: 59002] Allocate a new trap: 0xc0075f9d10 42 D0312 10:47:50.316155 465088 usertrap_amd64.go:225] [ 59002: 59002] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:50.318940 465088 usertrap_amd64.go:212] [ 59003: 59003] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:50.319132 465088 usertrap_amd64.go:122] [ 59003: 59003] Allocate a new trap: 0xc00d9fdbc0 42 D0312 10:47:50.322894 465088 usertrap_amd64.go:225] [ 59003: 59003] Apply the binary patch addr 5652f299d490 trap addr 64d20 ([184 109 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:50.323141 465088 usertrap_amd64.go:212] [ 59005: 59005] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:50.323241 465088 usertrap_amd64.go:122] [ 59005: 59005] Allocate a new trap: 0xc002a43b60 41 D0312 10:47:50.323335 465088 usertrap_amd64.go:225] [ 59005: 59005] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:50.328580 465088 task_run.go:308] [ 59004: 59004] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0312 10:47:50.329279 465088 task_log.go:87] [ 59004: 59004] Registers: D0312 10:47:50.329385 465088 task_log.go:94] [ 59004: 59004] Cs = 0000000000000033 D0312 10:47:50.329432 465088 task_log.go:94] [ 59004: 59004] Ds = 0000000000000000 D0312 10:47:50.329505 465088 task_log.go:94] [ 59004: 59004] Eflags = 0000000000010206 D0312 10:47:50.329553 465088 task_log.go:94] [ 59004: 59004] Es = 0000000000000000 D0312 10:47:50.329586 465088 task_log.go:94] [ 59004: 59004] Fs = 0000000000000000 D0312 10:47:50.329620 465088 task_log.go:94] [ 59004: 59004] Fs_base = 000055f8081b4400 D0312 10:47:50.329653 465088 task_log.go:94] [ 59004: 59004] Gs = 0000000000000000 D0312 10:47:50.329675 465088 usertrap_amd64.go:212] [ 59003: 59003] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:50.329686 465088 task_log.go:94] [ 59004: 59004] Gs_base = 00007fa733807000 D0312 10:47:50.329721 465088 usertrap_amd64.go:122] [ 59003: 59003] Allocate a new trap: 0xc00d9fdbc0 43 D0312 10:47:50.329730 465088 task_log.go:94] [ 59004: 59004] Orig_rax = ffffffffffffffff D0312 10:47:50.329765 465088 task_log.go:94] [ 59004: 59004] R10 = 00007eceb938b307 D0312 10:47:50.329771 465088 usertrap_amd64.go:225] [ 59003: 59003] Apply the binary patch addr 5652f2977a30 trap addr 64d70 ([184 10 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:50.329802 465088 task_log.go:94] [ 59004: 59004] R11 = 0000000000000000 D0312 10:47:50.329879 465088 task_log.go:94] [ 59004: 59004] R12 = 0000000000000001 D0312 10:47:50.329927 465088 task_log.go:94] [ 59004: 59004] R13 = 0000000000000000 D0312 10:47:50.329953 465088 task_log.go:94] [ 59004: 59004] R14 = 0000000000000001 D0312 10:47:50.329975 465088 task_log.go:94] [ 59004: 59004] R15 = 00007eceb938b680 D0312 10:47:50.330018 465088 task_log.go:94] [ 59004: 59004] R8 = 0000000000000000 D0312 10:47:50.330047 465088 task_log.go:94] [ 59004: 59004] R9 = 00007eceb938b450 D0312 10:47:50.330077 465088 task_log.go:94] [ 59004: 59004] Rax = 0000000000000013 D0312 10:47:50.330131 465088 task_log.go:94] [ 59004: 59004] Rbp = 0000000000000000 D0312 10:47:50.330174 465088 task_log.go:94] [ 59004: 59004] Rbx = 0000000000000000 D0312 10:47:50.330235 465088 task_log.go:94] [ 59004: 59004] Rcx = 0000000000000000 D0312 10:47:50.330309 465088 task_log.go:94] [ 59004: 59004] Rdi = 00007eceb938b680 D0312 10:47:50.330342 465088 task_log.go:94] [ 59004: 59004] Rdx = 000055f8075bfb9e D0312 10:47:50.330378 465088 task_log.go:94] [ 59004: 59004] Rip = 0000000000000000 D0312 10:47:50.332005 465088 task_log.go:94] [ 59004: 59004] Rsi = 00000000ffffff9c D0312 10:47:50.332040 465088 task_log.go:94] [ 59004: 59004] Rsp = 00007eceb938b5b8 D0312 10:47:50.332099 465088 task_log.go:94] [ 59004: 59004] Ss = 000000000000002b D0312 10:47:50.332150 465088 task_log.go:111] [ 59004: 59004] Stack: D0312 10:47:50.332444 465088 task_log.go:128] [ 59004: 59004] 7eceb938b5b0: 00 00 00 00 00 00 00 00 8f 04 51 07 f8 55 00 00 D0312 10:47:50.332541 465088 task_log.go:128] [ 59004: 59004] 7eceb938b5c0: 83 f4 5b 07 f8 55 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.332626 465088 task_log.go:128] [ 59004: 59004] 7eceb938b5d0: 00 00 00 00 00 00 00 00 40 b6 38 b9 ce 7e 00 00 D0312 10:47:50.332672 465088 task_log.go:128] [ 59004: 59004] 7eceb938b5e0: 9e f4 5b 07 36 24 00 00 01 00 00 00 00 00 00 00 D0312 10:47:50.332709 465088 task_log.go:128] [ 59004: 59004] 7eceb938b5f0: 88 13 00 00 00 00 00 00 32 00 00 00 00 00 00 00 D0312 10:47:50.332740 465088 task_log.go:128] [ 59004: 59004] 7eceb938b600: 02 00 00 00 00 00 00 00 30 b6 38 b9 ce 7e 00 00 D0312 10:47:50.332785 465088 task_log.go:128] [ 59004: 59004] 7eceb938b610: 40 b0 38 b9 ce 7e 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.332826 465088 task_log.go:128] [ 59004: 59004] 7eceb938b620: ef 0b 00 00 00 00 00 00 9a 9c d4 18 00 00 00 00 D0312 10:47:50.332877 465088 task_log.go:128] [ 59004: 59004] 7eceb938b630: ef 0b 00 00 00 00 00 00 52 61 46 06 00 00 00 00 D0312 10:47:50.332930 465088 task_log.go:128] [ 59004: 59004] 7eceb938b640: 2e 2f 39 32 37 30 00 6f 75 70 2f 6e 65 74 2f 73 D0312 10:47:50.332983 465088 task_log.go:128] [ 59004: 59004] 7eceb938b650: 79 7a 32 00 79 7a 32 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333156 465088 task_log.go:128] [ 59004: 59004] 7eceb938b660: 71 f2 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333242 465088 task_log.go:128] [ 59004: 59004] 7eceb938b670: 84 f2 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333317 465088 task_log.go:128] [ 59004: 59004] 7eceb938b680: 2f 73 79 7a 63 67 72 6f 75 70 2f 63 70 75 2f 73 D0312 10:47:50.333360 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.333381 465088 task_log.go:128] [ 59004: 59004] 7eceb938b690: 79 7a 32 00 79 7a 32 00 75 70 2e 70 72 6f 63 73 D0312 10:47:50.333554 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6a0: 00 6f 63 73 00 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333623 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6b0: b3 f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333699 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6c0: bc f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333755 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6d0: c4 f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333825 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6e0: cc f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333899 465088 task_log.go:128] [ 59004: 59004] 7eceb938b6f0: da f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.333958 465088 task_log.go:128] [ 59004: 59004] 7eceb938b700: e8 f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.334030 465088 task_log.go:128] [ 59004: 59004] 7eceb938b710: f1 f5 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.334121 465088 task_log.go:128] [ 59004: 59004] 7eceb938b720: f9 f5 5b 07 f8 55 00 00 13 00 00 00 00 00 00 00 D0312 10:47:50.334181 465088 task_log.go:128] [ 59004: 59004] 7eceb938b730: 00 00 00 00 00 00 00 00 b8 ff ff ff ff ff ff ff D0312 10:47:50.334218 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.334250 465088 task_log.go:128] [ 59004: 59004] 7eceb938b740: 00 00 00 00 00 00 00 00 b0 ad 38 b9 ce 7e 00 00 D0312 10:47:50.334436 465088 task_log.go:128] [ 59004: 59004] 7eceb938b750: 28 f6 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.334514 465088 task_log.go:128] [ 59004: 59004] 7eceb938b760: 37 f6 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.334554 465088 task_log.go:128] [ 59004: 59004] 7eceb938b770: 3f f6 5b 07 f8 55 00 00 06 00 00 00 00 00 00 00 D0312 10:47:50.334589 465088 task_log.go:128] [ 59004: 59004] 7eceb938b780: af f4 5b 07 f8 55 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.334647 465088 task_log.go:128] [ 59004: 59004] 7eceb938b790: b3 f4 5b 07 f8 55 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.334696 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7a0: b7 f4 5b 07 f8 55 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.334755 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7b0: 72 6f 75 74 65 72 5f 73 28 be 38 b9 ce 7e 00 00 D0312 10:47:50.334785 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7c0: c8 b8 38 b9 ce 7e 00 00 f1 ff ff ff 00 00 00 00 D0312 10:47:50.334822 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7d0: c0 b8 38 b9 ce 7e 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.334851 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7e0: 00 00 00 00 00 00 00 00 0c df 4f 07 f8 55 00 00 D0312 10:47:50.334882 465088 task_log.go:128] [ 59004: 59004] 7eceb938b7f0: 00 00 00 00 00 00 00 00 d0 b8 38 b9 ce 7e 00 00 D0312 10:47:50.334919 465088 task_log.go:128] [ 59004: 59004] 7eceb938b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.334948 465088 task_log.go:128] [ 59004: 59004] 7eceb938b810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335000 465088 task_log.go:128] [ 59004: 59004] 7eceb938b820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335053 465088 task_log.go:128] [ 59004: 59004] 7eceb938b830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335098 465088 task_log.go:128] [ 59004: 59004] 7eceb938b840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335147 465088 task_log.go:128] [ 59004: 59004] 7eceb938b850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335176 465088 task_log.go:128] [ 59004: 59004] 7eceb938b860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335206 465088 task_log.go:128] [ 59004: 59004] 7eceb938b870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335255 465088 task_log.go:128] [ 59004: 59004] 7eceb938b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335293 465088 task_log.go:128] [ 59004: 59004] 7eceb938b890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335346 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335380 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335426 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8c0: ce fa ad eb fe 0f dc ba c0 07 00 00 00 00 00 00 D0312 10:47:50.335474 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8d0: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335516 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335546 465088 task_log.go:128] [ 59004: 59004] 7eceb938b8f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335584 465088 task_log.go:128] [ 59004: 59004] 7eceb938b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335648 465088 task_log.go:128] [ 59004: 59004] 7eceb938b910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335686 465088 task_log.go:128] [ 59004: 59004] 7eceb938b920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335733 465088 task_log.go:128] [ 59004: 59004] 7eceb938b930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335763 465088 task_log.go:128] [ 59004: 59004] 7eceb938b940: 00 00 00 00 00 00 00 00 04 00 00 40 00 00 00 00 D0312 10:47:50.335811 465088 task_log.go:128] [ 59004: 59004] 7eceb938b950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335859 465088 task_log.go:128] [ 59004: 59004] 7eceb938b960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335897 465088 task_log.go:128] [ 59004: 59004] 7eceb938b970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335929 465088 task_log.go:128] [ 59004: 59004] 7eceb938b980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.335966 465088 task_log.go:128] [ 59004: 59004] 7eceb938b990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.336011 465088 task_log.go:128] [ 59004: 59004] 7eceb938b9a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0312 10:47:50.336061 465088 task_log.go:149] [ 59004: 59004] Code: D0312 10:47:50.336090 465088 task_log.go:170] [ 59004: 59004] Error reading stack at address ffffffffffffffc0: bad address D0312 10:47:50.336123 465088 task_log.go:71] [ 59004: 59004] Mappings: VMAs: 00064000-00069000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2db20000-1b2db60000 rw-s 00000000 00:04 7 /memfd:syz-shared-mem (deleted) 55f8074d8000-55f8074fc000 r--p 00000000 00:08 8 /syz-executor 55f8074fc000-55f8075ae000 r-xp 00024000 00:08 8 /syz-executor 55f8075ae000-55f807600000 r--p 000d6000 00:08 8 /syz-executor 55f807601000-55f80765a000 r--p 00128000 00:08 8 /syz-executor 55f80765a000-55f807663000 rw-p 00181000 00:08 8 /syz-executor 55f807668000-55f8081b4000 rw-p 00000000 00:00 0 55f8081b4000-55f8081d6000 rw-p 00000000 00:00 0 [heap] 7ecdfe000000-7ecdfe400000 r--p 00000000 00:04 6 /memfd:syz-shared-mem (deleted) 7ecdfe5d1000-7ecdfe5d2000 r--p 00000000 00:00 0 [vvar] 7ecdfe5d2000-7ecdfe5d4000 r-xp 00000000 00:00 0 7eceb8b8c000-7eceb938c000 rw-p 00000000 00:00 0 [stack] PMAs: 00064000-00065000 r-xp 09dec000 *pgalloc.MemoryFile 00065000-00069000 r-xp 015aa000 *pgalloc.MemoryFile 55f8074d8000-55f8074fc000 r--p 0aba9000 *pgalloc.MemoryFile 55f8074fc000-55f807515000 r-xs 00024000 *gofer.dentryPlatformFile 55f807515000-55f807516000 r-xp 0d9fc000 *pgalloc.MemoryFile 55f807516000-55f807517000 r-xp 015a9000 *pgalloc.MemoryFile 55f807517000-55f807518000 r-xp 035fe000 *pgalloc.MemoryFile 55f80751d000-55f80751e000 r-xp 0af2f000 *pgalloc.MemoryFile 55f80751e000-55f807561000 r-xs 00046000 *gofer.dentryPlatformFile 55f807561000-55f807562000 r-xp 180fe000 *pgalloc.MemoryFile 55f807562000-55f807563000 r-xp 0d9f9000 *pgalloc.MemoryFile 55f807563000-55f807564000 r-xp 09e04000 *pgalloc.MemoryFile 55f807564000-55f807565000 r-xp 03ffe000 *pgalloc.MemoryFile 55f807565000-55f807566000 r-xp 0d9f7000 *pgalloc.MemoryFile 55f807566000-55f807588000 r-xs 0008e000 *gofer.dentryPlatformFile 55f807588000-55f807589000 r-xp 18100000 *pgalloc.MemoryFile 55f807589000-55f80758a000 r-xp 09ded000 *pgalloc.MemoryFile 55f8075a1000-55f8075a2000 r-xp 119f2000 *pgalloc.MemoryFile 55f8075ad000-55f8075ae000 r-xp 013fc000 *pgalloc.MemoryFile 55f8075ae000-55f807600000 r--p 0d977000 *pgalloc.MemoryFile 55f807601000-55f807663000 rw-p 172fb000 *pgalloc.MemoryFile 55f807668000-55f807800000 r--p 17cd8000 *pgalloc.MemoryFile 55f808000000-55f8081b4000 rw-p 17786000 *pgalloc.MemoryFile 55f8081b4000-55f8081b5000 rw-p 050c0000 *pgalloc.MemoryFile 55f8081b5000-55f8081d6000 r--p 182cf000 *pgalloc.MemoryFile 7eceb9200000-7eceb9388000 r--p 16dc8000 *pgalloc.MemoryFile 7eceb9388000-7eceb938a000 r--p 0bd13000 *pgalloc.MemoryFile 7eceb938a000-7eceb938c000 rw-p 09cb4000 *pgalloc.MemoryFile D0312 10:47:50.341138 465088 task_log.go:73] [ 59004: 59004] FDTable: fd:2 => name pipe:[11] fd:4 => name /memfd:syz-shared-mem (deleted) fd:200 => name /dev/net/tun fd:201 => name / fd:248 => name pipe:[12] fd:249 => name pipe:[13] fd:0 => name pipe:[11] fd:1 => name pipe:[11] D0312 10:47:50.341654 465088 task_signals.go:470] [ 59004: 59004] Notified of signal 11 D0312 10:47:50.341781 465088 task_signals.go:220] [ 59004: 59004] Signal 11: delivering to handler D0312 10:47:50.342434 465088 task_exit.go:204] [ 59004: 59004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.346254 465088 task_exit.go:204] [ 59004: 59004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.346385 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:50.347286 465088 task_exit.go:204] [ 59004: 59004] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x2) (async) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) (async) D0312 10:47:50.365634 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.365995 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.378636 465088 usertrap_amd64.go:212] [ 59003: 59003] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:50.378778 465088 usertrap_amd64.go:122] [ 59003: 59003] Allocate a new trap: 0xc00d9fdbc0 44 D0312 10:47:50.378877 465088 usertrap_amd64.go:225] [ 59003: 59003] Apply the binary patch addr 5652f297951a trap addr 64dc0 ([184 56 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:50.410601 465088 usertrap_amd64.go:212] [ 59002: 59002] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:50.410702 465088 usertrap_amd64.go:122] [ 59002: 59002] Allocate a new trap: 0xc0075f9d10 43 D0312 10:47:50.410818 465088 usertrap_amd64.go:225] [ 59002: 59002] Apply the binary patch addr 55c5b5da8fa4 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:50.413957 465088 task_exit.go:204] [ 59002: 59002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.414238 465088 task_exit.go:204] [ 59002: 59002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.414603 465088 task_signals.go:204] [ 59002: 59008] Signal 59002, PID: 59008, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.414745 465088 task_exit.go:204] [ 59002: 59008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.414964 465088 task_exit.go:204] [ 59002: 59008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.415031 465088 task_exit.go:204] [ 59002: 59008] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.416486 465088 task_signals.go:204] [ 59002: 59006] Signal 59002, PID: 59006, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.416638 465088 task_exit.go:204] [ 59002: 59006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.418960 465088 task_exit.go:204] [ 59002: 59006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.419019 465088 task_exit.go:204] [ 59002: 59006] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.419103 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:50.419246 465088 task_exit.go:204] [ 59002: 59002] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e20, @local}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(r1, 0x5450) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)="99b45b4a2a5ec9ca4d5300bb0900d2f75e8257d42f3c01fdc4e86b9a0d5184c0fbfc8a2c1190da0c74b5adc78bf0785d9f30057b561cf0273630254a960ce1bee1780bb15ff807972aef22dbd1b13967a2191742b79b7792e65881b6195e5d19fe1d417a51d00acfce10e3c65880f429d64815daf2", 0x75) r2 = signalfd4(r0, &(0x7f0000000180)={[0xfffffffffffffff8]}, 0x8, 0x40000) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'syz_tun\x00', 0xd21}) close(r0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/92, 0x5c}, {&(0x7f0000000300)=""/164, 0xa4}], 0x2}, 0x40002101) r3 = accept4$unix(r2, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x80000) ftruncate(r3, 0x7) ftruncate(r0, 0x1) connect$unix(r2, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000980)={0x0, 0x1, 0x2, 0x18, 0x1d9, &(0x7f0000000580)="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"}) r4 = accept4(r2, &(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000a40)=0x80, 0x80800) setsockopt(r4, 0xed, 0x800, &(0x7f0000000a80)="5822a95db0bdba988ba6e9d73dbe5e710453ffda88608531519942c1cd6111b8cfe5484945009ff3481f8b0471840296ad5c", 0x32) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r6, 0x6, 0x1b, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000b80)={'wlan1\x00', {0x2, 0x4e21, @multicast2}}) pipe2(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) read$FUSE(r2, &(0x7f0000000c00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r7, &(0x7f0000002c40)={0x18, 0x0, r9}, 0x18) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000002c80)={@remote, 0x31}) read$FUSE(r8, &(0x7f0000002cc0)={0x2020}, 0x2020) pipe(&(0x7f0000004d00)) read$FUSE(r0, &(0x7f0000004d40)={0x2020}, 0x2020) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000006d80)) r10 = socket$inet6_icmp(0xa, 0x2, 0x3a) preadv(r10, &(0x7f0000007040)=[{&(0x7f0000006e80)=""/164, 0xa4}, {&(0x7f0000006f40)=""/158, 0x9e}, {&(0x7f0000007000)=""/33, 0x21}], 0x3, 0x80000000, 0x9) D0312 10:47:50.433840 465088 task_signals.go:470] [ 7: 28] Notified of signal 23 D0312 10:47:50.435286 465088 task_signals.go:220] [ 7: 28] Signal 23: delivering to handler D0312 10:47:50.453182 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.453544 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.460535 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.464225 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.476389 465088 usertrap_amd64.go:212] [ 59005: 59005] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:50.476496 465088 usertrap_amd64.go:122] [ 59005: 59005] Allocate a new trap: 0xc002a43b60 42 D0312 10:47:50.476555 465088 usertrap_amd64.go:212] [ 59009: 59009] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:50.476562 465088 usertrap_amd64.go:225] [ 59005: 59005] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0312 10:47:50.476651 465088 usertrap_amd64.go:122] [ 59009: 59009] Allocate a new trap: 0xc0023b8960 40 D0312 10:47:50.477136 465088 usertrap_amd64.go:225] [ 59009: 59009] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:50.480491 465088 usertrap_amd64.go:212] [ 59009: 59009] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:50.480566 465088 usertrap_amd64.go:122] [ 59009: 59009] Allocate a new trap: 0xc0023b8960 41 D0312 10:47:50.480629 465088 usertrap_amd64.go:225] [ 59009: 59009] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:50.489657 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.489712 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.490183 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.499030 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.508993 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.513167 465088 usertrap_amd64.go:212] [ 59009: 59009] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:50.513298 465088 usertrap_amd64.go:122] [ 59009: 59009] Allocate a new trap: 0xc0023b8960 42 D0312 10:47:50.513400 465088 usertrap_amd64.go:225] [ 59009: 59009] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:50.518799 465088 usertrap_amd64.go:212] [ 59014: 59014] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:50.518984 465088 usertrap_amd64.go:122] [ 59014: 59014] Allocate a new trap: 0xc00eb11bf0 40 D0312 10:47:50.519002 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.519451 465088 usertrap_amd64.go:225] [ 59014: 59014] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:50.520812 465088 usertrap_amd64.go:212] [ 59014: 59014] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:50.520908 465088 usertrap_amd64.go:122] [ 59014: 59014] Allocate a new trap: 0xc00eb11bf0 41 D0312 10:47:50.521026 465088 usertrap_amd64.go:225] [ 59014: 59014] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:50.529254 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.536669 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.537065 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.540468 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.548977 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.549840 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.550220 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.552427 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.552550 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 4 threads in thread group D0312 10:47:50.552629 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.552710 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.552757 465088 task_signals.go:885] [ 59003: 59011] Completing group stop D0312 10:47:50.552806 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.552912 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.553006 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.555634 465088 usertrap_amd64.go:212] [ 59014: 59014] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:50.555692 465088 usertrap_amd64.go:122] [ 59014: 59014] Allocate a new trap: 0xc00eb11bf0 42 D0312 10:47:50.555750 465088 usertrap_amd64.go:225] [ 59014: 59014] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:50.558741 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.558824 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.559401 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.559471 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.559507 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.559544 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.559777 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.560281 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.564262 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.564395 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.564452 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.564564 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.564672 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.564773 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.569695 465088 task_signals.go:828] [ 59003: 59003] Ending incomplete group stop with 1 threads pending D0312 10:47:50.569769 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.569809 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.569840 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.569868 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.569924 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.570040 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.570113 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.570250 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.570344 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 202 with restart block: not interrupted by handled signal D0312 10:47:50.573072 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.573209 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.573336 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.573451 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.573586 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.573715 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.573805 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.573889 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.573974 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579316 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.579433 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579494 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579544 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579571 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579624 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.579652 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.579763 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.579757 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.579861 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.579931 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.582040 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.582196 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.582299 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.582375 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.582477 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.582587 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.585130 465088 usertrap_amd64.go:212] [ 59014: 59016] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:50.585189 465088 usertrap_amd64.go:122] [ 59014: 59016] Allocate a new trap: 0xc00eb11bf0 43 D0312 10:47:50.585256 465088 usertrap_amd64.go:225] [ 59014: 59016] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:50.586213 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.586599 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.587877 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.587988 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.588120 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.588919 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.589021 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.589099 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.589162 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.589357 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.589334 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.589406 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.589452 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.589592 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.589662 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.589686 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.589802 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.589921 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.590672 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.590775 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.590827 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.590920 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.590983 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.591054 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.591259 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.591306 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.591359 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.599975 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.600112 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.600241 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.600507 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.600576 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.600703 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.600817 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.601105 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.601119 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.601249 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.601376 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.601605 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.601810 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.601928 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.602044 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.602131 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.604467 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.604549 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.604628 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.604686 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.606967 465088 usertrap_amd64.go:212] [ 59009: 59009] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:50.607042 465088 usertrap_amd64.go:122] [ 59009: 59009] Allocate a new trap: 0xc0023b8960 43 D0312 10:47:50.607122 465088 usertrap_amd64.go:225] [ 59009: 59009] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:50.608039 465088 usertrap_amd64.go:212] [ 59014: 59014] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:50.608105 465088 usertrap_amd64.go:122] [ 59014: 59014] Allocate a new trap: 0xc00eb11bf0 44 D0312 10:47:50.608169 465088 usertrap_amd64.go:225] [ 59014: 59014] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:50.610306 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.610361 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.610392 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.610423 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.610462 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.610498 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.610535 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.610617 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.610647 465088 task_signals.go:204] [ 59014: 59016] Signal 59014, PID: 59016, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.610707 465088 task_exit.go:204] [ 59014: 59016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.610855 465088 task_exit.go:204] [ 59014: 59016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.610884 465088 task_exit.go:204] [ 59014: 59016] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.610889 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.611015 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.612156 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.612329 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.612424 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.612562 465088 task_exit.go:204] [ 59014: 59014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.612659 465088 task_signals.go:885] [ 59003: 59011] Completing group stop D0312 10:47:50.612733 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.612775 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.612785 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.612832 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.612922 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.616353 465088 task_exit.go:204] [ 59014: 59014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.616430 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:50.617771 465088 task_exit.go:204] [ 59014: 59014] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.618988 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.619098 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.619196 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.619228 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) 10:47:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e20, @local}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$FIONCLEX(r1, 0x5450) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)="99b45b4a2a5ec9ca4d5300bb0900d2f75e8257d42f3c01fdc4e86b9a0d5184c0fbfc8a2c1190da0c74b5adc78bf0785d9f30057b561cf0273630254a960ce1bee1780bb15ff807972aef22dbd1b13967a2191742b79b7792e65881b6195e5d19fe1d417a51d00acfce10e3c65880f429d64815daf2", 0x75) r2 = signalfd4(r0, &(0x7f0000000180)={[0xfffffffffffffff8]}, 0x8, 0x40000) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'syz_tun\x00', 0xd21}) (async) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'syz_tun\x00', 0xd21}) close(r0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/92, 0x5c}, {&(0x7f0000000300)=""/164, 0xa4}], 0x2}, 0x40002101) r3 = accept4$unix(r2, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x80000) ftruncate(r3, 0x7) ftruncate(r0, 0x1) connect$unix(r2, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000980)={0x0, 0x1, 0x2, 0x18, 0x1d9, &(0x7f0000000580)="b1cb1f0541c83ea36518dca05cb871bbf1ad257344e97409cc889b80e10a5807edfc5e00ea7565bec6a970ae950e831461fff00ae0a1cca38ecd69548aef6782e51a3d7403d68a37f70e7dd6fbf7be71feab2b18ba2d76c15696f0037ebe0826cabeb6e9848b176e4180ba6efed46fd8ab888990e3fa8b3562a2e08aaf2062c6dd10dc8e8ffaf47e08c9218be9eed2191fc2cabdc6ee6396d2af749ae98b3d61e4e7b408515cdee8cc8de9e3e57c003b90020602604f146211e87ff4e7888b69e35e45f6636b854078ded603e63b6ce81e58d3cdf1b80efa15401c94f1ab523293406de68a0afddd32369136dc210dcc0c48d24f135962d9ad25fbf51dba5c3aa06332fbb3f7d7fbeeede5c74226a2702d7de10fc42fea2f976f7a7eb15c05fcf05840c7868b3cff790ffb10199565a3314bc5284d3e7621c7c67b680c186558439e00edcec90d67b1df5129508779949375f44ae9b88352c3e886db762bfd3ac81a9c524feb52c0576377afe4f6c9b986c3c64d1474adf23ff3ba211117ebb29047001b763c7c424fc000fa89cc61dc18ad1bab5ca0debbd689be4a613103ad0c8c18c729afb5a64b1d6a1423f57c1e61efbef563da67e41e0b0d40ce3a52d578c38c9dbf74f5b0169f31c968e793d7115686a4fb2461264522fd3c4d02d308456d4f77930e96b485006c1c21e8b4d6d268a7814ed864af369d07e4dbd02a4c3ca95d145c30ac97745ec86f436d9d58d36ce937a7793fab4e3547422414342517b0b78022c73298c7e919e8f686088995cd333eaf2f37a41e85852705b752568658127b7c01aee671e95a22404c62475b80334b45dae89c5a71acea8789d32a5fb37b3612275be96b9f88e394e7e7efe8ed8ee03cc3f51f49f2e359b93cfdb6b5e5c3b0c37933739cb0a25030952c4db18051e0bd43df0a10b9158be9f04e46f756221e82e7d8d6c9535fba421fa2025837a5d3f49f700b3d3c21e8d32b1c47dc17d842817b48a965d8790b143e13fe5e025470974ba95753f62ae0e9caae71e7eee5169ff0a26aef67ade72a201cf3cb0f2b1565f6a56863fa9b56a75f4998bd8770f9de2cc1313d1f81ec60db0cbb4e42acbe637193bd7ff452b0f7cfd780b619624ca22db9b78a24382e7e90fc537dea7da93930c248d8e37e0b9449b89cc902b4bd48ac0c6adbb0bb614813835e9f58a826d5deda5c0c6ddf78dc9d8702aa8e7ce7431cd6d6894038ef102af900a841c33f65fd56f358e51e393f99e4d74728b4146c79c26e2f4403fdef1fdf2f027a0e11ee399afb3a1818ae6895ed70ecb26e20a9cbaa90e961e365126285e2bceca00bd606399cbe502fd6e5405a6a1cf58af4be4760c86fb4eb05de9de4a30aa365ecb72e6e889c20fa8b2300f0a3465e1dcaac138ef81853f0b3ac4aa7c61f039942b77dab79f3aeb20e182dcd28"}) (async) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000980)={0x0, 0x1, 0x2, 0x18, 0x1d9, &(0x7f0000000580)="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"}) r4 = accept4(r2, &(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000a40)=0x80, 0x80800) setsockopt(r4, 0xed, 0x800, &(0x7f0000000a80)="5822a95db0bdba988ba6e9d73dbe5e710453ffda88608531519942c1cd6111b8cfe5484945009ff3481f8b0471840296ad5c", 0x32) (async) setsockopt(r4, 0xed, 0x800, &(0x7f0000000a80)="5822a95db0bdba988ba6e9d73dbe5e710453ffda88608531519942c1cd6111b8cfe5484945009ff3481f8b0471840296ad5c", 0x32) pipe(&(0x7f0000000ac0)) (async) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r6, 0x6, 0x1b, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000b80)={'wlan1\x00', {0x2, 0x4e21, @multicast2}}) (async) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000b80)={'wlan1\x00', {0x2, 0x4e21, @multicast2}}) pipe2(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) read$FUSE(r2, &(0x7f0000000c00)={0x2020}, 0x2020) (async) read$FUSE(r2, &(0x7f0000000c00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r7, &(0x7f0000002c40)={0x18, 0x0, r9}, 0x18) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000002c80)={@remote, 0x31}) read$FUSE(r8, &(0x7f0000002cc0)={0x2020}, 0x2020) (async) read$FUSE(r8, &(0x7f0000002cc0)={0x2020}, 0x2020) pipe(&(0x7f0000004d00)) read$FUSE(r0, &(0x7f0000004d40)={0x2020}, 0x2020) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000006d80)) (async) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000006d80)) r10 = socket$inet6_icmp(0xa, 0x2, 0x3a) preadv(r10, &(0x7f0000007040)=[{&(0x7f0000006e80)=""/164, 0xa4}, {&(0x7f0000006f40)=""/158, 0x9e}, {&(0x7f0000007000)=""/33, 0x21}], 0x3, 0x80000000, 0x9) (async) preadv(r10, &(0x7f0000007040)=[{&(0x7f0000006e80)=""/164, 0xa4}, {&(0x7f0000006f40)=""/158, 0x9e}, {&(0x7f0000007000)=""/33, 0x21}], 0x3, 0x80000000, 0x9) D0312 10:47:50.619285 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.619328 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.619362 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.619469 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.619536 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.619992 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.619563 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.620076 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.620254 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.620418 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.620491 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.620691 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.621153 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.621296 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.621470 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.621536 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.631476 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.631541 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.631582 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.631626 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.631662 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.631686 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.631722 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.631874 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.632598 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.632611 465088 usertrap_amd64.go:212] [ 59009: 59009] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:50.632665 465088 usertrap_amd64.go:122] [ 59009: 59009] Allocate a new trap: 0xc0023b8960 44 D0312 10:47:50.632734 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.632744 465088 usertrap_amd64.go:225] [ 59009: 59009] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:50.632893 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.633008 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.633069 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.633497 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.633756 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.633822 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.633886 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.634600 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.634728 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.634800 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.638863 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.638922 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.638962 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.639028 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.639072 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.639126 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.639156 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.639484 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.639776 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.640307 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.640404 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.640462 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.640543 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.640634 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.640737 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.641197 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.641292 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.641369 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.641538 465088 task_exit.go:204] [ 59009: 59009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.641672 465088 task_signals.go:204] [ 59009: 59018] Signal 59009, PID: 59018, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.642146 465088 task_signals.go:204] [ 59009: 59015] Signal 59009, PID: 59015, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.642213 465088 task_exit.go:204] [ 59009: 59009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.642484 465088 task_exit.go:204] [ 59009: 59018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.642593 465088 task_exit.go:204] [ 59009: 59015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.642770 465088 task_exit.go:204] [ 59009: 59018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.642829 465088 task_exit.go:204] [ 59009: 59018] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.645134 465088 task_exit.go:204] [ 59009: 59015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.645206 465088 task_exit.go:204] [ 59009: 59015] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.645316 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:50.645553 465088 task_exit.go:204] [ 59009: 59009] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.648870 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.648985 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.649058 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.649120 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) 10:47:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x9}) r1 = signalfd4(r0, &(0x7f0000000000)={[0x1ff]}, 0x8, 0x800) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) D0312 10:47:50.649173 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.649226 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.649264 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.649394 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.649524 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.649682 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.649850 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.650274 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.650382 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.650454 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.650543 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.650803 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.650905 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.651004 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.651011 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.651123 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660331 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.660445 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660527 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660613 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660677 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660741 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.660790 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.660889 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.661008 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.661504 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.661682 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.661820 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.662365 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.662526 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.662609 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.662715 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.662806 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.662992 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.663044 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.663538 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.663593 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.663639 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.671004 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.671065 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.671105 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.671167 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.671196 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.671224 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.671269 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.671399 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.671462 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.671578 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.671638 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.671844 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.671948 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.672027 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.672135 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.672216 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.674870 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.674963 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.675023 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.678794 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.678856 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.678898 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.679227 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.679270 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.679306 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.679364 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.679457 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.679618 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.679752 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.679933 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.680116 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.680262 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.680343 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.680460 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.680612 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.680741 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.680832 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.680931 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.689823 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.689913 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.689975 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.690015 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.690085 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.690132 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.690172 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.690506 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.690559 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.690686 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.690820 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.690931 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.691000 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.691098 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.691187 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.691306 465088 task_signals.go:885] [ 59003: 59011] Completing group stop D0312 10:47:50.691396 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.691470 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.698903 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.698991 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.699064 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.699121 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.699170 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.699217 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.699254 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.699359 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.699426 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.699494 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.699598 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.699712 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.699864 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.699963 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.700102 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.700216 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.700303 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.700452 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.700561 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.700633 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.708903 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.709182 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.709250 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.709293 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.709320 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.709347 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.709378 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.709514 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.709521 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.709855 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.710066 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.710163 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.710343 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.710445 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.710522 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.710609 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.710677 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.710935 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.711416 465088 usertrap_amd64.go:212] [ 59019: 59019] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:50.711522 465088 usertrap_amd64.go:122] [ 59019: 59019] Allocate a new trap: 0xc009ebafc0 40 D0312 10:47:50.713414 465088 usertrap_amd64.go:225] [ 59019: 59019] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:50.715556 465088 usertrap_amd64.go:212] [ 59019: 59019] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:50.715627 465088 usertrap_amd64.go:122] [ 59019: 59019] Allocate a new trap: 0xc009ebafc0 41 D0312 10:47:50.715704 465088 usertrap_amd64.go:225] [ 59019: 59019] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:50.718881 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.719045 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.719158 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.719219 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.719258 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.719294 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.719386 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.719353 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.719438 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.719545 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.719682 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.719779 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.719879 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.723722 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.723966 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.724129 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.724318 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.724449 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.724610 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.724716 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.725306 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.725435 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.729107 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.729224 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.729267 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.729325 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.729359 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.729419 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.729457 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.729570 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.729697 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.729852 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.729974 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.730428 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.730558 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.730605 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.730710 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.730806 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.730964 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.732371 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.732479 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.732553 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.743663 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.743741 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.743808 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.743858 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.743908 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.743938 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.743980 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.744090 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.744185 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.744293 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.744436 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.747848 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.748117 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.748209 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.748318 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.748443 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.749191 465088 task_signals.go:828] [ 59003: 59003] Ending incomplete group stop with 2 threads pending D0312 10:47:50.749258 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.749298 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.749324 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.749362 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.749456 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.749514 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.749689 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.749964 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.750086 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.750150 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.750289 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.750446 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.750581 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.750876 465088 usertrap_amd64.go:212] [ 59019: 59019] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:50.750980 465088 usertrap_amd64.go:122] [ 59019: 59019] Allocate a new trap: 0xc009ebafc0 42 D0312 10:47:50.751156 465088 usertrap_amd64.go:225] [ 59019: 59019] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:50.753050 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.753117 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.753212 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.758844 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.758946 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.759012 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.759048 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.759080 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.759135 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.759222 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.759340 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.759491 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.759527 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.760348 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.760492 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.760541 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.760624 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.760717 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.761244 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.762228 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.762320 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.762380 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.769222 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.769314 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.769367 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.769420 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.769464 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.769534 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.769563 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.769726 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.769803 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.769901 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.770279 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.770387 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.770439 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.770556 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.770625 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.770854 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.771046 465088 usertrap_amd64.go:212] [ 59020: 59020] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:50.771144 465088 usertrap_amd64.go:122] [ 59020: 59020] Allocate a new trap: 0xc008a245a0 40 D0312 10:47:50.771595 465088 usertrap_amd64.go:225] [ 59020: 59020] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:50.772024 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.772126 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.772177 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.773401 465088 usertrap_amd64.go:212] [ 59019: 59021] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:50.773876 465088 usertrap_amd64.go:122] [ 59019: 59021] Allocate a new trap: 0xc009ebafc0 43 D0312 10:47:50.773986 465088 usertrap_amd64.go:225] [ 59019: 59021] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:50.775275 465088 usertrap_amd64.go:212] [ 59020: 59020] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:50.775341 465088 usertrap_amd64.go:122] [ 59020: 59020] Allocate a new trap: 0xc008a245a0 41 D0312 10:47:50.775300 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.775391 465088 usertrap_amd64.go:225] [ 59020: 59020] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:50.775702 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.779537 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.779836 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.780604 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.780679 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.780712 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.780721 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:50.780750 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.780793 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.780827 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.780854 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.781018 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.781030 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.781112 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.782152 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.782320 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.782443 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.782502 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.782583 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.782766 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.782870 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.782971 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.783545 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.783691 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.783750 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.790608 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.790684 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.790732 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.790756 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.790798 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.790829 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.790851 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.790946 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.791073 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.791174 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.791362 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.791505 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.791591 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.791709 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.791799 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.791861 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.791944 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.792006 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.792052 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.798700 465088 usertrap_amd64.go:212] [ 59020: 59020] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:50.798769 465088 usertrap_amd64.go:122] [ 59020: 59020] Allocate a new trap: 0xc008a245a0 42 D0312 10:47:50.798830 465088 usertrap_amd64.go:225] [ 59020: 59020] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:50.799214 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.799294 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.799370 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.799414 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.799485 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.799555 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.799609 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.799840 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.799880 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.799969 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.800066 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.800362 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.800581 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.800706 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.801055 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.801156 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.801300 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.801307 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.801460 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.801579 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809026 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.809092 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809131 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809160 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809218 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809247 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.809283 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.809406 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.812194 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.812385 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.812502 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.812578 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.812744 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.812789 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.812842 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.812859 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.812988 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.818971 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.819089 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.819217 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.819208 465088 usertrap_amd64.go:212] [ 59020: 59020] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:50.819312 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.819352 465088 usertrap_amd64.go:122] [ 59020: 59020] Allocate a new trap: 0xc008a245a0 43 D0312 10:47:50.819396 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.819468 465088 usertrap_amd64.go:225] [ 59020: 59020] Apply the binary patch addr 55f807515fa4 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:50.819491 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.819558 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.819798 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.819910 465088 task_run.go:182] [ 59003: 59017] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.820061 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.820282 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.820408 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.820590 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.820686 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.820815 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.821097 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.821168 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.821261 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.821407 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.821492 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.822560 465088 task_exit.go:204] [ 59020: 59020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.822731 465088 task_signals.go:204] [ 59020: 59023] Signal 59020, PID: 59023, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.822887 465088 task_exit.go:204] [ 59020: 59020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.823152 465088 task_exit.go:204] [ 59020: 59023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.825335 465088 task_exit.go:204] [ 59020: 59023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.825375 465088 task_exit.go:204] [ 59020: 59023] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.825463 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:50.825577 465088 task_exit.go:204] [ 59020: 59020] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.829899 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.829971 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.830033 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.830090 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.830131 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.830161 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.830192 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.830310 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.830396 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.830550 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 202 with restart block: not interrupted by handled signal D0312 10:47:50.830796 465088 task_run.go:182] [ 59003: 59017] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.831185 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.831349 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.831420 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.831581 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.832073 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.832156 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.834714 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.834818 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.834884 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.836794 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.837748 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.839209 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.839275 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.839318 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.839370 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.839401 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.839450 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.839484 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.839590 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.839669 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 219 with restart block: not interrupted by handled signal D0312 10:47:50.839809 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.839859 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.839962 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.840011 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.840177 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.840291 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.841113 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.843912 465088 task_signals.go:885] [ 59003: 59003] Completing group stop D0312 10:47:50.844022 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.844092 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.849117 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.849187 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.849224 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.849252 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.849286 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.849389 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.849435 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.849540 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.849603 465088 task_run.go:182] [ 59003: 59017] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.859044 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.859214 465088 usertrap_amd64.go:212] [ 59003: 59003] Found the pattern at ip 5652f299ce1a:sysno 230 D0312 10:47:50.859296 465088 usertrap_amd64.go:122] [ 59003: 59003] Allocate a new trap: 0xc00d9fdbc0 45 D0312 10:47:50.859389 465088 usertrap_amd64.go:225] [ 59003: 59003] Apply the binary patch addr 5652f299ce1a trap addr 64e10 ([184 230 0 0 0 15 5] -> [255 36 37 16 78 6 0]) D0312 10:47:50.862497 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.862662 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.862783 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.862910 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.863003 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.863107 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.863196 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.863268 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.863328 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.865953 465088 usertrap_amd64.go:212] [ 59019: 59019] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:50.866067 465088 usertrap_amd64.go:122] [ 59019: 59019] Allocate a new trap: 0xc009ebafc0 44 D0312 10:47:50.866186 465088 usertrap_amd64.go:225] [ 59019: 59019] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:50.870829 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.870897 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.870941 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.870982 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.871010 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.871057 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.871116 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.871221 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.872044 465088 task_run.go:182] [ 59003: 59017] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.872209 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.872286 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.879408 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.882156 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.882412 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.882570 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.882677 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.882767 465088 task_signals.go:885] [ 59003: 59017] Completing group stop D0312 10:47:50.882850 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.882974 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.883043 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.883103 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.888221 465088 task_exit.go:204] [ 59019: 59019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.888676 465088 task_exit.go:204] [ 59019: 59019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.890352 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.890375 465088 task_signals.go:204] [ 59019: 59021] Signal 59019, PID: 59021, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.890416 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.890466 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.890498 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.890548 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.890581 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.890644 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.890715 465088 task_exit.go:204] [ 59019: 59021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.890842 465088 task_signals.go:204] [ 59019: 59022] Signal 59019, PID: 59022, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.891997 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.892000 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.892202 465088 task_run.go:179] [ 59003: 59003] Restarting syscall 230 with restart block: not interrupted by handled signal D0312 10:47:50.892300 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.892621 465088 task_signals.go:470] [ 59003: 59013] Notified of signal 22 D0312 10:47:50.892861 465088 task_signals.go:808] [ 59003: 59013] Signal 22: stopping 5 threads in thread group D0312 10:47:50.893013 465088 task_stop.go:118] [ 59003: 59013] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.893142 465088 task_stop.go:118] [ 59003: 59017] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.893275 465088 task_stop.go:118] [ 59003: 59011] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.893379 465088 task_signals.go:204] [ 59019: 59024] Signal 59019, PID: 59024, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:50.893423 465088 task_stop.go:118] [ 59003: 59003] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.893626 465088 task_exit.go:204] [ 59019: 59022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.893985 465088 task_exit.go:204] [ 59019: 59024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:50.894289 465088 task_exit.go:204] [ 59019: 59024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.894384 465088 task_exit.go:204] [ 59019: 59024] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.894301 465088 task_signals.go:885] [ 59003: 59010] Completing group stop D0312 10:47:50.894637 465088 task_stop.go:118] [ 59003: 59010] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:50.894742 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.894843 465088 task_exit.go:204] [ 59019: 59021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.894912 465088 task_exit.go:204] [ 59019: 59021] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.897456 465088 task_exit.go:204] [ 59019: 59022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:50.897521 465088 task_exit.go:204] [ 59019: 59022] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.897596 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:50.898959 465088 task_exit.go:204] [ 59019: 59019] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:50.899606 465088 task_signals.go:828] [ 59003: 59003] Ending complete group stop with 0 threads pending D0312 10:47:50.899735 465088 task_stop.go:138] [ 59003: 59003] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.899792 465088 task_stop.go:138] [ 59003: 59010] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.899838 465088 task_stop.go:138] [ 59003: 59011] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.899867 465088 task_stop.go:138] [ 59003: 59013] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.900110 465088 task_stop.go:138] [ 59003: 59017] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:50.900191 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.900338 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:50.900484 465088 task_run.go:182] [ 59003: 59011] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.900599 465088 task_run.go:182] [ 59003: 59010] Restarting syscall 1: not interrupted by handled signal D0312 10:47:50.900706 465088 task_run.go:182] [ 59003: 59017] Restarting syscall 202: not interrupted by handled signal D0312 10:47:50.912146 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.917252 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:50.919158 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:50.919253 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.929048 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.940154 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.948648 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.958632 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.969096 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.979311 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:50.990570 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.001101 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.009441 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.018565 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.028596 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.038728 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.049144 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.059674 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.070405 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.079287 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.090127 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.098680 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.109174 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.119255 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.128074 465088 usertrap_amd64.go:212] [ 59005: 59005] Found the pattern at ip 55fb9ddb4fa4:sysno 3 D0312 10:47:51.128162 465088 usertrap_amd64.go:122] [ 59005: 59005] Allocate a new trap: 0xc002a43b60 43 D0312 10:47:51.128220 465088 usertrap_amd64.go:225] [ 59005: 59005] Apply the binary patch addr 55fb9ddb4fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0312 10:47:51.129451 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.135417 465088 task_exit.go:204] [ 59005: 59005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.135622 465088 task_signals.go:204] [ 59005: 59012] Signal 59005, PID: 59012, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.135696 465088 task_exit.go:204] [ 59005: 59005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.135847 465088 task_signals.go:204] [ 59005: 59007] Signal 59005, PID: 59007, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.135952 465088 task_exit.go:204] [ 59005: 59007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.136091 465088 task_exit.go:204] [ 59005: 59007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.136129 465088 task_exit.go:204] [ 59005: 59007] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.140366 465088 task_exit.go:204] [ 59005: 59012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.141902 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.142724 465088 task_exit.go:204] [ 59005: 59012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.142779 465088 task_exit.go:204] [ 59005: 59012] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.142861 465088 task_signals.go:443] [ 57630: 57630] Discarding ignored signal 17 D0312 10:47:51.149401 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.149580 465088 task_exit.go:204] [ 59005: 59005] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffeab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup(0xffffffffffffffff) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r6, 0x2f, 0x7, 0x6, 0x3b5, 0x4, @mcast2, @private2, 0x700, 0x10, 0xb231, 0x1}}) r7 = eventfd(0x2) dup2(r4, r7) getsockopt$IPT_SO_GET_INFO(r3, 0x6, 0xb, 0x0, &(0x7f0000000000)) D0312 10:47:51.158670 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.161454 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.161863 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.168693 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.179511 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.187837 465088 usertrap_amd64.go:212] [ 59003: 59003] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:51.187967 465088 usertrap_amd64.go:122] [ 59003: 59003] Allocate a new trap: 0xc00d9fdbc0 46 D0312 10:47:51.188046 465088 usertrap_amd64.go:225] [ 59003: 59003] Apply the binary patch addr 5652f2929fa4 trap addr 64e60 ([184 3 0 0 0 15 5] -> [255 36 37 96 78 6 0]) D0312 10:47:51.190751 465088 task_signals.go:443] [ 59003: 59003] Discarding ignored signal 18 D0312 10:47:51.193913 465088 task_exit.go:204] [ 59003: 59003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.194026 465088 task_signals.go:204] [ 59003: 59011] Signal 59003, PID: 59011, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.194121 465088 task_exit.go:204] [ 59003: 59011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.194241 465088 task_signals.go:204] [ 59003: 59017] Signal 59003, PID: 59017, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.194322 465088 task_signals.go:204] [ 59003: 59013] Signal 59003, PID: 59013, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.194410 465088 task_signals.go:204] [ 59003: 59010] Signal 59003, PID: 59010, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.194486 465088 task_exit.go:204] [ 59003: 59011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.194516 465088 task_exit.go:204] [ 59003: 59011] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.194641 465088 task_exit.go:204] [ 59003: 59013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.194840 465088 task_exit.go:204] [ 59003: 59013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.194876 465088 task_exit.go:204] [ 59003: 59013] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.194994 465088 task_exit.go:204] [ 59003: 59017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.195140 465088 task_exit.go:204] [ 59003: 59017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.195183 465088 task_exit.go:204] [ 59003: 59017] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.195265 465088 task_exit.go:204] [ 59003: 59003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.195938 465088 task_exit.go:204] [ 59003: 59010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.200930 465088 task_signals.go:481] [ 59003: 59003] No task notified of signal 18 D0312 10:47:51.204137 465088 task_exit.go:204] [ 59003: 59010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.204276 465088 task_exit.go:204] [ 59003: 59010] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.204378 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:51.205516 465088 task_exit.go:204] [ 59003: 59003] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:51 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) (async) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) (async) r2 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE(r2, 0x5000940c, 0x0) (async) close(r1) (async) r3 = gettid() tkill(r3, 0x401004000000016) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8903, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) close(r4) 10:47:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e20, @local}}) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) (async) ioctl$FIONCLEX(r1, 0x5450) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)="99b45b4a2a5ec9ca4d5300bb0900d2f75e8257d42f3c01fdc4e86b9a0d5184c0fbfc8a2c1190da0c74b5adc78bf0785d9f30057b561cf0273630254a960ce1bee1780bb15ff807972aef22dbd1b13967a2191742b79b7792e65881b6195e5d19fe1d417a51d00acfce10e3c65880f429d64815daf2", 0x75) (async) r2 = signalfd4(r0, &(0x7f0000000180)={[0xfffffffffffffff8]}, 0x8, 0x40000) (async) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'syz_tun\x00', 0xd21}) (async) close(r0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/92, 0x5c}, {&(0x7f0000000300)=""/164, 0xa4}], 0x2}, 0x40002101) r3 = accept4$unix(r2, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x80000) ftruncate(r3, 0x7) ftruncate(r0, 0x1) (async) connect$unix(r2, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) (async) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000980)={0x0, 0x1, 0x2, 0x18, 0x1d9, &(0x7f0000000580)="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"}) (async) r4 = accept4(r2, &(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000a40)=0x80, 0x80800) setsockopt(r4, 0xed, 0x800, &(0x7f0000000a80)="5822a95db0bdba988ba6e9d73dbe5e710453ffda88608531519942c1cd6111b8cfe5484945009ff3481f8b0471840296ad5c", 0x32) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r6, 0x6, 0x1b, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) (async, rerun: 64) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000b80)={'wlan1\x00', {0x2, 0x4e21, @multicast2}}) (rerun: 64) pipe2(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) (async) read$FUSE(r2, &(0x7f0000000c00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r7, &(0x7f0000002c40)={0x18, 0x0, r9}, 0x18) (async, rerun: 32) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000002c80)={@remote, 0x31}) (async, rerun: 32) read$FUSE(r8, &(0x7f0000002cc0)={0x2020}, 0x2020) (async) pipe(&(0x7f0000004d00)) (async) read$FUSE(r0, &(0x7f0000004d40)={0x2020}, 0x2020) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000006d80)) r10 = socket$inet6_icmp(0xa, 0x2, 0x3a) preadv(r10, &(0x7f0000007040)=[{&(0x7f0000006e80)=""/164, 0xa4}, {&(0x7f0000006f40)=""/158, 0x9e}, {&(0x7f0000007000)=""/33, 0x21}], 0x3, 0x80000000, 0x9) 10:47:51 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x9}) r1 = signalfd4(r0, &(0x7f0000000000)={[0x1ff]}, 0x8, 0x800) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x9}) (async) signalfd4(r0, &(0x7f0000000000)={[0x1ff]}, 0x8, 0x800) (async) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) (async) D0312 10:47:51.223482 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.227069 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.529036 465088 usertrap_amd64.go:212] [ 59025: 59025] Found the pattern at ip 55fb9de28490:sysno 109 D0312 10:47:51.529238 465088 usertrap_amd64.go:122] [ 59025: 59025] Allocate a new trap: 0xc008d7b4a0 39 D0312 10:47:51.532218 465088 usertrap_amd64.go:225] [ 59025: 59025] Apply the binary patch addr 55fb9de28490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0312 10:47:51.545097 465088 usertrap_amd64.go:212] [ 59025: 59025] Found the pattern at ip 55fb9de02a30:sysno 266 D0312 10:47:51.545208 465088 usertrap_amd64.go:122] [ 59025: 59025] Allocate a new trap: 0xc008d7b4a0 40 D0312 10:47:51.545316 465088 usertrap_amd64.go:225] [ 59025: 59025] Apply the binary patch addr 55fb9de02a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0312 10:47:51.547331 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.547831 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.557670 465088 usertrap_amd64.go:212] [ 59025: 59025] Found the pattern at ip 55fb9de0451a:sysno 56 D0312 10:47:51.557747 465088 usertrap_amd64.go:122] [ 59025: 59025] Allocate a new trap: 0xc008d7b4a0 41 D0312 10:47:51.557820 465088 usertrap_amd64.go:225] [ 59025: 59025] Apply the binary patch addr 55fb9de0451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0312 10:47:51.567862 465088 usertrap_amd64.go:212] [ 59026: 59026] Found the pattern at ip 55c5b5e1c490:sysno 109 D0312 10:47:51.568097 465088 usertrap_amd64.go:122] [ 59026: 59026] Allocate a new trap: 0xc0023b97a0 40 D0312 10:47:51.568451 465088 usertrap_amd64.go:212] [ 59027: 59027] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:51.568997 465088 usertrap_amd64.go:122] [ 59027: 59027] Allocate a new trap: 0xc00d021560 40 D0312 10:47:51.569059 465088 usertrap_amd64.go:225] [ 59026: 59026] Apply the binary patch addr 55c5b5e1c490 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0312 10:47:51.569513 465088 usertrap_amd64.go:225] [ 59027: 59027] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:51.572882 465088 usertrap_amd64.go:212] [ 59026: 59026] Found the pattern at ip 55c5b5df6a30:sysno 266 D0312 10:47:51.573035 465088 usertrap_amd64.go:122] [ 59026: 59026] Allocate a new trap: 0xc0023b97a0 41 D0312 10:47:51.573130 465088 usertrap_amd64.go:225] [ 59026: 59026] Apply the binary patch addr 55c5b5df6a30 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0312 10:47:51.576087 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.579696 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.583489 465088 usertrap_amd64.go:212] [ 59027: 59027] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:51.583629 465088 usertrap_amd64.go:122] [ 59027: 59027] Allocate a new trap: 0xc00d021560 41 D0312 10:47:51.583754 465088 usertrap_amd64.go:225] [ 59027: 59027] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:51.587146 465088 usertrap_amd64.go:212] [ 59028: 59028] Found the pattern at ip 5652f299d490:sysno 109 D0312 10:47:51.587311 465088 usertrap_amd64.go:122] [ 59028: 59028] Allocate a new trap: 0xc0102b4e10 40 D0312 10:47:51.587968 465088 usertrap_amd64.go:225] [ 59028: 59028] Apply the binary patch addr 5652f299d490 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0312 10:47:51.590940 465088 usertrap_amd64.go:212] [ 59028: 59028] Found the pattern at ip 5652f2977a30:sysno 266 D0312 10:47:51.591017 465088 usertrap_amd64.go:122] [ 59028: 59028] Allocate a new trap: 0xc0102b4e10 41 D0312 10:47:51.591084 465088 usertrap_amd64.go:225] [ 59028: 59028] Apply the binary patch addr 5652f2977a30 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0312 10:47:51.591270 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.594198 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.599322 465088 usertrap_amd64.go:212] [ 59026: 59026] Found the pattern at ip 55c5b5df851a:sysno 56 D0312 10:47:51.599419 465088 usertrap_amd64.go:122] [ 59026: 59026] Allocate a new trap: 0xc0023b97a0 42 D0312 10:47:51.599485 465088 usertrap_amd64.go:225] [ 59026: 59026] Apply the binary patch addr 55c5b5df851a trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0312 10:47:51.611170 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.616258 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.637723 465088 usertrap_amd64.go:212] [ 59027: 59027] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:51.637822 465088 usertrap_amd64.go:122] [ 59027: 59027] Allocate a new trap: 0xc00d021560 42 D0312 10:47:51.637885 465088 usertrap_amd64.go:225] [ 59027: 59027] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:51.640819 465088 usertrap_amd64.go:212] [ 59026: 59030] Found the pattern at ip 55c5b5da927d:sysno 257 D0312 10:47:51.641039 465088 usertrap_amd64.go:122] [ 59026: 59030] Allocate a new trap: 0xc0023b97a0 43 D0312 10:47:51.641122 465088 usertrap_amd64.go:225] [ 59026: 59030] Apply the binary patch addr 55c5b5da927d trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0312 10:47:51.641344 465088 usertrap_amd64.go:212] [ 59028: 59028] Found the pattern at ip 5652f297951a:sysno 56 D0312 10:47:51.641463 465088 usertrap_amd64.go:122] [ 59028: 59028] Allocate a new trap: 0xc0102b4e10 42 D0312 10:47:51.641612 465088 usertrap_amd64.go:225] [ 59028: 59028] Apply the binary patch addr 5652f297951a trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0312 10:47:51.642195 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.644167 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.649767 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.650263 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.685882 465088 usertrap_amd64.go:212] [ 59027: 59027] Found the pattern at ip 55f807588e1a:sysno 230 D0312 10:47:51.686003 465088 usertrap_amd64.go:122] [ 59027: 59027] Allocate a new trap: 0xc00d021560 43 D0312 10:47:51.686064 465088 usertrap_amd64.go:225] [ 59027: 59027] Apply the binary patch addr 55f807588e1a trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0312 10:47:51.702472 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.704408 465088 usertrap_amd64.go:212] [ 59027: 59027] Found the pattern at ip 55f807515fa4:sysno 3 D0312 10:47:51.704529 465088 usertrap_amd64.go:122] [ 59027: 59027] Allocate a new trap: 0xc00d021560 44 D0312 10:47:51.704640 465088 usertrap_amd64.go:225] [ 59027: 59027] Apply the binary patch addr 55f807515fa4 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0312 10:47:51.707428 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.711300 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.711908 465088 task_exit.go:204] [ 59027: 59027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.712148 465088 task_signals.go:204] [ 59027: 59031] Signal 59027, PID: 59031, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.712222 465088 task_exit.go:204] [ 59027: 59027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.712290 465088 task_exit.go:204] [ 59027: 59031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.712485 465088 task_signals.go:204] [ 59027: 59036] Signal 59027, PID: 59036, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.713394 465088 task_exit.go:204] [ 59027: 59036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.713570 465088 task_exit.go:204] [ 59027: 59036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.713623 465088 task_exit.go:204] [ 59027: 59036] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.713815 465088 task_exit.go:204] [ 59027: 59031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.713862 465088 task_exit.go:204] [ 59027: 59031] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.714079 465088 task_signals.go:204] [ 59027: 59035] Signal 59027, PID: 59035, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.714166 465088 task_exit.go:204] [ 59027: 59035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.714888 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.717832 465088 task_exit.go:204] [ 59027: 59035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.717937 465088 task_exit.go:204] [ 59027: 59035] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.718049 465088 task_signals.go:443] [ 35: 35] Discarding ignored signal 17 D0312 10:47:51.720698 465088 task_exit.go:204] [ 59027: 59027] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.722678 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.726954 465088 usertrap_amd64.go:212] [ 59025: 59025] Found the pattern at ip 55fb9de27e1a:sysno 230 D0312 10:47:51.727023 465088 usertrap_amd64.go:122] [ 59025: 59025] Allocate a new trap: 0xc008d7b4a0 42 D0312 10:47:51.727102 465088 usertrap_amd64.go:225] [ 59025: 59025] Apply the binary patch addr 55fb9de27e1a trap addr 61d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 29 6 0]) 10:47:51 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x9}) r1 = signalfd4(r0, &(0x7f0000000000)={[0x1ff]}, 0x8, 0x800) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) (async) ioctl$TUNDETACHFILTER(r1, 0x5450, 0x0) D0312 10:47:51.734602 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.742772 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.746501 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.747174 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.754516 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.762564 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.772515 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.778195 465088 usertrap_amd64.go:212] [ 59026: 59026] Found the pattern at ip 55c5b5da8fa4:sysno 3 D0312 10:47:51.778273 465088 usertrap_amd64.go:122] [ 59026: 59026] Allocate a new trap: 0xc0023b97a0 44 D0312 10:47:51.778413 465088 usertrap_amd64.go:225] [ 59026: 59026] Apply the binary patch addr 55c5b5da8fa4 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0312 10:47:51.783149 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.790167 465088 task_exit.go:204] [ 59026: 59026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.790402 465088 task_signals.go:204] [ 59026: 59039] Signal 59026, PID: 59039, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.790510 465088 task_signals.go:204] [ 59026: 59030] Signal 59026, PID: 59030, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.790657 465088 task_exit.go:204] [ 59026: 59039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.790918 465088 task_exit.go:204] [ 59026: 59039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.790969 465088 task_exit.go:204] [ 59026: 59039] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.792448 465088 task_signals.go:204] [ 59026: 59037] Signal 59026, PID: 59037, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.792428 465088 task_signals.go:204] [ 59026: 59040] Signal 59026, PID: 59040, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.792611 465088 task_exit.go:204] [ 59026: 59037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.792727 465088 task_signals.go:204] [ 59026: 59032] Signal 59026, PID: 59032, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.792785 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.793315 465088 task_exit.go:204] [ 59026: 59030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.793581 465088 task_exit.go:204] [ 59026: 59040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.793658 465088 task_exit.go:204] [ 59026: 59026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.794064 465088 task_exit.go:204] [ 59026: 59037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.794131 465088 task_exit.go:204] [ 59026: 59037] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.794281 465088 task_exit.go:204] [ 59026: 59040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.794320 465088 task_exit.go:204] [ 59026: 59040] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.794791 465088 task_exit.go:204] [ 59026: 59030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.794911 465088 task_exit.go:204] [ 59026: 59030] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.795059 465088 task_exit.go:204] [ 59026: 59032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.811438 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.814987 465088 task_exit.go:204] [ 59026: 59032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.815129 465088 task_exit.go:204] [ 59026: 59032] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.815244 465088 task_signals.go:443] [ 36: 36] Discarding ignored signal 17 D0312 10:47:51.820091 465088 task_exit.go:204] [ 59026: 59026] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.820292 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.823164 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 10:47:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x3, 0x0, [0x9, 0x0, 0x3], 0x0, 0x0, 0x0}, 0x51a) D0312 10:47:51.833226 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.838991 465088 usertrap_amd64.go:212] [ 59041: 59041] Found the pattern at ip 55f807589490:sysno 109 D0312 10:47:51.839063 465088 usertrap_amd64.go:122] [ 59041: 59041] Allocate a new trap: 0xc00d0215f0 40 D0312 10:47:51.839750 465088 usertrap_amd64.go:225] [ 59041: 59041] Apply the binary patch addr 55f807589490 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0312 10:47:51.842964 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.843085 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.847399 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.852679 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.854401 465088 task_signals.go:470] [ 59028: 59042] Notified of signal 22 D0312 10:47:51.854520 465088 task_signals.go:808] [ 59028: 59042] Signal 22: stopping 4 threads in thread group D0312 10:47:51.854605 465088 task_stop.go:118] [ 59028: 59038] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:51.854745 465088 task_stop.go:118] [ 59028: 59042] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:51.854861 465088 task_signals.go:885] [ 59028: 59033] Completing group stop D0312 10:47:51.854932 465088 task_stop.go:118] [ 59028: 59033] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:51.855038 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:51.855148 465088 usertrap_amd64.go:212] [ 59041: 59041] Found the pattern at ip 55f807563a30:sysno 266 D0312 10:47:51.855093 465088 task_stop.go:118] [ 59028: 59028] Entering internal stop (*kernel.groupStop)(nil) D0312 10:47:51.855226 465088 usertrap_amd64.go:122] [ 59041: 59041] Allocate a new trap: 0xc00d0215f0 41 D0312 10:47:51.855331 465088 usertrap_amd64.go:225] [ 59041: 59041] Apply the binary patch addr 55f807563a30 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0312 10:47:51.858775 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, proc, ]} D0312 10:47:51.862934 465088 task_signals.go:828] [ 59028: 59028] Ending complete group stop with 0 threads pending D0312 10:47:51.863005 465088 task_stop.go:138] [ 59028: 59028] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:51.863076 465088 task_stop.go:138] [ 59028: 59033] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:51.863126 465088 task_stop.go:138] [ 59028: 59038] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:51.863099 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.863193 465088 task_stop.go:138] [ 59028: 59042] Leaving internal stop (*kernel.groupStop)(nil) D0312 10:47:51.863231 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.863338 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:51.863409 465088 task_run.go:179] [ 59028: 59028] Restarting syscall 202 with restart block: not interrupted by handled signal D0312 10:47:51.863612 465088 task_run.go:182] [ 59028: 59038] Restarting syscall 1: not interrupted by handled signal D0312 10:47:51.864572 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.868627 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0312 10:47:51.873330 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.879160 465088 usertrap_amd64.go:212] [ 59028: 59028] Found the pattern at ip 5652f2929fa4:sysno 3 D0312 10:47:51.879280 465088 usertrap_amd64.go:122] [ 59028: 59028] Allocate a new trap: 0xc0102b4e10 43 D0312 10:47:51.879357 465088 usertrap_amd64.go:225] [ 59028: 59028] Apply the binary patch addr 5652f2929fa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0312 10:47:51.882522 465088 usertrap_amd64.go:212] [ 59041: 59041] Found the pattern at ip 55f80756551a:sysno 56 D0312 10:47:51.882591 465088 usertrap_amd64.go:122] [ 59041: 59041] Allocate a new trap: 0xc00d0215f0 42 D0312 10:47:51.882669 465088 usertrap_amd64.go:225] [ 59041: 59041] Apply the binary patch addr 55f80756551a trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0312 10:47:51.883462 465088 task_signals.go:443] [ 59028: 59028] Discarding ignored signal 18 D0312 10:47:51.883704 465088 task_exit.go:204] [ 59028: 59028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.883923 465088 task_signals.go:204] [ 59028: 59042] Signal 59028, PID: 59042, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.883986 465088 task_signals.go:204] [ 59028: 59038] Signal 59028, PID: 59038, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.884165 465088 task_signals.go:204] [ 59028: 59033] Signal 59028, PID: 59033, TID: 0, fault addr: 0x9: terminating thread group D0312 10:47:51.884196 465088 task_exit.go:204] [ 59028: 59038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.884400 465088 task_exit.go:204] [ 59028: 59038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.884468 465088 task_exit.go:204] [ 59028: 59038] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.886116 465088 task_exit.go:204] [ 59028: 59033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.886794 465088 task_exit.go:204] [ 59028: 59033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.886854 465088 task_exit.go:204] [ 59028: 59033] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.887457 465088 task_exit.go:204] [ 59028: 59042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0312 10:47:51.887690 465088 task_exit.go:204] [ 59028: 59028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.890426 465088 task_exit.go:204] [ 59028: 59042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0312 10:47:51.890512 465088 task_exit.go:204] [ 59028: 59042] Transitioning from exit state TaskExitZombie to TaskExitDead D0312 10:47:51.890599 465088 task_signals.go:443] [ 34: 34] Discarding ignored signal 17 D0312 10:47:51.890979 465088 task_exit.go:204] [ 59028: 59028] Transitioning from exit state TaskExitZombie to TaskExitDead 10:47:51 executing program 0: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)=""/218, &(0x7f0000000100)=0xda) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) io_setup(0x7fffffff, &(0x7f0000000180)=0x0) r3 = eventfd2(0x7d1, 0x80000) io_submit(r2, 0x5, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0xffff, r1, &(0x7f00000001c0)="659153f004038a8bf23f66d7cc84335b93546348015a8413ad921190aa40b0cbe34e93e9a5cf203bf67ae7dfe10af627f507dbcc3149cb5e600faf25b4effd404db094977bf7cffe81385877745bdda4a9eaf5483a5fa0a0ab6364a046f76091da0e6dd6f92d55a7962a9664d33e235a7e43892ec950ca14e2a0b7f0ad33c1684bc9cab32369cd0d4198cfd97c25799f65fd92275e81a1197160b1f7ca2edd706e49c5c0fc15726f46328892f3cbc687f8479243cb6315bb7eb34deaebe27b0f1a2038fe98975078ac8eafc84c2c115e5990f653c84176dd2bc9d2b09e8fbc45", 0xe0, 0x1ff, 0x0, 0x2, r3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000000300)="c2f08f972073f6f06b429e05462344ba9f5c11cbae17fa98791aba16d458a2b13800448884", 0x25, 0x9, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x6, r1, &(0x7f0000000380)="0597660d1900e10edeec4986752dd91fc4d4eb", 0x13, 0x6, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x8, 0x1ff, r1, &(0x7f0000000400)="45bd893c54ba34fb0ef7b0253907daad030b6ada5582b19501bdc68dc0dc020ea33d30fe7b985025b2be5e5308451fa49611087debe4d7191f55d5dbd65de56a1b6d2de411ad72283043d28941794a85f7401f44a2007ed298fc6f5dcb059cb7cd9802dadef50623ac149e0138015257f2aaf92ba32ca7df91712a208b0c4099e91bd7d240453c8367441f051799d3a767255a6a8fdce5a549a1ab0f7a23ea890f32b1f08cb386ddaba2a7fdb83c02f05470608ac717d60c85f271a1953a80e99fbba61627104dcaccc45d71d6ef559669cf9aacb4cdb2271d0d", 0xda, 0x9c5, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xfffe, r0, &(0x7f0000000540)="734dc9a917fd9df7aae18fb56a82dce720a028f958558d3a3a530358a4c1e6ac22ca03b673", 0x25, 0x72}]) r4 = signalfd(r1, &(0x7f0000000600)={[0x6]}, 0x8) read$eventfd(r4, &(0x7f0000000640), 0x8) write$eventfd(r4, &(0x7f0000000680)=0xfffffffffffffffe, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ftruncate(r1, 0x3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) write$eventfd(0xffffffffffffffff, &(0x7f00000006c0)=0x57, 0x8) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLOPEN(r7, &(0x7f0000000740)={0x18, 0xd, 0x2, {{0x2, 0x4, 0x4}, 0x1000}}, 0x18) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f0000000780)) r8 = accept$unix(r7, &(0x7f00000007c0)=@abs, &(0x7f0000000840)=0x6e) fcntl$dupfd(r8, 0x0, r4) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000880)=0x120, 0x4) ioctl$FIOCLEX(r0, 0x5451) r9 = epoll_create1(0x80000) ioctl$BTRFS_IOC_DEFRAG(r9, 0x50009402, 0x0) write$eventfd(r6, &(0x7f00000008c0)=0x58f, 0x8) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000900)) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f0000000940)={0x2, 'ipvlan0\x00', {0x5}, 0xe1}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000980)=0xc0, 0x4) D0312 10:47:51.906523 465088 client.go:400] send [channel 0xc00051c360] WalkReq{DirFD: 1, Path: [, dev, ]} D0312 10:47:51.906972 465088 client.go:400] recv [channel 0xc00051c360] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13637715 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678615011 Nsec:243785380 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678615015 Nsec:171781467 _:0} Mtime:{Sec:1678615015 Nsec:171781467 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} ================== WARNING: DATA RACE Write at 0x00c001308b84 by goroutine 4472684: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocessPool).fetchAvailable() pkg/sentry/platform/systrap/subprocess_pool.go:74 +0x248 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess() pkg/sentry/platform/systrap/subprocess.go:255 +0x64 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*Systrap).NewAddressSpace() pkg/sentry/platform/systrap/systrap.go:404 +0x6e gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).NewAddressSpace() :1 +0x77 gvisor.dev/gvisor/pkg/sentry/mm.(*MemoryManager).Activate() pkg/sentry/mm/address_space.go:86 +0x13a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Activate() pkg/sentry/kernel/task_usermem.go:39 +0x59 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:70 +0x2e4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Previous read at 0x00c001308b84 by goroutine 4472335: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocess).unregisterContext() pkg/sentry/platform/systrap/subprocess.go:993 +0x164 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*context).Release() pkg/sentry/platform/systrap/systrap.go:326 +0x95 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:101 +0x51a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 4472684 (running) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 4472335 (finished) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 ================== W0312 10:47:52.249480 465235 util.go:64] FATAL ERROR: waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-1": urpc method "containerManager.WaitPID" failed: EOF W0312 10:47:52.249751 465235 main.go:267] Failure to execute command, err: 1 W0312 10:47:52.290349 465060 sandbox.go:1003] Wait RPC to container "ci-gvisor-systrap-1-race-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0312 10:47:52.290347 1 connection.go:127] sock read failed, closing connection: EOF I0312 10:47:52.298030 1 gofer.go:333] All lisafs servers exited. I0312 10:47:52.298498 1 main.go:258] Exiting with status: 0 D0312 10:47:52.300492 465060 container.go:736] Destroy container, cid: ci-gvisor-systrap-1-race-1 D0312 10:47:52.300601 465060 container.go:976] Destroying container, cid: ci-gvisor-systrap-1-race-1 D0312 10:47:52.300663 465060 sandbox.go:1290] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-1 D0312 10:47:52.300690 465060 sandbox.go:1045] Destroying sandbox "ci-gvisor-systrap-1-race-1" D0312 10:47:52.300775 465060 container.go:990] Killing gofer for container, cid: ci-gvisor-systrap-1-race-1, PID: 465084 I0312 10:47:52.330366 465060 main.go:258] Exiting with status: 16896 VM DIAGNOSIS: I0312 10:47:52.018940 137695 main.go:222] *************************** I0312 10:47:52.019034 137695 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0312 10:47:52.019093 137695 main.go:224] Version 0.0.0 I0312 10:47:52.019124 137695 main.go:225] GOOS: linux I0312 10:47:52.019159 137695 main.go:226] GOARCH: amd64 I0312 10:47:52.019184 137695 main.go:227] PID: 137695 I0312 10:47:52.019209 137695 main.go:228] UID: 0, GID: 0 I0312 10:47:52.019234 137695 main.go:229] Configuration: I0312 10:47:52.019257 137695 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0312 10:47:52.019281 137695 main.go:231] Platform: systrap I0312 10:47:52.019313 137695 main.go:232] FileAccess: shared I0312 10:47:52.019349 137695 main.go:233] Directfs: false I0312 10:47:52.019393 137695 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0312 10:47:52.019421 137695 main.go:236] Network: sandbox, logging: false I0312 10:47:52.019451 137695 main.go:237] Strace: false, max size: 1024, syscalls: I0312 10:47:52.019484 137695 main.go:238] IOURING: false I0312 10:47:52.019517 137695 main.go:239] Debug: true I0312 10:47:52.019552 137695 main.go:240] Systemd: false I0312 10:47:52.019581 137695 main.go:241] *************************** W0312 10:47:52.019626 137695 main.go:246] Block the TERM signal. This is only safe in tests! D0312 10:47:52.019738 137695 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0312 10:47:52.039004 137695 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-1" '\U000718c0'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-1" '\U000718c0'], PID: %!d(MISSING) I0312 10:47:52.039117 137695 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0312 10:47:52.039144 137695 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0312 10:47:52.039169 137695 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0312 10:47:52.039340 137695 urpc.go:568] urpc: successfully marshalled 36 bytes. W0312 10:47:52.249320 137695 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0312 10:47:52.249816 137695 main.go:267] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-1"]: exit status 128 I0312 10:47:52.018940 137695 main.go:222] *************************** I0312 10:47:52.019034 137695 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0312 10:47:52.019093 137695 main.go:224] Version 0.0.0 I0312 10:47:52.019124 137695 main.go:225] GOOS: linux I0312 10:47:52.019159 137695 main.go:226] GOARCH: amd64 I0312 10:47:52.019184 137695 main.go:227] PID: 137695 I0312 10:47:52.019209 137695 main.go:228] UID: 0, GID: 0 I0312 10:47:52.019234 137695 main.go:229] Configuration: I0312 10:47:52.019257 137695 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0312 10:47:52.019281 137695 main.go:231] Platform: systrap I0312 10:47:52.019313 137695 main.go:232] FileAccess: shared I0312 10:47:52.019349 137695 main.go:233] Directfs: false I0312 10:47:52.019393 137695 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0312 10:47:52.019421 137695 main.go:236] Network: sandbox, logging: false I0312 10:47:52.019451 137695 main.go:237] Strace: false, max size: 1024, syscalls: I0312 10:47:52.019484 137695 main.go:238] IOURING: false I0312 10:47:52.019517 137695 main.go:239] Debug: true I0312 10:47:52.019552 137695 main.go:240] Systemd: false I0312 10:47:52.019581 137695 main.go:241] *************************** W0312 10:47:52.019626 137695 main.go:246] Block the TERM signal. This is only safe in tests! D0312 10:47:52.019738 137695 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0312 10:47:52.039004 137695 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-1" '\U000718c0'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-1" '\U000718c0'], PID: %!d(MISSING) I0312 10:47:52.039117 137695 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0312 10:47:52.039144 137695 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0312 10:47:52.039169 137695 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0312 10:47:52.039340 137695 urpc.go:568] urpc: successfully marshalled 36 bytes. W0312 10:47:52.249320 137695 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0312 10:47:52.249816 137695 main.go:267] Failure to execute command, err: 1 [452349.746468] warn_bad_vsyscall: 43 callbacks suppressed [452349.746471] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.113817] exe[69794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.363064] exe[76542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.536165] exe[54267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.671631] exe[51059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.812918] exe[22427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.832387] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452350.952814] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452351.072785] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452351.209398] exe[51043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.250504] warn_bad_vsyscall: 119 callbacks suppressed [452355.250507] exe[20151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.423492] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.515766] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.657921] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.755664] exe[20573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.870486] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.962609] exe[20592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.159715] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.212450] exe[22422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.355659] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.376744] warn_bad_vsyscall: 116 callbacks suppressed [452360.376747] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.709828] exe[20302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.071503] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.547987] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.726910] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.771671] exe[20361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.918275] exe[20224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.148831] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.337844] exe[20134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.530033] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.512425] warn_bad_vsyscall: 16 callbacks suppressed [452365.512428] exe[434993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.720991] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.882172] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.024659] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.057332] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.090324] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.127998] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.161781] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.191615] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.224902] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.526773] warn_bad_vsyscall: 112 callbacks suppressed [452370.526777] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.562416] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.591092] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.620943] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.653877] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.686990] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.718028] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.749500] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.780430] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.810140] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.643596] warn_bad_vsyscall: 104 callbacks suppressed [452375.643601] exe[20426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.968939] exe[20368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.163289] exe[20272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.299944] exe[20571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.390126] exe[20384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.488374] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.569364] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.685764] exe[20354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.791650] exe[20251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.876874] exe[20185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452380.776618] warn_bad_vsyscall: 81 callbacks suppressed [452380.776622] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.053582] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.285245] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.344369] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.603612] exe[434944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.899289] exe[20487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.136420] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.427228] exe[20609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.100617] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.231624] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452387.563018] warn_bad_vsyscall: 6 callbacks suppressed [452387.563021] exe[20676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.388727] exe[434968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.748784] exe[434984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.391785] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.694170] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.852582] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452395.075739] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [453839.883317] exe[631930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.323036] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.350283] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.384432] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.416687] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.455576] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.488414] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.519004] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.554215] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.584418] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453926.991119] warn_bad_vsyscall: 89 callbacks suppressed [453926.991123] exe[603201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453927.250974] exe[603330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453928.195296] exe[703378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c44f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [454782.238075] exe[396221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.124977] exe[459049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.183247] exe[445693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db8fdd8e8 ax:ffffffffff600000 si:7f4db8fdde08 di:ffffffffff600000 [454783.450566] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.503948] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94338e8 ax:ffffffffff600000 si:7f4db9433e08 di:ffffffffff600000 [458511.597367] exe[507232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.806667] exe[521019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.991710] exe[501394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [459012.705765] exe[563613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.872407] exe[594293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.986079] exe[593070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459068.840155] exe[565482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.513267] exe[582378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.652731] exe[549515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [460974.883142] exe[869775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.093493] exe[497807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.226389] exe[846635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [461621.505252] exe[911237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461621.622374] exe[912332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846258e8 ax:ffffffffff600000 si:7fc384625e08 di:ffffffffff600000 [461621.768807] exe[960374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461801.274870] exe[17419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461801.513112] exe[2380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.102011] exe[527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.104043] exe[17522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc566f90 ax:7f4efc567020 si:ffffffffff600000 di:5631f5faa263 [461910.586774] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.699507] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.762959] exe[38204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.494148] exe[36375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.594008] exe[54110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.624504] exe[999751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.754307] exe[331082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464426.407828] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.661275] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.713248] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.910976] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464778.939051] exe[440307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.412182] exe[432089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.648195] exe[434189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebb7f90 ax:7fe36ebb8020 si:ffffffffff600000 di:55a65d02f263 [465117.767639] exe[396252] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465119.063660] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.142447] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.307108] exe[125097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.443573] exe[172292] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.539664] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.620290] exe[401105] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.845479] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.938287] exe[74895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465121.014719] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.820298] warn_bad_vsyscall: 22 callbacks suppressed [465122.820300] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.867136] exe[76377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.950259] exe[78164] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.992513] exe[181488] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.083877] exe[399798] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.102595] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.176201] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.249117] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.349779] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.398268] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465178.032934] warn_bad_vsyscall: 5 callbacks suppressed [465178.032937] exe[412069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.454081] exe[407255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.857302] exe[389487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790e8cf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465303.071148] exe[437548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.262589] exe[450736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.474127] exe[523237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465419.445545] exe[482493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.803707] exe[425776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.857203] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.080303] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.110220] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.147047] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.173532] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.214517] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.243743] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.271390] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [468653.293283] warn_bad_vsyscall: 58 callbacks suppressed [468653.293286] exe[834229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [468653.662372] exe[943734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f443ddf90 ax:7f8f443de020 si:ffffffffff600000 di:55ff4cb2e263 [468654.169956] exe[807744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [469521.763903] exe[187406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.865137] exe[188177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.948983] exe[188197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469795.157580] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.083194] exe[203667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.194673] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469897.990110] exe[96084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584809da378 cs:33 sp:7fcac8b08f90 ax:7fcac8b09020 si:ffffffffff600000 di:558480aa4263 [469934.689791] exe[103783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e4b6d378 cs:33 sp:7f6df914ef90 ax:7f6df914f020 si:ffffffffff600000 di:5616e4c37263 [469959.251151] exe[123458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c6c56c378 cs:33 sp:7fa214269f90 ax:7fa21426a020 si:ffffffffff600000 di:556c6c636263 [469964.324146] exe[766830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d84aca5378 cs:33 sp:7fdce428af90 ax:7fdce428b020 si:ffffffffff600000 di:55d84ad6f263 [469964.498312] exe[159485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643e0c63378 cs:33 sp:7fc80c55bf90 ax:7fc80c55c020 si:ffffffffff600000 di:5643e0d2d263 [470005.029795] exe[261324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8ce652378 cs:33 sp:7ee12c0c7f90 ax:7ee12c0c8020 si:ffffffffff600000 di:55a8ce71c263 [470063.582095] exe[223157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [470156.097825] exe[230225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5bf458378 cs:33 sp:7f7678cd8f90 ax:7f7678cd9020 si:ffffffffff600000 di:55e5bf522263 [470232.273906] exe[295772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e510ea378 cs:33 sp:7ef86efd5f90 ax:7ef86efd6020 si:ffffffffff600000 di:558e511b4263 [470274.610481] exe[149329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b59b89f378 cs:33 sp:7f98f2ca9f90 ax:7f98f2caa020 si:ffffffffff600000 di:55b59b969263 [470291.063893] exe[304135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.259202] exe[304157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.429296] exe[304186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7933dd8e8 ax:ffffffffff600000 si:7ea7933dde08 di:ffffffffff600000 [470342.657336] exe[187967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52a305378 cs:33 sp:7f821fffef90 ax:7f821ffff020 si:ffffffffff600000 di:55e52a3cf263 [470650.325703] exe[362231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d4aad378 cs:33 sp:7ea12a708f90 ax:7ea12a709020 si:ffffffffff600000 di:5575d4b77263 [470750.386241] exe[199507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56297e927378 cs:33 sp:7f736d7fcf90 ax:7f736d7fd020 si:ffffffffff600000 di:56297e9f1263 [470929.605855] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.864255] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.867536] exe[212707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b71f90 ax:7f1b01b72020 si:ffffffffff600000 di:5570f4e5a263 [470930.200697] exe[223353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [471390.014371] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.140633] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.304896] exe[224047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471643.332270] exe[312935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471643.806506] exe[313686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471644.042859] exe[311449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [473434.171293] exe[556303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.462856] exe[556897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.590169] exe[584003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c17a328506 cs:33 sp:7fac627fe8e8 ax:ffffffffff600000 si:7fac627fee08 di:ffffffffff600000 [473434.742395] exe[378120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788cf8e8 ax:ffffffffff600000 si:7f67788cfe08 di:ffffffffff600000 [475531.985713] exe[955127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475534.647773] exe[955520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e4cf88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475535.014743] exe[842220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [476428.183885] exe[254431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476428.429002] exe[266248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee88af90 ax:7fe8ee88b020 si:ffffffffff600000 di:561d26249263 [476428.674038] exe[254526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476836.073376] exe[967895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476836.725506] exe[230071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.234892] exe[327470] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.379177] exe[237748] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [477324.454399] exe[862632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.608197] exe[862872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.645374] exe[862862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455bcf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.826559] exe[181805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477552.522007] exe[443515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.700306] exe[443336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071370bf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.809114] exe[443232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [478002.753162] exe[423620] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.202873] exe[225170] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.679956] exe[324851] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [481141.030672] exe[911967] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.245128] exe[998512] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.914132] exe[998499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [482453.684749] exe[82438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482453.852372] exe[228268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482454.381147] exe[80367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482579.862151] exe[210610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.195219] exe[968597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.298293] exe[957948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.509187] exe[787994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482994.972200] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.185185] exe[343640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.334686] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.335306] exe[9408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d13f90 ax:7ff653d14020 si:ffffffffff600000 di:56470fcd2263 [483562.880290] exe[464727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483563.788436] exe[464848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40ca8e8 ax:ffffffffff600000 si:7ed0e40cae08 di:ffffffffff600000 [483563.790083] exe[464847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483564.662126] exe[464983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483607.993920] exe[373867] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.537312] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.960255] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483997.435548] exe[518836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.529943] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.718422] exe[531932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.788834] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [484247.493583] exe[416475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.701073] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.818993] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484624.077077] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.185140] exe[599425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.233037] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.464316] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484843.969145] exe[664838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.677141] exe[664666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.724668] exe[664655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.842072] exe[664814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.875441] exe[664882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.903394] exe[664876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.933390] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.963966] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.992510] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484845.021333] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [485357.629810] warn_bad_vsyscall: 26 callbacks suppressed [485357.629813] exe[752771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.762180] exe[752804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.828618] exe[752813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfd7e8e8 ax:ffffffffff600000 si:7edbdfd7ee08 di:ffffffffff600000 [485358.264730] exe[752858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [486138.984904] exe[909799] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486139.718931] exe[553769] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.260970] exe[120731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.486949] exe[911905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486385.904716] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.280569] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.607482] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.629603] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.653764] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.677480] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.708537] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.732590] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.785549] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.826387] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.653818] warn_bad_vsyscall: 57 callbacks suppressed [486561.653821] exe[796855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.836794] exe[951632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.867103] exe[951621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.208045] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.236295] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486672.542707] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486673.497112] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486674.626614] exe[530007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8c68e8 ax:ffffffffff600000 si:7f858d8c6e08 di:ffffffffff600000 [486874.081545] exe[560872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f391ff90 ax:7fd2f3920020 si:ffffffffff600000 di:560e13c20263 [486874.510186] exe[596877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f389bf90 ax:7fd2f389c020 si:ffffffffff600000 di:560e13c20263 [486875.104166] exe[613238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38bcf90 ax:7fd2f38bd020 si:ffffffffff600000 di:560e13c20263 [486875.113300] exe[627247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38fef90 ax:7fd2f38ff020 si:ffffffffff600000 di:560e13c20263 [487047.654469] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.773269] exe[22432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.798937] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [487047.885522] exe[960732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [489064.946551] exe[794530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.240439] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [489065.594933] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.652354] exe[327189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [492227.876759] exe[810857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.095459] exe[809201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.282632] exe[820192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492236.097033] exe[818993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.950535] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.979619] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.010014] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.039759] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.068208] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.100012] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.131041] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.162624] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.192724] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [493355.860552] warn_bad_vsyscall: 25 callbacks suppressed [493355.860555] exe[16428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556418eb2506 cs:33 sp:7eaf25e2a8e8 ax:ffffffffff600000 si:7eaf25e2ae08 di:ffffffffff600000 [493385.866795] exe[13602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.099883] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.145033] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2c2f90 ax:7fde5a2c3020 si:ffffffffff600000 di:5607d0805263 [493386.531715] exe[958211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [499403.618694] exe[577154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.213309] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.598524] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.642197] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.676405] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.711719] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.755062] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.794288] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.829192] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.859253] exe[577068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499574.807222] warn_bad_vsyscall: 25 callbacks suppressed [499574.807225] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.542140] exe[81138] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.695813] exe[931612] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499576.241749] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499682.792330] exe[885453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499683.358090] exe[885346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499684.030110] exe[891018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [502018.711967] exe[251699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502018.944862] exe[248613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502019.210854] exe[239250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502857.890467] exe[380446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [502858.937796] exe[380602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a218e8 ax:ffffffffff600000 si:7ea240a21e08 di:ffffffffff600000 [502859.765766] exe[380699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [503806.324621] exe[511481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503806.627890] exe[511145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503807.050146] exe[391986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [507676.373579] exe[690142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.548866] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.730773] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507763.555050] exe[107808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.242476] exe[157535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594719] exe[116576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594763] exe[68833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7ee5f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507834.294723] exe[113402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.591252] exe[70450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.786964] exe[113372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [508002.202321] exe[111898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508002.639586] exe[14547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508003.200103] exe[71611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5ddf90 ax:7fce6c5de020 si:ffffffffff600000 di:556caa0e6263 [508229.235140] exe[181353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.521159] exe[234914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.561667] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.570204] exe[239233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.610169] exe[157326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.624384] exe[239234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.638426] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.653657] exe[145835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.660643] exe[89644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.667222] exe[86216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [509817.688040] warn_bad_vsyscall: 25 callbacks suppressed [509817.688044] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.028139] exe[473790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.408974] exe[477601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.520065] exe[477712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5bcf90 ax:7fce6c5bd020 si:ffffffffff600000 di:556caa0e6263 [509929.138239] exe[247549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509929.820995] exe[306749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509930.508972] exe[78331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [510227.095681] exe[520551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510227.555215] exe[112835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510228.013949] exe[112909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.150431] exe[64604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.481296] exe[519181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.819665] exe[12094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510890.003890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [510890.290614] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.320039] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.344966] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.378890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.408705] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.434485] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.456131] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.497522] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.527738] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511128.415067] warn_bad_vsyscall: 26 callbacks suppressed [511128.415071] exe[431091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511128.619822] exe[557068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511129.014515] exe[546219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511130.514600] exe[384929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511130.785346] exe[408329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.153389] exe[545786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.325754] exe[477249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511815.561794] exe[716451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511815.816348] exe[727406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511815.818156] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511816.284611] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511817.183958] exe[365286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.344225] exe[365154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.658146] exe[365183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511896.404978] exe[780755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.469127] exe[759203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.628082] exe[758251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5bc8e8 ax:ffffffffff600000 si:7f7b8e5bce08 di:ffffffffff600000 [511898.485985] exe[754156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511898.487710] exe[761872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5dd8e8 ax:ffffffffff600000 si:7f7b8e5dde08 di:ffffffffff600000 [513091.472849] exe[954885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.621861] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.800603] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.830744] exe[999670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513118.279835] exe[739299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513121.253454] exe[824157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513124.363273] exe[792443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513130.358952] exe[8820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513130.924248] exe[8926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513131.311077] exe[8989] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513347.499721] exe[844338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513347.745548] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513348.026638] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [514382.611721] exe[160258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514382.956334] exe[159801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514383.250979] exe[155805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [516619.624744] exe[600647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.810220] exe[600678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.997097] exe[600706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [518635.151335] exe[785129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831ee8e8 ax:ffffffffff600000 si:7efd831eee08 di:ffffffffff600000 [518635.398875] exe[881597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [518635.762522] exe[686801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [519061.609108] exe[993392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549e68e8 ax:ffffffffff600000 si:7fb4549e6e08 di:ffffffffff600000 [519062.146104] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.176245] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.204643] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.237218] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.278344] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.326524] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.362003] exe[993488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.398938] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.434310] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519321.224856] warn_bad_vsyscall: 35 callbacks suppressed [519321.224859] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.071890] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.349270] exe[831034] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519323.101910] exe[828564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519418.938113] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.124785] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.422323] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb713fe8e8 ax:ffffffffff600000 si:7fbb713fee08 di:ffffffffff600000 [519423.313138] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519423.759529] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.048624] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.169793] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.460945] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.621292] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.728570] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.918809] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.249385] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.475756] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.658520] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.782660] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519554.112540] warn_bad_vsyscall: 2 callbacks suppressed [519554.112543] exe[874461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdd792a506 cs:33 sp:7fa6b13878e8 ax:ffffffffff600000 si:7fa6b1387e08 di:ffffffffff600000 [519557.501878] exe[873844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8089b6506 cs:33 sp:7fc10e5da8e8 ax:ffffffffff600000 si:7fc10e5dae08 di:ffffffffff600000 [519577.659059] exe[82765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562820fde506 cs:33 sp:7eedab7498e8 ax:ffffffffff600000 si:7eedab749e08 di:ffffffffff600000 [519584.738552] exe[58078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ec998506 cs:33 sp:7f7efb3758e8 ax:ffffffffff600000 si:7f7efb375e08 di:ffffffffff600000 [519609.379371] exe[87803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e22475506 cs:33 sp:7ecf647c48e8 ax:ffffffffff600000 si:7ecf647c4e08 di:ffffffffff600000 [519628.989576] exe[48441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564466748506 cs:33 sp:7f97b97ab8e8 ax:ffffffffff600000 si:7f97b97abe08 di:ffffffffff600000 [519697.399147] exe[895286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603c8fa3506 cs:33 sp:7f4b665dd8e8 ax:ffffffffff600000 si:7f4b665dde08 di:ffffffffff600000 [519707.756372] exe[104920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c88c8b506 cs:33 sp:7ed8729d38e8 ax:ffffffffff600000 si:7ed8729d3e08 di:ffffffffff600000 [519736.385951] exe[860627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb11993506 cs:33 sp:7fddf2dfe8e8 ax:ffffffffff600000 si:7fddf2dfee08 di:ffffffffff600000 [519753.822489] exe[767301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d23e394506 cs:33 sp:7f9173acb8e8 ax:ffffffffff600000 si:7f9173acbe08 di:ffffffffff600000 [519757.057066] exe[845317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4ddde1506 cs:33 sp:7fd109fa48e8 ax:ffffffffff600000 si:7fd109fa4e08 di:ffffffffff600000 [519876.439182] exe[897410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831b9be506 cs:33 sp:7fbda526b8e8 ax:ffffffffff600000 si:7fbda526be08 di:ffffffffff600000 [520444.488006] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.299834] exe[761888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.385694] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720238e8 ax:ffffffffff600000 si:7fbb72023e08 di:ffffffffff600000 [520445.886983] exe[761828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520523.027897] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520931.370358] exe[870454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.923159] exe[174239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.971734] exe[25569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520932.363924] exe[165825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [521530.430303] exe[914217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521530.809464] exe[79751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.087883] exe[914209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.090430] exe[941552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1a18e8 ax:ffffffffff600000 si:7f6c6b1a1e08 di:ffffffffff600000 [521621.624046] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521621.887665] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.143566] exe[971836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.601686] exe[914183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [522165.620567] exe[375382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522166.674687] exe[755888] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522167.315216] exe[665740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [523335.356992] exe[851722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8da4e2378 cs:33 sp:7f19bb7b1f90 ax:7f19bb7b2020 si:ffffffffff600000 di:55d8da5ac263 [523696.719807] exe[790620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.141183] exe[864062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.288853] exe[867590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.294448] exe[760978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.493039] exe[949043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.683429] exe[757522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.858882] exe[866385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.980507] exe[762875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523698.082404] exe[757793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523698.157597] exe[866398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523813.200318] warn_bad_vsyscall: 3 callbacks suppressed [523813.200322] exe[4485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.402664] exe[4544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.562744] exe[4588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.794163] exe[4651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [524483.221410] exe[974370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524483.986373] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524484.576826] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524485.259417] exe[664199] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.000132] exe[655157] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.694731] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524487.323887] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524521.795839] exe[32549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524521.937888] exe[32485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.111490] exe[901157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.967578] exe[887460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [525522.940667] exe[416708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55857eee5378 cs:33 sp:7f8a4335cf90 ax:7f8a4335d020 si:ffffffffff600000 di:55857efaf263 [525651.344079] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525651.878001] exe[408128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.407038] exe[256257] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.906015] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525653.457756] exe[353684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.025172] exe[331213] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.424978] exe[330764] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525868.775236] exe[487327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.002201] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.160146] exe[516330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.264758] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [526229.543336] exe[615841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ba44e1506 cs:33 sp:7ee56b3998e8 ax:ffffffffff600000 si:7ee56b399e08 di:ffffffffff600000 [526560.550369] exe[580360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526560.858054] exe[564651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.074815] exe[632591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.569258] exe[603555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [527280.050423] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527280.903115] exe[626020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527281.858410] exe[677920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527282.403610] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.018577] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.729696] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527498.347855] exe[852623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527499.201975] exe[856729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527811.303068] exe[918035] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527811.886300] exe[908844] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.297325] exe[909223] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.974063] exe[923647] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [528496.349157] exe[499553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.541715] exe[487183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.932757] exe[921708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528497.209485] exe[487338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528723.736962] exe[916903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b10db32378 cs:33 sp:7fbae4b7df90 ax:7fbae4b7e020 si:ffffffffff600000 di:55b10dbfc263 [528727.208941] exe[159029] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528727.820079] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528728.532737] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528729.016551] exe[118382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528847.976578] exe[79475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8dd94f378 cs:33 sp:7f732c6a1f90 ax:7f732c6a2020 si:ffffffffff600000 di:55f8dda19263 [528979.712673] exe[253031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c1c9f378 cs:33 sp:7ede2a591f90 ax:7ede2a592020 si:ffffffffff600000 di:55d9c1d69263 [528995.176615] exe[38160] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528999.994333] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bac2378 cs:33 sp:7f68819e9f90 ax:7f68819ea020 si:ffffffffff600000 di:55794bb8c263 [529018.426746] exe[776579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529022.319491] exe[261595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164526a378 cs:33 sp:7eb1d8a6cf90 ax:7eb1d8a6d020 si:ffffffffff600000 di:561645334263 [529166.570761] exe[118922] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529202.234713] exe[89793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [529238.278836] exe[491819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eee85dd378 cs:33 sp:7f81ae34ff90 ax:7f81ae350020 si:ffffffffff600000 di:55eee86a7263 [529265.608604] exe[307877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561860943378 cs:33 sp:7eb3377bff90 ax:7eb3377c0020 si:ffffffffff600000 di:561860a0d263 [529278.926814] exe[751165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529356.590619] exe[284045] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [529373.548289] exe[234183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.738418] exe[250555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.994514] exe[155598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529374.220402] exe[155464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529445.975759] exe[905639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e81837c506 cs:33 sp:7fc0e81728e8 ax:ffffffffff600000 si:7fc0e8172e08 di:ffffffffff600000 [529483.167680] exe[302150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cb9c26506 cs:33 sp:7fd09f9fe8e8 ax:ffffffffff600000 si:7fd09f9fee08 di:ffffffffff600000 [529537.770697] exe[158011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529563.427709] exe[201461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c94190378 cs:33 sp:7fa0b7a4ef90 ax:7fa0b7a4f020 si:ffffffffff600000 di:559c9425a263 [529616.622213] exe[377995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529618.355844] exe[378376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a5fdf506 cs:33 sp:7ec9ac0258e8 ax:ffffffffff600000 si:7ec9ac025e08 di:ffffffffff600000 [529702.778780] exe[247417] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [529702.901762] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bb11506 cs:33 sp:7f68819e98e8 ax:ffffffffff600000 si:7f68819e9e08 di:ffffffffff600000 [529776.598550] exe[406410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529776.811194] exe[406435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.092424] exe[406483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.296612] exe[406522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529777.504664] exe[406561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529792.584176] exe[409476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529792.809749] exe[409520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529843.923692] exe[977610] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [529967.575924] exe[439863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754c343506 cs:33 sp:7ec9cae4d8e8 ax:ffffffffff600000 si:7ec9cae4de08 di:ffffffffff600000 [530976.665860] exe[317657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.862405] exe[318139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.900219] exe[318033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a65dd8e8 ax:ffffffffff600000 si:7f42a65dde08 di:ffffffffff600000 [530977.163011] exe[317516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [531139.627279] exe[193418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613d41b5506 cs:33 sp:7f367482d8e8 ax:ffffffffff600000 si:7f367482de08 di:ffffffffff600000 [531183.971276] exe[611426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b4b2d1506 cs:33 sp:7f3dd54d58e8 ax:ffffffffff600000 si:7f3dd54d5e08 di:ffffffffff600000 [531788.700028] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c0c7c2506 cs:33 sp:7fb5ad28c8e8 ax:ffffffffff600000 si:7fb5ad28ce08 di:ffffffffff600000 [531916.930531] exe[832720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571c50a8378 cs:33 sp:7eb248902f90 ax:7eb248903020 si:ffffffffff600000 di:5571c5172263 [532080.424887] exe[868851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c67d66e506 cs:33 sp:7f53642478e8 ax:ffffffffff600000 si:7f5364247e08 di:ffffffffff600000 [532289.379359] exe[381920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560457a39506 cs:33 sp:7fdb4e12c8e8 ax:ffffffffff600000 si:7fdb4e12ce08 di:ffffffffff600000 [532560.574949] exe[656970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bca6b58506 cs:33 sp:7f265394e8e8 ax:ffffffffff600000 si:7f265394ee08 di:ffffffffff600000 [532769.375655] exe[812068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e6712c506 cs:33 sp:7f0a438af8e8 ax:ffffffffff600000 si:7f0a438afe08 di:ffffffffff600000 [533088.043283] exe[824650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e670dd378 cs:33 sp:7f0a438aff90 ax:7f0a438b0020 si:ffffffffff600000 di:558e671a7263 [533337.460065] exe[150292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558721cbd506 cs:33 sp:7fb56c8428e8 ax:ffffffffff600000 si:7fb56c842e08 di:ffffffffff600000 [534281.690946] exe[992018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4edd68506 cs:33 sp:7f108a9fe8e8 ax:ffffffffff600000 si:7f108a9fee08 di:ffffffffff600000 [534375.607574] exe[143055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3f3bfd506 cs:33 sp:7fc23d0d28e8 ax:ffffffffff600000 si:7fc23d0d2e08 di:ffffffffff600000 [535936.955346] exe[161642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535937.540263] exe[146021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535938.057834] exe[191075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [536640.044057] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536640.478184] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536641.102847] exe[169864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536760.233015] exe[798427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.494718] exe[777386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.619426] exe[777178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [538376.728414] exe[762704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538377.480726] exe[815485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538378.006487] exe[756985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [542619.586953] exe[289803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.036619] exe[515700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.149058] exe[245662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757858e8 ax:ffffffffff600000 si:7f1775785e08 di:ffffffffff600000 [542620.639115] exe[242836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.698491] exe[480473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [545014.389683] exe[231699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.613362] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.674664] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545015.075123] exe[231809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [547130.486912] exe[563254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [547131.110726] exe[563388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29661dd8e8 ax:ffffffffff600000 si:7f29661dde08 di:ffffffffff600000 [547131.511512] exe[571393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [549634.232954] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d549f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.487935] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.634501] exe[979228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549637.495512] exe[971873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.796926] exe[774750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.834134] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.868969] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.900776] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.933044] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.963012] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.239346] warn_bad_vsyscall: 110 callbacks suppressed [549639.239350] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.274044] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.302757] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.332294] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.361405] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.398767] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.429168] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.462120] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [553443.422081] exe[428712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebfe8e8 ax:ffffffffff600000 si:7f944ebfee08 di:ffffffffff600000 [553443.696890] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.725457] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.768620] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.801135] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.846453] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.875838] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.909234] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.937997] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.967254] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [554063.082514] warn_bad_vsyscall: 25 callbacks suppressed [554063.082518] exe[933259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [554063.832690] exe[934247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e915f90 ax:7f609e916020 si:ffffffffff600000 di:55fe1eba8263 [554064.792029] exe[953802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [555963.709679] exe[145884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555963.921954] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.211241] exe[124886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.240005] exe[124578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.272625] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.312913] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.346670] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.382518] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.420817] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.454434] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [556474.533301] warn_bad_vsyscall: 25 callbacks suppressed [556474.533304] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.111363] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.201462] exe[430822] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.234523] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.297770] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.300962] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.317176] exe[431225] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.382899] exe[432571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.403086] exe[408776] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.445979] exe[333239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556479.591895] warn_bad_vsyscall: 55 callbacks suppressed [556479.591898] exe[432784] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.700484] exe[432591] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.783839] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [560888.788106] exe[203416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560888.962471] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.089080] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8388e8 ax:ffffffffff600000 si:7fc8dc838e08 di:ffffffffff600000 [560889.195751] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.282307] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.399058] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.519987] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [561529.897718] exe[277782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.482132] exe[277761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.637683] exe[277834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34e23506 cs:33 sp:7f7c6bbbb8e8 ax:ffffffffff600000 si:7f7c6bbbbe08 di:ffffffffff600000 [561530.809671] exe[299983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.815400] exe[277788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f82989fe8e8 ax:ffffffffff600000 si:7f82989fee08 di:ffffffffff600000 [561796.091845] exe[419501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afbbaaf506 cs:33 sp:7fe86c4298e8 ax:ffffffffff600000 si:7fe86c429e08 di:ffffffffff600000 [561825.289170] exe[453764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b48e8 ax:ffffffffff600000 si:7ee4439b4e08 di:ffffffffff600000 [561848.913208] exe[456224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563722589506 cs:33 sp:7f84c0dfe8e8 ax:ffffffffff600000 si:7f84c0dfee08 di:ffffffffff600000 [561851.319932] exe[460050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2debf0506 cs:33 sp:7ecc3c4a28e8 ax:ffffffffff600000 si:7ecc3c4a2e08 di:ffffffffff600000 [561915.585583] exe[323976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed99aff506 cs:33 sp:7ff37c9128e8 ax:ffffffffff600000 si:7ff37c912e08 di:ffffffffff600000 [561934.020955] exe[998115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570c326c506 cs:33 sp:7f668577e8e8 ax:ffffffffff600000 si:7f668577ee08 di:ffffffffff600000 [561953.664675] exe[277469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d35272506 cs:33 sp:7fbd0361f8e8 ax:ffffffffff600000 si:7fbd0361fe08 di:ffffffffff600000 [561970.437671] exe[72377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609b785e506 cs:33 sp:7fd994ee68e8 ax:ffffffffff600000 si:7fd994ee6e08 di:ffffffffff600000 [561984.281690] exe[402761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92f8e8 ax:ffffffffff600000 si:7ff70f92fe08 di:ffffffffff600000 [562036.627996] exe[626449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adf06ee506 cs:33 sp:7ff46a6ec8e8 ax:ffffffffff600000 si:7ff46a6ece08 di:ffffffffff600000 [562074.540203] exe[502407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b65b5506 cs:33 sp:7ece633828e8 ax:ffffffffff600000 si:7ece63382e08 di:ffffffffff600000 [562142.632482] exe[721438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9f8e8 ax:ffffffffff600000 si:7f3dacf9fe08 di:ffffffffff600000 [562235.437493] exe[324682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566ed525506 cs:33 sp:7fbbb99638e8 ax:ffffffffff600000 si:7fbbb9963e08 di:ffffffffff600000 [562315.329177] exe[877481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562516a0d506 cs:33 sp:7ff5537fe8e8 ax:ffffffffff600000 si:7ff5537fee08 di:ffffffffff600000 [562462.006699] exe[581598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [563030.556735] exe[700063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f785927506 cs:33 sp:7ec178c4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563096.192370] exe[713476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563117.680312] exe[454920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f730238506 cs:33 sp:7f6337f2ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563122.022382] exe[253410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c02072506 cs:33 sp:7fcd721b0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563202.504539] exe[734200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d93cbdb506 cs:33 sp:7eab72264f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563204.463571] exe[487674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea2aeaa506 cs:33 sp:7fc8d638ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563239.456469] exe[492582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea24a80506 cs:33 sp:7f29a8d8df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563252.548611] exe[669399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4c9e23506 cs:33 sp:7f07002baf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563347.858065] exe[760979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.115273] exe[761015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.382821] exe[761092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad9a8e8 ax:ffffffffff600000 si:7eef6ad9ae08 di:ffffffffff600000 [563348.427443] exe[761096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad798e8 ax:ffffffffff600000 si:7eef6ad79e08 di:ffffffffff600000 [563493.763407] exe[766587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563548.086856] exe[175391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563651.327994] exe[717543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563692.245805] exe[827783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a5063f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563928.667976] exe[527702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564155.743607] exe[912188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559305ee3506 cs:33 sp:7fe0fbbd4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564277.399393] exe[587753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fc0f2f506 cs:33 sp:7fa7dd3e5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564955.931500] exe[74429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565179.552296] exe[965371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565179.949700] exe[965291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565180.006039] exe[965078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d264d8e8 ax:ffffffffff600000 si:7f88d264de08 di:ffffffffff600000 [565180.519879] exe[965387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565202.957241] exe[125909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.576486] exe[126012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.793934] exe[126057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565213.065073] exe[128012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.187748] exe[128043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.299416] exe[128071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.502333] exe[128110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.716211] exe[128157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.925402] exe[128200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.182363] exe[128260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.372446] exe[128303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.647764] exe[128351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.868536] exe[128409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565545.641659] warn_bad_vsyscall: 2 callbacks suppressed [565545.641663] exe[200543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565545.802115] exe[200578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6a28e8 ax:ffffffffff600000 si:7ebf7e6a2e08 di:ffffffffff600000 [565545.905153] exe[200600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565650.588834] exe[806087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e20113506 cs:33 sp:7fb1aa6338e8 ax:ffffffffff600000 si:7fb1aa633e08 di:ffffffffff600000 [565651.548056] exe[223937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9c85d506 cs:33 sp:7ec10f7168e8 ax:ffffffffff600000 si:7ec10f716e08 di:ffffffffff600000 [565656.275280] exe[995258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591200b2506 cs:33 sp:7f49e0a758e8 ax:ffffffffff600000 si:7f49e0a75e08 di:ffffffffff600000 [565670.641593] exe[533377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552a8e8 ax:ffffffffff600000 si:7f447552ae08 di:ffffffffff600000 [565680.670608] exe[942017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562591aa9506 cs:33 sp:7fa81c7ca8e8 ax:ffffffffff600000 si:7fa81c7cae08 di:ffffffffff600000 [565711.713982] exe[39450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563922df506 cs:33 sp:7fc2d96308e8 ax:ffffffffff600000 si:7fc2d9630e08 di:ffffffffff600000 [565723.393446] exe[240669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.597603] exe[240730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.776304] exe[240786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565745.549125] exe[60180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [565748.127760] exe[247187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565775.217923] exe[139169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4700d5506 cs:33 sp:7fd44aa6e8e8 ax:ffffffffff600000 si:7fd44aa6ee08 di:ffffffffff600000 [565803.983493] exe[994231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310ce8e8 ax:ffffffffff600000 si:7f17310cee08 di:ffffffffff600000 [566237.558606] exe[360450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566237.968366] exe[159828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566557.535450] exe[879305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2adf4c506 cs:33 sp:7faf92ffe8e8 ax:ffffffffff600000 si:7faf92ffee08 di:ffffffffff600000 [566769.910937] exe[478419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae429f2506 cs:33 sp:7f5f9663f8e8 ax:ffffffffff600000 si:7f5f9663fe08 di:ffffffffff600000 [566819.445334] exe[492130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.268664] exe[492322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.440519] exe[492362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566883.919166] exe[507389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.316650] exe[507479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.471352] exe[507514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.833022] exe[507580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.256115] exe[507673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.779782] exe[507790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.201802] exe[507872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.352208] exe[507905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.682504] exe[507972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.849451] exe[508013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566888.942392] warn_bad_vsyscall: 11 callbacks suppressed [566888.942396] exe[508464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.097463] exe[508496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.528937] exe[508593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [568363.529692] exe[477342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310cef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [568672.310952] exe[927969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74cced506 cs:33 sp:7eebde1008e8 ax:ffffffffff600000 si:7eebde100e08 di:ffffffffff600000 [569398.096274] exe[984635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.238796] exe[905386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.455647] exe[985520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.712720] exe[984806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569910.066428] exe[224762] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569910.632343] exe[201328] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.250800] exe[199792] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.813485] exe[203019] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [570047.752780] exe[271961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570047.901856] exe[271997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.416861] exe[272111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.579425] exe[272145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [571783.707896] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.194869] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.641959] exe[278135] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571785.127448] exe[291277] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571905.665462] exe[477150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571905.949738] exe[469117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.290789] exe[700975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.593518] exe[711712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [573249.078735] exe[41126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dde6d4b506 cs:33 sp:7eb16a15d8e8 ax:ffffffffff600000 si:7eb16a15de08 di:ffffffffff600000 [573584.788940] exe[86626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.067935] exe[35877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.275066] exe[87760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.517506] exe[34805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [574483.489974] exe[310091] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.192395] exe[309168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.969613] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574485.635417] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574486.534118] exe[308408] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574487.260864] exe[311273] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574488.003113] exe[311465] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574663.849412] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.302394] exe[308000] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.711948] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574665.348510] exe[308600] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [575187.899280] exe[224246] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [575247.024855] exe[277414] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575553.467527] exe[197272] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575591.877045] exe[569013] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.457247] exe[803275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.968759] exe[801325] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575593.529917] exe[801474] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575675.154505] exe[361785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ada37ce506 cs:33 sp:7f7d8d8cf8e8 ax:ffffffffff600000 si:7f7d8d8cfe08 di:ffffffffff600000 [575736.449633] exe[551110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575736.884421] exe[550372] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575737.480809] exe[550716] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575738.124617] exe[598048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575989.495086] exe[216100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8d8752506 cs:33 sp:7f5b7f7568e8 ax:ffffffffff600000 si:7f5b7f756e08 di:ffffffffff600000 [576914.270717] exe[826145] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [576948.990859] exe[768466] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [576995.198628] exe[883126] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [577128.537897] exe[727305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e0ca7506 cs:33 sp:7f6d414e08e8 ax:ffffffffff600000 si:7f6d414e0e08 di:ffffffffff600000 [577561.479383] host.test[23526] bad frame in rt_sigreturn frame:00000000fcda1e47 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [577626.084294] exe[10945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.259175] exe[10910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.420687] exe[920683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.582843] exe[920600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [578199.863372] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.033994] exe[182981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.212239] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.346583] exe[95879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578487.159477] exe[262460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.312160] exe[262504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.487644] exe[262547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.638700] exe[262585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578951.720832] exe[98210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578951.956263] exe[193426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.347284] exe[194912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.608336] exe[98338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [579002.461601] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.052898] exe[379369] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.562211] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.068875] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.531662] exe[379608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.024654] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.507296] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579229.309326] exe[408109] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579229.831515] exe[109736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.323074] exe[111129] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.954406] exe[110567] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579510.928986] exe[345960] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579511.512040] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.083522] exe[498579] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.722480] exe[402636] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [580028.459609] exe[478967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580028.816291] exe[98709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.209866] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.380000] exe[100662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.685339] exe[479436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.767071] exe[291282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.794074] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [580029.813783] exe[291299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ed4554506 cs:33 sp:7fc6e68408e8 ax:ffffffffff600000 si:7fc6e6840e08 di:ffffffffff600000 [580030.084346] exe[98586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580030.185927] exe[249969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [581295.046970] warn_bad_vsyscall: 3 callbacks suppressed [581295.046973] exe[888832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635b1ae3506 cs:33 sp:7edc9bb648e8 ax:ffffffffff600000 si:7edc9bb64e08 di:ffffffffff600000 [581328.251546] exe[886592] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581328.858427] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581329.433744] exe[887148] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581330.199701] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581857.779362] exe[863870] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.246016] exe[858353] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.759851] exe[835298] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581859.186794] exe[859828] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [582230.216780] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.089910] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.714519] exe[17787] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582232.248110] exe[49529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582898.138584] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.635783] exe[228931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.919425] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582899.276316] exe[224387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [583078.653375] exe[11366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583078.827101] exe[254379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.016815] exe[254089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.687464] exe[946356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583227.716314] exe[936152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b95c4506 cs:33 sp:7f55b73118e8 ax:ffffffffff600000 si:7f55b7311e08 di:ffffffffff600000 [583426.305485] exe[67248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a68979b506 cs:33 sp:7f5072ffe8e8 ax:ffffffffff600000 si:7f5072ffee08 di:ffffffffff600000 [583454.290849] exe[255687] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [583480.181023] exe[336017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fecf90 ax:7ee428fed020 si:ffffffffff600000 di:562d9c4e7263 [583480.371169] exe[336055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fcbf90 ax:7ee428fcc020 si:ffffffffff600000 di:562d9c4e7263 [583483.043351] exe[336522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3ee64c378 cs:33 sp:7ea63ebfef90 ax:7ea63ebff020 si:ffffffffff600000 di:55c3ee716263 [583495.372738] exe[128161] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [583846.554415] exe[269507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [584222.358320] exe[397232] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [584456.247788] exe[396406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.449545] exe[984697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.623509] exe[305262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584466.027704] exe[136724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.150193] exe[982596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.299049] exe[56597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584775.716537] exe[481827] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [584808.112724] exe[458048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [585222.860500] exe[530169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb55b98506 cs:33 sp:7f21b07fd8e8 ax:ffffffffff600000 si:7f21b07fde08 di:ffffffffff600000 [585315.054088] exe[581751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e16a6c506 cs:33 sp:7ff99f62c8e8 ax:ffffffffff600000 si:7ff99f62ce08 di:ffffffffff600000 [585435.397665] exe[536719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1ca895506 cs:33 sp:7fee055e28e8 ax:ffffffffff600000 si:7fee055e2e08 di:ffffffffff600000 [585901.839725] exe[638902] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.237435] exe[635935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.491774] exe[588918] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [590546.939808] exe[245497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721fe8e8 ax:ffffffffff600000 si:7f81721fee08 di:ffffffffff600000 [590547.254216] exe[258086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721fe8e8 ax:ffffffffff600000 si:7f81721fee08 di:ffffffffff600000 [590547.256133] exe[250014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721dd8e8 ax:ffffffffff600000 si:7f81721dde08 di:ffffffffff600000 [590547.591247] exe[245497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721bc8e8 ax:ffffffffff600000 si:7f81721bce08 di:ffffffffff600000 [591142.599187] exe[147787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [591142.825767] exe[139199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [591143.075618] exe[276699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [593446.770740] exe[617183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48758e8 ax:ffffffffff600000 si:7f7ca4875e08 di:ffffffffff600000 [593447.369414] exe[675116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48338e8 ax:ffffffffff600000 si:7f7ca4833e08 di:ffffffffff600000 [593447.635030] exe[675116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48758e8 ax:ffffffffff600000 si:7f7ca4875e08 di:ffffffffff600000 [594512.304700] exe[658457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594512.651561] exe[668464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594512.846434] exe[668514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.253871] exe[680152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.547689] exe[684324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.779373] exe[671406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c516e8e8 ax:ffffffffff600000 si:7f77c516ee08 di:ffffffffff600000 [595341.418404] exe[717986] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595342.408931] exe[717986] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595342.969067] exe[287168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595372.282577] exe[929253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563574805506 cs:33 sp:7fd40cc678e8 ax:ffffffffff600000 si:7fd40cc67e08 di:ffffffffff600000 [595377.900541] exe[655012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a118d506 cs:33 sp:7f97febb68e8 ax:ffffffffff600000 si:7f97febb6e08 di:ffffffffff600000 [595487.573097] exe[655269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cefb011506 cs:33 sp:7ff8771cb8e8 ax:ffffffffff600000 si:7ff8771cbe08 di:ffffffffff600000 [595493.593395] exe[866474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5655530b0506 cs:33 sp:7fe9ee7fe8e8 ax:ffffffffff600000 si:7fe9ee7fee08 di:ffffffffff600000 [595499.152451] exe[55212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56227c2ba506 cs:33 sp:7eabd92e18e8 ax:ffffffffff600000 si:7eabd92e1e08 di:ffffffffff600000 [595524.633559] exe[645469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e036f87506 cs:33 sp:7efe87b838e8 ax:ffffffffff600000 si:7efe87b83e08 di:ffffffffff600000 [595559.212453] exe[64457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cdf8df506 cs:33 sp:7ec684d2c8e8 ax:ffffffffff600000 si:7ec684d2ce08 di:ffffffffff600000 [595588.794732] exe[39615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556293de7506 cs:33 sp:7fa5e12bb8e8 ax:ffffffffff600000 si:7fa5e12bbe08 di:ffffffffff600000 [595659.159318] exe[38813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eeefe0506 cs:33 sp:7ff4539208e8 ax:ffffffffff600000 si:7ff453920e08 di:ffffffffff600000 [595731.581750] exe[713936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9f1b2506 cs:33 sp:7ff5e50c48e8 ax:ffffffffff600000 si:7ff5e50c4e08 di:ffffffffff600000 [595872.956462] exe[900445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e229ca506 cs:33 sp:7f9c692d88e8 ax:ffffffffff600000 si:7f9c692d8e08 di:ffffffffff600000 [596001.876509] exe[129425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811a778506 cs:33 sp:7eb2e2c378e8 ax:ffffffffff600000 si:7eb2e2c37e08 di:ffffffffff600000 [596433.490303] exe[166229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c3c08e8 ax:ffffffffff600000 si:7f9b1c3c0e08 di:ffffffffff600000 [596433.795755] exe[171204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c3c08e8 ax:ffffffffff600000 si:7f9b1c3c0e08 di:ffffffffff600000 [596434.010722] exe[167108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c37e8e8 ax:ffffffffff600000 si:7f9b1c37ee08 di:ffffffffff600000 [596640.078550] exe[154906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.353806] exe[870376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.803977] exe[836494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.882441] exe[836805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596687.915753] exe[225126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6403b506 cs:33 sp:7f9e55aa68e8 ax:ffffffffff600000 si:7f9e55aa6e08 di:ffffffffff600000 [598916.065958] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598916.208956] exe[543503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63641f90 ax:7f9e63642020 si:ffffffffff600000 di:555e12a99263 [598916.410141] exe[543372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63620f90 ax:7f9e63621020 si:ffffffffff600000 di:555e12a99263 [598919.549652] exe[543370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598919.873944] exe[543372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.081198] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.356020] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.715376] exe[391575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.855682] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.075808] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.317408] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.682702] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.924719] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.017581] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.238046] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.402443] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.599624] exe[497342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.764652] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.924085] exe[543370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [599389.601073] warn_bad_vsyscall: 16 callbacks suppressed [599389.601076] exe[360810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210758e8 ax:ffffffffff600000 si:7fd721075e08 di:ffffffffff600000 [599390.219611] exe[360810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210338e8 ax:ffffffffff600000 si:7fd721033e08 di:ffffffffff600000 [599390.557659] exe[505669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210758e8 ax:ffffffffff600000 si:7fd721075e08 di:ffffffffff600000 [599825.530357] exe[563331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [599825.809696] exe[557155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [599826.407055] exe[636684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [600816.429712] exe[840378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600816.604589] exe[840423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600816.754993] exe[840483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600897.114747] exe[844082] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.539004] exe[839723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.643342] exe[834898] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.899899] exe[845377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [601657.686976] exe[789516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.841259] exe[788765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.876014] exe[788765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.910648] exe[926778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.939051] exe[926778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.969764] exe[800114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.999165] exe[800114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.027831] exe[804277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.069096] exe[837718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.099513] exe[837718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [602540.523437] warn_bad_vsyscall: 25 callbacks suppressed [602540.523440] exe[903262] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602541.340153] exe[902908] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602541.963293] exe[26266] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602542.256552] exe[883346] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [603003.641393] exe[1998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e93078e8 ax:ffffffffff600000 si:7f59e9307e08 di:ffffffffff600000 [603003.939371] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603003.963002] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603003.986561] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.018570] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.043318] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.075402] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.096570] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.127746] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.151002] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603597.338758] warn_bad_vsyscall: 57 callbacks suppressed [603597.338761] exe[213229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603597.492304] exe[213254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603597.579116] exe[213268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47418e8 ax:ffffffffff600000 si:7ea5d4741e08 di:ffffffffff600000 [603597.768919] exe[213278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603608.789111] exe[214752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603608.941876] exe[214757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.099752] exe[214766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.229112] exe[214778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.360794] exe[214794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.568677] exe[214816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.682548] exe[214836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.776530] exe[214855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.955351] exe[214876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603610.103391] exe[214890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [605794.080303] warn_bad_vsyscall: 4 callbacks suppressed [605794.080307] exe[902552] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [605794.929091] exe[903794] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [605927.393014] exe[330831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193dd4f90 ax:7f3193dd5020 si:ffffffffff600000 di:564af9843263 [605927.686028] exe[231725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193dd4f90 ax:7f3193dd5020 si:ffffffffff600000 di:564af9843263 [605927.934758] exe[248372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193d92f90 ax:7f3193d93020 si:ffffffffff600000 di:564af9843263 [606176.290336] exe[561787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.228764] exe[312987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.305242] exe[313050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f258493ff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.606970] exe[313023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606352.433370] exe[67824] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606353.181452] exe[845824] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606354.432655] exe[851790] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606465.417018] exe[615259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.481226] exe[615263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.527098] exe[615263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.628693] exe[615283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47628e8 ax:ffffffffff600000 si:7ea5d4762e08 di:ffffffffff600000 [607267.731134] exe[246573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607267.824262] exe[246514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607267.916459] exe[253835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607268.035258] exe[246384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.180500] exe[246767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.349323] exe[283481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.505287] exe[337565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.691248] exe[246448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.882670] exe[337552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607269.058607] exe[337552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [613038.512613] exe[604929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613038.788749] exe[553210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613039.167612] exe[678622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c0dfef88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613039.169468] exe[604915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [614281.809844] exe[862258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.540737] exe[856393] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.672280] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.731119] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.789957] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.893138] exe[775988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.961402] exe[763337] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.017564] exe[763290] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.088066] exe[775988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.125357] exe[861251] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614287.953053] warn_bad_vsyscall: 24 callbacks suppressed [614287.953055] exe[861132] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614287.957398] exe[852527] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614643.287010] exe[535192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba33bf90 ax:7f14ba33c020 si:ffffffffff600000 di:55b415b71263 [614644.290530] exe[555700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba31af90 ax:7f14ba31b020 si:ffffffffff600000 di:55b415b71263 [614645.347267] exe[529876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba35cf90 ax:7f14ba35d020 si:ffffffffff600000 di:55b415b71263 [619159.063150] exe[109073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619159.401510] exe[69214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619159.600815] exe[73140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966ea658e8 ax:ffffffffff600000 si:7f966ea65e08 di:ffffffffff600000 [619171.596202] exe[247300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619797.473116] exe[662052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619798.447569] exe[662198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619798.514658] exe[662214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a89dd8e8 ax:ffffffffff600000 si:7eb9a89dde08 di:ffffffffff600000 [619799.358732] exe[662318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619799.358764] exe[662319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8e978e8 ax:ffffffffff600000 si:7eb9a8e97e08 di:ffffffffff600000 [620740.520979] exe[811290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.688096] exe[811309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.734802] exe[811309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.888259] exe[811334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.907729] exe[811335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9cca18e8 ax:ffffffffff600000 si:7efb9cca1e08 di:ffffffffff600000 [621720.141313] exe[926934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.373119] exe[906134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.540044] exe[926822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.692736] exe[939094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [622452.637541] exe[113664] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622453.570724] exe[113664] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622454.466141] exe[142434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622455.150738] exe[142462] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622455.773241] exe[115073] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622456.145988] exe[122756] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622456.550961] exe[142434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [623017.338543] exe[295402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.570252] exe[293065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.778821] exe[293433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.985635] exe[295610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [624099.677229] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624100.317434] exe[514418] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624101.186437] exe[334114] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624102.002656] exe[460123] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624103.109991] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624104.060775] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624104.969752] exe[512102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [625084.297149] exe[670912] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625084.632849] exe[655452] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625084.931744] exe[674116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625085.348162] exe[674116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [626289.791621] exe[13009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2b0ab6506 cs:33 sp:7ef4fc9de8e8 ax:ffffffffff600000 si:7ef4fc9dee08 di:ffffffffff600000 [626290.020864] exe[13074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2b0ab6506 cs:33 sp:7ef4fc9de8e8 ax:ffffffffff600000 si:7ef4fc9dee08 di:ffffffffff600000 [626290.309327] exe[13147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2b0ab6506 cs:33 sp:7ef4fc9de8e8 ax:ffffffffff600000 si:7ef4fc9dee08 di:ffffffffff600000 [626290.531850] exe[13209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2b0ab6506 cs:33 sp:7ef4fc9de8e8 ax:ffffffffff600000 si:7ef4fc9dee08 di:ffffffffff600000 [626340.751020] exe[702] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [626341.486393] exe[979969] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [626342.360784] exe[979969] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [626343.065564] exe[979969] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [626568.957508] exe[792814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c36e04506 cs:33 sp:7fa1ddd318e8 ax:ffffffffff600000 si:7fa1ddd31e08 di:ffffffffff600000 [626569.243316] exe[845523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c36e04506 cs:33 sp:7fa1ddd318e8 ax:ffffffffff600000 si:7fa1ddd31e08 di:ffffffffff600000 [626569.540817] exe[853053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c36e04506 cs:33 sp:7fa1ddd318e8 ax:ffffffffff600000 si:7fa1ddd31e08 di:ffffffffff600000 [626569.842525] exe[883560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c36e04506 cs:33 sp:7fa1ddd318e8 ax:ffffffffff600000 si:7fa1ddd31e08 di:ffffffffff600000 [626591.593435] exe[979969] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [626592.197077] exe[702] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [626592.851237] exe[959291] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [626593.414972] exe[83624] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [626998.813909] exe[896329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470d92a506 cs:33 sp:7f3c635f18e8 ax:ffffffffff600000 si:7f3c635f1e08 di:ffffffffff600000 [626998.975139] exe[896342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470d92a506 cs:33 sp:7f3c635f18e8 ax:ffffffffff600000 si:7f3c635f1e08 di:ffffffffff600000 [626999.349487] exe[178459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470d92a506 cs:33 sp:7f3c635f18e8 ax:ffffffffff600000 si:7f3c635f1e08 di:ffffffffff600000 [626999.602803] exe[154730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470d92a506 cs:33 sp:7f3c635f18e8 ax:ffffffffff600000 si:7f3c635f1e08 di:ffffffffff600000 [627133.157493] exe[222930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626f022a506 cs:33 sp:7ecd7ed5f8e8 ax:ffffffffff600000 si:7ecd7ed5fe08 di:ffffffffff600000 [627138.361754] exe[854232] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [627138.961043] exe[40331] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [627139.653258] exe[879225] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [627140.237800] exe[40331] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [627360.849433] exe[234185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569b4ae506 cs:33 sp:7fa5841de8e8 ax:ffffffffff600000 si:7fa5841dee08 di:ffffffffff600000 [627361.166643] exe[203923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569b4ae506 cs:33 sp:7fa5841de8e8 ax:ffffffffff600000 si:7fa5841dee08 di:ffffffffff600000 [627361.423424] exe[251942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569b4ae506 cs:33 sp:7fa5841de8e8 ax:ffffffffff600000 si:7fa5841dee08 di:ffffffffff600000 [627361.619044] exe[159612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569b4ae506 cs:33 sp:7fa5841de8e8 ax:ffffffffff600000 si:7fa5841dee08 di:ffffffffff600000 [628205.003155] exe[18032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [628280.090812] exe[18032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [629332.196613] exe[491663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [629369.788542] exe[599372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727923e506 cs:33 sp:7fc0fb7fe8e8 ax:ffffffffff600000 si:7fc0fb7fee08 di:ffffffffff600000 [629369.986555] exe[537034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727923e506 cs:33 sp:7fc0fb7fe8e8 ax:ffffffffff600000 si:7fc0fb7fee08 di:ffffffffff600000 [629370.062458] exe[538443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727923e506 cs:33 sp:7fc0fb7fe8e8 ax:ffffffffff600000 si:7fc0fb7fee08 di:ffffffffff600000 [629370.243771] exe[534630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727923e506 cs:33 sp:7fc0fb7fe8e8 ax:ffffffffff600000 si:7fc0fb7fee08 di:ffffffffff600000 [629370.307585] exe[566454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727923e506 cs:33 sp:7fc0fb7fe8e8 ax:ffffffffff600000 si:7fc0fb7fee08 di:ffffffffff600000 [629446.631379] exe[429553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [629512.153725] exe[684984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c79a6e8506 cs:33 sp:7f87b14da8e8 ax:ffffffffff600000 si:7f87b14dae08 di:ffffffffff600000 [629674.371609] exe[727871] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [630494.217813] exe[884196] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [630877.707714] exe[736419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e142ae5506 cs:33 sp:7f3e648318e8 ax:ffffffffff600000 si:7f3e64831e08 di:ffffffffff600000 [630916.119977] exe[913304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a66ec31506 cs:33 sp:7f62a0b748e8 ax:ffffffffff600000 si:7f62a0b74e08 di:ffffffffff600000 [630916.327608] exe[857178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a66ec31506 cs:33 sp:7f62a0b748e8 ax:ffffffffff600000 si:7f62a0b74e08 di:ffffffffff600000 [630916.331106] exe[910856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5d1d9506 cs:33 sp:7fbdd4dcb8e8 ax:ffffffffff600000 si:7fbdd4dcbe08 di:ffffffffff600000 [630916.505659] exe[857930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5d1d9506 cs:33 sp:7fbdd4dcb8e8 ax:ffffffffff600000 si:7fbdd4dcbe08 di:ffffffffff600000 [630916.509844] exe[919893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a66ec31506 cs:33 sp:7f62a0b748e8 ax:ffffffffff600000 si:7f62a0b74e08 di:ffffffffff600000 [630916.598308] exe[935349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600e8b07506 cs:33 sp:7fde4fc5d8e8 ax:ffffffffff600000 si:7fde4fc5de08 di:ffffffffff600000 [630916.645910] exe[911068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e8de43506 cs:33 sp:7ff37af188e8 ax:ffffffffff600000 si:7ff37af18e08 di:ffffffffff600000 [630916.672853] exe[919670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5d1d9506 cs:33 sp:7fbdd4dcb8e8 ax:ffffffffff600000 si:7fbdd4dcbe08 di:ffffffffff600000 [630916.690645] exe[910841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a66ec31506 cs:33 sp:7f62a0b748e8 ax:ffffffffff600000 si:7f62a0b74e08 di:ffffffffff600000 [630916.831707] exe[857066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600e8b07506 cs:33 sp:7fde4fc5d8e8 ax:ffffffffff600000 si:7fde4fc5de08 di:ffffffffff600000 [632063.489087] warn_bad_vsyscall: 3 callbacks suppressed [632063.489089] exe[858558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f74712506 cs:33 sp:7ff6eff648e8 ax:ffffffffff600000 si:7ff6eff64e08 di:ffffffffff600000 [632989.350193] exe[863463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5d1d9506 cs:33 sp:7fbdd4dcb8e8 ax:ffffffffff600000 si:7fbdd4dcbe08 di:ffffffffff600000 [633053.757759] exe[349130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559043c85506 cs:33 sp:7fb529bfe8e8 ax:ffffffffff600000 si:7fb529bfee08 di:ffffffffff600000 [633053.953948] exe[345401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559043c85506 cs:33 sp:7fb529bfe8e8 ax:ffffffffff600000 si:7fb529bfee08 di:ffffffffff600000 [633054.268638] exe[345440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559043c85506 cs:33 sp:7fb529bfe8e8 ax:ffffffffff600000 si:7fb529bfee08 di:ffffffffff600000 [634858.928606] exe[544746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55666908e506 cs:33 sp:7ff6b9afaf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634859.088458] exe[804943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca65aa6506 cs:33 sp:7ead2538af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634860.938541] exe[635987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55666908e506 cs:33 sp:7ff6b9afaf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634862.138865] exe[805723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca65aa6506 cs:33 sp:7ead2538af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634867.601713] exe[619564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0aa6d506 cs:33 sp:7f23a5995f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634868.414342] exe[653419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558753254506 cs:33 sp:7fda6ff98f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634869.815054] exe[681789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d36e2506 cs:33 sp:7fe542775f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [634870.265870] exe[347582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d2eda7506 cs:33 sp:7fbeb8067f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635027.536007] exe[739364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603087e3506 cs:33 sp:7fdba60e4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635031.768601] exe[622242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b22e69b506 cs:33 sp:7faacd3fef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635062.790541] exe[760054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dbdc8f506 cs:33 sp:7f0c2a4fff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635065.605684] exe[818638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289b5ee506 cs:33 sp:7f89e4122f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635119.225479] exe[634899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fe003506 cs:33 sp:7f45d63b8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635132.438998] exe[857000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639ce61b506 cs:33 sp:7fa630bd5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635419.026426] exe[925006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56434cabd506 cs:33 sp:7fce6e3a0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635420.359301] exe[926538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef41347506 cs:33 sp:7fdea8f5bf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635443.065995] exe[933031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ea9122506 cs:33 sp:7ed76149bf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635444.150823] exe[933274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ea5b58506 cs:33 sp:7ed125131f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635548.307722] exe[959419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ee05c6506 cs:33 sp:7fd347e88f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635551.161779] exe[955432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56327e83d506 cs:33 sp:7fcf60338f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635572.979669] exe[705371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565501c38506 cs:33 sp:7f22dda26f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635583.222774] exe[912261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56235dc19506 cs:33 sp:7fb3fb8e5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [635750.819655] exe[9383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ea9122506 cs:33 sp:7ed76149b8e8 ax:ffffffffff600000 si:7ed76149be08 di:ffffffffff600000 [635751.402895] exe[9485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ea9122506 cs:33 sp:7ed76149b8e8 ax:ffffffffff600000 si:7ed76149be08 di:ffffffffff600000 [635751.611461] exe[9538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ea9122506 cs:33 sp:7ed76147a8e8 ax:ffffffffff600000 si:7ed76147ae08 di:ffffffffff600000 [636007.023581] exe[64290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db4e4e1506 cs:33 sp:7f20f225a8e8 ax:ffffffffff600000 si:7f20f225ae08 di:ffffffffff600000 [636007.339286] exe[972375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db4e4e1506 cs:33 sp:7f20f225a8e8 ax:ffffffffff600000 si:7f20f225ae08 di:ffffffffff600000 [636007.347581] exe[64187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583e261e506 cs:33 sp:7f2cae31c8e8 ax:ffffffffff600000 si:7f2cae31ce08 di:ffffffffff600000 [636007.376246] exe[984362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db4e4e1506 cs:33 sp:7f20f225a8e8 ax:ffffffffff600000 si:7f20f225ae08 di:ffffffffff600000 [636007.567851] exe[989899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db4e4e1506 cs:33 sp:7f20f225a8e8 ax:ffffffffff600000 si:7f20f225ae08 di:ffffffffff600000 [636289.698162] exe[734938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c150c52506 cs:33 sp:7f19fa966f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [636318.100696] exe[833688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c150c52506 cs:33 sp:7f19fa966f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [636377.552105] exe[848739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56109ed76506 cs:33 sp:7fe64717af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [636379.329098] exe[848724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56109ed76506 cs:33 sp:7fe64717af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [636410.852730] exe[526512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615f0537506 cs:33 sp:7f61fc43ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [636431.377238] exe[418538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c706cd506 cs:33 sp:7fa50f5eef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [637534.203173] exe[440305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f06eb4506 cs:33 sp:7ecf9af80f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [637536.151826] exe[440735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f06eb4506 cs:33 sp:7ecf9af80f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [639126.087291] exe[734499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599a9430378 cs:33 sp:7f74f23b7f90 ax:7f74f23b8020 si:ffffffffff600000 di:5599a94fa263 [639177.072006] exe[796241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b09762378 cs:33 sp:7edc139fef90 ax:7edc139ff020 si:ffffffffff600000 di:563b0982c263 [639182.681329] exe[796902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556121953378 cs:33 sp:7f32b05e9f90 ax:7f32b05ea020 si:ffffffffff600000 di:556121a1d263 [639195.982530] exe[792298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596ecf63378 cs:33 sp:7f26b4648f90 ax:7f26b4649020 si:ffffffffff600000 di:5596ed02d263 [639281.321987] exe[786170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac6efb378 cs:33 sp:7eff542e0f90 ax:7eff542e1020 si:ffffffffff600000 di:55eac6fc5263 [639349.342648] exe[806248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af3dcac378 cs:33 sp:7f7bba0a4f90 ax:7f7bba0a5020 si:ffffffffff600000 di:55af3dd76263 [639378.986796] exe[790461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ead0d9378 cs:33 sp:7fec6cebdf90 ax:7fec6cebe020 si:ffffffffff600000 di:557ead1a3263 [639568.332902] exe[750281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634fdfb4378 cs:33 sp:7f45d63b8f90 ax:7f45d63b9020 si:ffffffffff600000 di:5634fe07e263 [639723.910015] exe[871038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1ca67d378 cs:33 sp:7f7093223f90 ax:7f7093224020 si:ffffffffff600000 di:55f1ca747263 [639724.854288] exe[883289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558731a80378 cs:33 sp:7f005657df90 ax:7f005657e020 si:ffffffffff600000 di:558731b4a263 [639740.689390] exe[904401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9fc82378 cs:33 sp:7ef06ff7bf90 ax:7ef06ff7c020 si:ffffffffff600000 di:558f9fd4c263 [639751.444017] exe[807639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559613ae7378 cs:33 sp:7f86b0c96f90 ax:7f86b0c97020 si:ffffffffff600000 di:559613bb1263 [639806.741727] exe[916783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfae70378 cs:33 sp:7ecff6937f90 ax:7ecff6938020 si:ffffffffff600000 di:562dfaf3a263 [639950.170915] exe[733972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56299af75506 cs:33 sp:7f9a47cfcf88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [639950.591873] exe[856959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56299af75506 cs:33 sp:7f9a47cfcf88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [639950.927928] exe[743473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56299af75506 cs:33 sp:7f9a47cdbf88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [640697.824544] exe[35001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556252108378 cs:33 sp:7f18f414ef90 ax:7f18f414f020 si:ffffffffff600000 di:5562521d2263 [640810.583589] exe[99659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595d6995378 cs:33 sp:7ebcc4ee1f90 ax:7ebcc4ee2020 si:ffffffffff600000 di:5595d6a5f263 [643128.307028] exe[581217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9945cd506 cs:33 sp:7eb8c1d4e8e8 ax:ffffffffff600000 si:7eb8c1d4ee08 di:ffffffffff600000 [643128.510730] exe[581255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9945cd506 cs:33 sp:7eb8c1d4e8e8 ax:ffffffffff600000 si:7eb8c1d4ee08 di:ffffffffff600000 [643128.574329] exe[581255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9945cd506 cs:33 sp:7eb8c1d4e8e8 ax:ffffffffff600000 si:7eb8c1d4ee08 di:ffffffffff600000 [643128.752589] exe[581312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9945cd506 cs:33 sp:7eb8c1d4e8e8 ax:ffffffffff600000 si:7eb8c1d4ee08 di:ffffffffff600000 [643128.792217] exe[581312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9945cd506 cs:33 sp:7eb8c1d4e8e8 ax:ffffffffff600000 si:7eb8c1d4ee08 di:ffffffffff600000 [643778.074736] exe[635011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f93b86378 cs:33 sp:7f80382cbf90 ax:7f80382cc020 si:ffffffffff600000 di:557f93c50263 [645422.452979] exe[37704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595d69e4506 cs:33 sp:7ebcc4ee1f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [645476.357252] exe[48443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595d69e4506 cs:33 sp:7ebcc4ee1f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [647461.104895] exe[334339] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647461.824617] exe[283059] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647461.891853] exe[328348] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647461.943461] exe[329949] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647461.993412] exe[278043] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647462.058553] exe[328494] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647462.122575] exe[334339] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647462.194708] exe[279283] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647462.251715] exe[328494] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647462.291098] exe[328348] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [647568.877959] warn_bad_vsyscall: 25 callbacks suppressed [647568.877963] exe[497199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef6b8e8 ax:ffffffffff600000 si:7f76bef6be08 di:ffffffffff600000 [647569.214568] exe[292599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef6b8e8 ax:ffffffffff600000 si:7f76bef6be08 di:ffffffffff600000 [647569.274463] exe[346872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef6b8e8 ax:ffffffffff600000 si:7f76bef6be08 di:ffffffffff600000 [647569.685723] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.726290] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.767940] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.804255] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.842266] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.878747] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [647569.914739] exe[404719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33dc66506 cs:33 sp:7f76bef4a8e8 ax:ffffffffff600000 si:7f76bef4ae08 di:ffffffffff600000 [648550.389696] warn_bad_vsyscall: 26 callbacks suppressed [648550.389700] exe[347087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615557d0378 cs:33 sp:7fa3168edf90 ax:7fa3168ee020 si:ffffffffff600000 di:56155589a263 [648563.134595] exe[608604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7e7185378 cs:33 sp:7fc2e95d7f90 ax:7fc2e95d8020 si:ffffffffff600000 di:55c7e724f263 [648583.515370] exe[704384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fa3559378 cs:33 sp:7ee51ddfef90 ax:7ee51ddff020 si:ffffffffff600000 di:556fa3623263 [648660.750036] exe[343586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56303ee4f378 cs:33 sp:7f13a785af90 ax:7f13a785b020 si:ffffffffff600000 di:56303ef19263 [648744.636825] exe[679026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ee77e378 cs:33 sp:7fa658c8bf90 ax:7fa658c8c020 si:ffffffffff600000 di:5630ee848263 [649015.831595] exe[784416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55707837d378 cs:33 sp:7ea48e55ff90 ax:7ea48e560020 si:ffffffffff600000 di:557078447263 [649025.461712] exe[550345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e5794e378 cs:33 sp:7f65e15c3f90 ax:7f65e15c4020 si:ffffffffff600000 di:564e57a18263 [649046.909123] exe[790126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557de6dd6378 cs:33 sp:7ed37976cf90 ax:7ed37976d020 si:ffffffffff600000 di:557de6ea0263 [649102.537042] exe[788054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562057ccb378 cs:33 sp:7fe634731f90 ax:7fe634732020 si:ffffffffff600000 di:562057d95263 [649119.441813] exe[365733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556252108378 cs:33 sp:7f18f414ef90 ax:7f18f414f020 si:ffffffffff600000 di:5562521d2263 [649161.230393] exe[425031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569d1437378 cs:33 sp:7f35e92ebf90 ax:7f35e92ec020 si:ffffffffff600000 di:5569d1501263 [649322.709129] exe[837078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595d6995378 cs:33 sp:7ebcc4ee1f90 ax:7ebcc4ee2020 si:ffffffffff600000 di:5595d6a5f263 [649826.848611] exe[921673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc02c72378 cs:33 sp:7f88e310ef90 ax:7f88e310f020 si:ffffffffff600000 di:55fc02d3c263 [650059.795079] exe[970272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56397b7f3378 cs:33 sp:7faebed8df90 ax:7faebed8e020 si:ffffffffff600000 di:56397b8bd263 [650500.752841] exe[945016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643256f4506 cs:33 sp:7eff5dd508e8 ax:ffffffffff600000 si:7eff5dd50e08 di:ffffffffff600000 [650501.086367] exe[923884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643256f4506 cs:33 sp:7eff5dd508e8 ax:ffffffffff600000 si:7eff5dd50e08 di:ffffffffff600000 [650501.284733] exe[936138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643256f4506 cs:33 sp:7eff5dd508e8 ax:ffffffffff600000 si:7eff5dd50e08 di:ffffffffff600000 [651266.254217] exe[252394] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [651266.989786] exe[222597] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [651267.596541] exe[253991] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [652726.878336] exe[217029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56417bfdd378 cs:33 sp:7fc2bc494f90 ax:7fc2bc495020 si:ffffffffff600000 di:56417c0a7263 [652727.328248] exe[461787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56417bfdd378 cs:33 sp:7fc2bc494f90 ax:7fc2bc495020 si:ffffffffff600000 di:56417c0a7263 [652727.967022] exe[191494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56417bfdd378 cs:33 sp:7fc2bc473f90 ax:7fc2bc474020 si:ffffffffff600000 di:56417c0a7263 [656918.443843] exe[712865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bf05f90 ax:7f330bf06020 si:ffffffffff600000 di:55ceb588c263 [656919.070443] exe[652813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bf05f90 ax:7f330bf06020 si:ffffffffff600000 di:55ceb588c263 [656919.139100] exe[655160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bee4f90 ax:7f330bee5020 si:ffffffffff600000 di:55ceb588c263 [656919.347810] exe[656765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bf05f90 ax:7f330bf06020 si:ffffffffff600000 di:55ceb588c263 [656919.411653] exe[656765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bf05f90 ax:7f330bf06020 si:ffffffffff600000 di:55ceb588c263 [656921.611009] exe[656730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656922.125269] exe[653014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656923.225323] exe[652632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656924.148805] exe[656821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656925.081048] exe[652983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9ddf90 ax:7fd2bb9de020 si:ffffffffff600000 di:5636a2ac4263 [656926.109811] exe[655197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656926.415514] exe[655160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceb57c2378 cs:33 sp:7f330bf05f90 ax:7f330bf06020 si:ffffffffff600000 di:55ceb588c263 [656926.421784] exe[652527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656927.138294] exe[652859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656927.831452] exe[652956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656928.202351] exe[652956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656928.607116] exe[654097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656929.136726] exe[652701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656929.643876] exe[653890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656930.124879] exe[652632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656930.835452] exe[708684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656932.018827] exe[652884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656932.443089] exe[652632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656932.914761] exe[656744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656933.928012] exe[712865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656934.516071] exe[712837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656935.923731] exe[652915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [656937.004573] exe[674062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636a29fa378 cs:33 sp:7fd2bb9fef90 ax:7fd2bb9ff020 si:ffffffffff600000 di:5636a2ac4263 [657698.954385] exe[509791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657699.062898] exe[509812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657699.171431] exe[509838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.307331] exe[538436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.487560] exe[538472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.600533] exe[538502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.723253] exe[538534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.801219] exe[538562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657825.912191] exe[538588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657826.063319] exe[538619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657826.171784] exe[538633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657826.303269] exe[538652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [657826.427759] exe[538671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d02b30506 cs:33 sp:7ed7cf5658e8 ax:ffffffffff600000 si:7ed7cf565e08 di:ffffffffff600000 [662466.425675] exe[300674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55559d244378 cs:33 sp:7fc6087fef90 ax:7fc6087ff020 si:ffffffffff600000 di:55559d30e263 [662467.184423] exe[390714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55559d244378 cs:33 sp:7fc6087fef90 ax:7fc6087ff020 si:ffffffffff600000 di:55559d30e263 [662467.844333] exe[301401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55559d244378 cs:33 sp:7fc6087fef90 ax:7fc6087ff020 si:ffffffffff600000 di:55559d30e263 [663963.280731] exe[876364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb1be4d506 cs:33 sp:7fad6689df88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [663963.873890] exe[845809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb1be4d506 cs:33 sp:7fad6689df88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [663964.454456] exe[468311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb1be4d506 cs:33 sp:7fad6689df88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [664612.570853] exe[109843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619a92c8506 cs:33 sp:7f9d8f1678e8 ax:ffffffffff600000 si:7f9d8f167e08 di:ffffffffff600000 [664612.632062] exe[119168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619a92c8506 cs:33 sp:7f9d8f1678e8 ax:ffffffffff600000 si:7f9d8f167e08 di:ffffffffff600000 [664612.695593] exe[109890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619a92c8506 cs:33 sp:7f9d8f1678e8 ax:ffffffffff600000 si:7f9d8f167e08 di:ffffffffff600000 [664612.757066] exe[109840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619a92c8506 cs:33 sp:7f9d8f1678e8 ax:ffffffffff600000 si:7f9d8f167e08 di:ffffffffff600000 [665913.905605] exe[505525] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665914.566272] exe[505077] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665915.247264] exe[505646] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665915.883801] exe[505525] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665916.637531] exe[538886] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665917.325771] exe[505077] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665917.996474] exe[505646] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665918.604636] exe[506374] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665919.188634] exe[538886] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [665919.846094] exe[505525] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [667034.741405] exe[662332] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [667035.635755] exe[650104] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [667036.335103] exe[648370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [667037.083247] exe[650104] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [667166.392872] exe[847521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e62bd506 cs:33 sp:7edf90c638e8 ax:ffffffffff600000 si:7edf90c63e08 di:ffffffffff600000 [668251.313572] exe[651405] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [668251.856783] exe[650298] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [668252.430099] exe[650604] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [668252.813113] exe[743145] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [668384.210844] exe[108182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d1a650506 cs:33 sp:7efa78d6e8e8 ax:ffffffffff600000 si:7efa78d6ee08 di:ffffffffff600000 [668593.980711] exe[797404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584c9965506 cs:33 sp:7fd161ffa8e8 ax:ffffffffff600000 si:7fd161ffae08 di:ffffffffff600000 [668594.136636] exe[519760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584c9965506 cs:33 sp:7fd161ffa8e8 ax:ffffffffff600000 si:7fd161ffae08 di:ffffffffff600000 [668594.345729] exe[509111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584c9965506 cs:33 sp:7fd161ffa8e8 ax:ffffffffff600000 si:7fd161ffae08 di:ffffffffff600000 [668594.474969] exe[895576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584c9965506 cs:33 sp:7fd161ffa8e8 ax:ffffffffff600000 si:7fd161ffae08 di:ffffffffff600000 [669193.511504] exe[279320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c9460506 cs:33 sp:7f8fbabc18e8 ax:ffffffffff600000 si:7f8fbabc1e08 di:ffffffffff600000 [669193.692539] exe[279285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c9460506 cs:33 sp:7f8fbabc18e8 ax:ffffffffff600000 si:7f8fbabc1e08 di:ffffffffff600000 [669193.893223] exe[279246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c9460506 cs:33 sp:7f8fbabc18e8 ax:ffffffffff600000 si:7f8fbabc1e08 di:ffffffffff600000 [669193.978782] exe[279251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642a0114506 cs:33 sp:7f49f06a28e8 ax:ffffffffff600000 si:7f49f06a2e08 di:ffffffffff600000 [669193.999999] exe[279227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f07c69506 cs:33 sp:7faf55b458e8 ax:ffffffffff600000 si:7faf55b45e08 di:ffffffffff600000 [669194.048425] exe[279128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c9460506 cs:33 sp:7f8fbabc18e8 ax:ffffffffff600000 si:7f8fbabc1e08 di:ffffffffff600000 [669194.063332] exe[279246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8b622e506 cs:33 sp:7f497378c8e8 ax:ffffffffff600000 si:7f497378ce08 di:ffffffffff600000 [669194.087038] exe[279132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642a0114506 cs:33 sp:7f49f06a28e8 ax:ffffffffff600000 si:7f49f06a2e08 di:ffffffffff600000 [669194.152918] exe[279403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f07c69506 cs:33 sp:7faf55b458e8 ax:ffffffffff600000 si:7faf55b45e08 di:ffffffffff600000 [669194.268997] exe[279320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8b622e506 cs:33 sp:7f497378c8e8 ax:ffffffffff600000 si:7f497378ce08 di:ffffffffff600000 [669832.450116] warn_bad_vsyscall: 3 callbacks suppressed [669832.450119] exe[57326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559580ed2506 cs:33 sp:7f5329d638e8 ax:ffffffffff600000 si:7f5329d63e08 di:ffffffffff600000 [670294.000590] exe[368511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c602802506 cs:33 sp:7f0b1dd188e8 ax:ffffffffff600000 si:7f0b1dd18e08 di:ffffffffff600000 [670294.099254] exe[364637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c602802506 cs:33 sp:7f0b1dd188e8 ax:ffffffffff600000 si:7f0b1dd18e08 di:ffffffffff600000 [670294.321476] exe[379478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c602802506 cs:33 sp:7f0b1dd188e8 ax:ffffffffff600000 si:7f0b1dd18e08 di:ffffffffff600000 [670294.395327] exe[364150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c602802506 cs:33 sp:7f0b1dd188e8 ax:ffffffffff600000 si:7f0b1dd18e08 di:ffffffffff600000 [670407.469508] exe[489125] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670407.997093] exe[487361] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670408.582939] exe[481954] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670409.493155] exe[481954] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670410.271156] exe[481853] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670410.793107] exe[505340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670411.342373] exe[489125] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [670549.017870] exe[363568] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670549.808735] exe[364392] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670550.620342] exe[364392] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670551.244957] exe[517407] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670676.924081] exe[523179] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670677.643159] exe[523179] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670678.589744] exe[503539] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [670679.467956] exe[492547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [671297.758122] exe[70440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574ab961506 cs:33 sp:7faeb4d9d8e8 ax:ffffffffff600000 si:7faeb4d9de08 di:ffffffffff600000 [671298.015032] exe[670461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574ab961506 cs:33 sp:7faeb4d9d8e8 ax:ffffffffff600000 si:7faeb4d9de08 di:ffffffffff600000 [671298.250831] exe[379430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574ab961506 cs:33 sp:7faeb4d9d8e8 ax:ffffffffff600000 si:7faeb4d9de08 di:ffffffffff600000 [671298.835363] exe[670385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574ab961506 cs:33 sp:7faeb4d9d8e8 ax:ffffffffff600000 si:7faeb4d9de08 di:ffffffffff600000 [671354.285286] exe[602929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc64273506 cs:33 sp:7ff81d7d98e8 ax:ffffffffff600000 si:7ff81d7d9e08 di:ffffffffff600000 [671838.831323] exe[588409] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [672085.410480] exe[691996] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [672162.352979] exe[859330] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [672427.977546] exe[948055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7e81da506 cs:33 sp:7f2ccd4b98e8 ax:ffffffffff600000 si:7f2ccd4b9e08 di:ffffffffff600000 [672428.239561] exe[946537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7e81da506 cs:33 sp:7f2ccd4b98e8 ax:ffffffffff600000 si:7f2ccd4b9e08 di:ffffffffff600000 [672428.376241] exe[947829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7e81da506 cs:33 sp:7f2ccd4b98e8 ax:ffffffffff600000 si:7f2ccd4b9e08 di:ffffffffff600000 [672428.487051] exe[947637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7e81da506 cs:33 sp:7f2ccd4b98e8 ax:ffffffffff600000 si:7f2ccd4b9e08 di:ffffffffff600000 [672862.916335] exe[809504] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [672936.497678] exe[961754] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [673368.566887] exe[141743] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [674721.863489] exe[495304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564ff98c506 cs:33 sp:7f6251a2b8e8 ax:ffffffffff600000 si:7f6251a2be08 di:ffffffffff600000 [675478.221484] exe[45478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eacbed506 cs:33 sp:7f06645fe8e8 ax:ffffffffff600000 si:7f06645fee08 di:ffffffffff600000 [676495.901439] exe[848332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d37c21e506 cs:33 sp:7fcbba83d8e8 ax:ffffffffff600000 si:7fcbba83de08 di:ffffffffff600000 [676496.640873] exe[848814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d37c21e506 cs:33 sp:7fcbba83d8e8 ax:ffffffffff600000 si:7fcbba83de08 di:ffffffffff600000 [676496.775930] exe[851937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d37c21e506 cs:33 sp:7fcbba3fe8e8 ax:ffffffffff600000 si:7fcbba3fee08 di:ffffffffff600000 [679833.832061] exe[105908] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [679835.102420] exe[916803] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [679835.429635] exe[951863] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [679836.322472] exe[951863] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [681924.835414] exe[764337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8b4bcf506 cs:33 sp:7f507ed4a8e8 ax:ffffffffff600000 si:7f507ed4ae08 di:ffffffffff600000 [681925.070120] exe[479962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8b4bcf506 cs:33 sp:7f507ed4a8e8 ax:ffffffffff600000 si:7f507ed4ae08 di:ffffffffff600000 [681925.388161] exe[740568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8b4bcf506 cs:33 sp:7f507ed4a8e8 ax:ffffffffff600000 si:7f507ed4ae08 di:ffffffffff600000 [681925.719669] exe[480228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8b4bcf506 cs:33 sp:7f507ed4a8e8 ax:ffffffffff600000 si:7f507ed4ae08 di:ffffffffff600000 [686743.550390] exe[887921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aafac6506 cs:33 sp:7fecec6418e8 ax:ffffffffff600000 si:7fecec641e08 di:ffffffffff600000 [686744.222869] exe[900813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aafac6506 cs:33 sp:7fecec6208e8 ax:ffffffffff600000 si:7fecec620e08 di:ffffffffff600000 [686744.602806] exe[887608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aafac6506 cs:33 sp:7fecec6418e8 ax:ffffffffff600000 si:7fecec641e08 di:ffffffffff600000 [686744.781098] exe[898338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aafac6506 cs:33 sp:7fecec1fe8e8 ax:ffffffffff600000 si:7fecec1fee08 di:ffffffffff600000 [686973.013087] exe[901113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5a585b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [686973.561226] exe[889400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5a585b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [686974.093101] exe[889483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5a585b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [688024.439076] exe[294387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee785d506 cs:33 sp:7ed8f30e38e8 ax:ffffffffff600000 si:7ed8f30e3e08 di:ffffffffff600000 [688024.625521] exe[294423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee785d506 cs:33 sp:7ed8f30e38e8 ax:ffffffffff600000 si:7ed8f30e3e08 di:ffffffffff600000 [688024.672068] exe[294423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee785d506 cs:33 sp:7ed8f30e38e8 ax:ffffffffff600000 si:7ed8f30e3e08 di:ffffffffff600000 [688024.895906] exe[294479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee785d506 cs:33 sp:7ed8f30e38e8 ax:ffffffffff600000 si:7ed8f30e3e08 di:ffffffffff600000 [688456.393865] exe[378569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562760f08506 cs:33 sp:7edb25a5af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [688456.605814] exe[378616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562760f08506 cs:33 sp:7edb25a39f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [688456.903585] exe[378677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562760f08506 cs:33 sp:7edb25a5af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [689107.624976] exe[503488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b5358a378 cs:33 sp:7ea4f0f74f90 ax:7ea4f0f75020 si:ffffffffff600000 di:559b53654263 [689107.805642] exe[503515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b5358a378 cs:33 sp:7ea4f0f74f90 ax:7ea4f0f75020 si:ffffffffff600000 di:559b53654263 [689108.052501] exe[503558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b5358a378 cs:33 sp:7ea4f0f74f90 ax:7ea4f0f75020 si:ffffffffff600000 di:559b53654263 [689374.816456] exe[968882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3213f7506 cs:33 sp:7f816b9d6f88 ax:ffffffffff600000 si:20005a80 di:ffffffffff600000 [689375.506841] exe[398243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3213f7506 cs:33 sp:7f816b994f88 ax:ffffffffff600000 si:20005a80 di:ffffffffff600000 [689376.163002] exe[970744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3213f7506 cs:33 sp:7f816b9d6f88 ax:ffffffffff600000 si:20005a80 di:ffffffffff600000 [690532.990263] exe[709746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559b90b7506 cs:33 sp:7f7dfa9998e8 ax:ffffffffff600000 si:7f7dfa999e08 di:ffffffffff600000 [690533.211077] exe[850989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559b90b7506 cs:33 sp:7f7dfa9998e8 ax:ffffffffff600000 si:7f7dfa999e08 di:ffffffffff600000 [690533.426358] exe[697507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559b90b7506 cs:33 sp:7f7dfa9998e8 ax:ffffffffff600000 si:7f7dfa999e08 di:ffffffffff600000 [691217.138359] exe[669611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468aa07506 cs:33 sp:7f18021038e8 ax:ffffffffff600000 si:7f1802103e08 di:ffffffffff600000 [691217.806052] exe[669611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468aa07506 cs:33 sp:7f18020e28e8 ax:ffffffffff600000 si:7f18020e2e08 di:ffffffffff600000 [691218.159170] exe[736235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468aa07506 cs:33 sp:7f18021038e8 ax:ffffffffff600000 si:7f1802103e08 di:ffffffffff600000 [694399.816195] exe[720814] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [694400.561965] exe[935982] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [694401.246513] exe[721878] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [694401.415439] exe[721878] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [694650.007427] exe[711075] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [694651.049524] exe[491428] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [694651.919136] exe[772881] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [697582.042072] exe[398053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e026d506 cs:33 sp:7fec8906f8e8 ax:ffffffffff600000 si:7fec8906fe08 di:ffffffffff600000 [697582.423234] exe[403093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e026d506 cs:33 sp:7fec8906f8e8 ax:ffffffffff600000 si:7fec8906fe08 di:ffffffffff600000 [697582.712882] exe[398222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e026d506 cs:33 sp:7fec8906f8e8 ax:ffffffffff600000 si:7fec8906fe08 di:ffffffffff600000 [697582.713334] exe[446235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634e026d506 cs:33 sp:7fec8904e8e8 ax:ffffffffff600000 si:7fec8904ee08 di:ffffffffff600000 [697932.701914] exe[344702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d703a3506 cs:33 sp:7f990fde88e8 ax:ffffffffff600000 si:7f990fde8e08 di:ffffffffff600000 [697933.231623] exe[344706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d703a3506 cs:33 sp:7f990fdc78e8 ax:ffffffffff600000 si:7f990fdc7e08 di:ffffffffff600000 [697933.782760] exe[344706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d703a3506 cs:33 sp:7f990fd858e8 ax:ffffffffff600000 si:7f990fd85e08 di:ffffffffff600000 [703545.679231] exe[102435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8edc7c506 cs:33 sp:7fd6c33d48e8 ax:ffffffffff600000 si:7fd6c33d4e08 di:ffffffffff600000 [703546.161546] exe[102315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8edc7c506 cs:33 sp:7fd6c33928e8 ax:ffffffffff600000 si:7fd6c3392e08 di:ffffffffff600000 [703546.419190] exe[122117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8edc7c506 cs:33 sp:7fd6c33928e8 ax:ffffffffff600000 si:7fd6c3392e08 di:ffffffffff600000 [703604.170016] exe[102457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc10cf6506 cs:33 sp:7f05db5a58e8 ax:ffffffffff600000 si:7f05db5a5e08 di:ffffffffff600000 [706139.834710] exe[402959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd448bd506 cs:33 sp:7ef0f70ed8e8 ax:ffffffffff600000 si:7ef0f70ede08 di:ffffffffff600000 [706140.428633] exe[403085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd448bd506 cs:33 sp:7ef0f70ed8e8 ax:ffffffffff600000 si:7ef0f70ede08 di:ffffffffff600000 [706140.522389] exe[403085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd448bd506 cs:33 sp:7ef0f70ed8e8 ax:ffffffffff600000 si:7ef0f70ede08 di:ffffffffff600000 [706140.825706] exe[403183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd448bd506 cs:33 sp:7ef0f70cc8e8 ax:ffffffffff600000 si:7ef0f70cce08 di:ffffffffff600000 [706618.741550] exe[919629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d87174506 cs:33 sp:7faf2622a8e8 ax:ffffffffff600000 si:7faf2622ae08 di:ffffffffff600000 [706619.493845] exe[918265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d87174506 cs:33 sp:7faf25dfe8e8 ax:ffffffffff600000 si:7faf25dfee08 di:ffffffffff600000 [706620.327664] exe[926095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d87174506 cs:33 sp:7faf25dfe8e8 ax:ffffffffff600000 si:7faf25dfee08 di:ffffffffff600000 [711221.482848] exe[369510] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [711222.083441] exe[369454] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [711223.079987] exe[369510] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [711223.744925] exe[390488] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [711368.358837] exe[924244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e768d88506 cs:33 sp:7f96a657d8e8 ax:ffffffffff600000 si:7f96a657de08 di:ffffffffff600000 [711368.505409] exe[747599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e768d88506 cs:33 sp:7f96a657d8e8 ax:ffffffffff600000 si:7f96a657de08 di:ffffffffff600000 [711368.702160] exe[924348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e768d88506 cs:33 sp:7f96a657d8e8 ax:ffffffffff600000 si:7f96a657de08 di:ffffffffff600000 [711368.917709] exe[924896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e768d88506 cs:33 sp:7f96a657d8e8 ax:ffffffffff600000 si:7f96a657de08 di:ffffffffff600000 [711487.390324] exe[459897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711487.974751] exe[485900] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711488.441609] exe[456587] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711489.230458] exe[456559] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711489.740634] exe[456482] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711490.252861] exe[454947] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711490.844438] exe[456482] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [711569.727656] exe[148963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [711570.572579] exe[148141] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [711571.447638] exe[226581] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [711572.160450] exe[533649] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [712093.167448] exe[732551] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [712093.659662] exe[719302] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [712094.394930] exe[733113] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [712095.141181] exe[732551] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [712235.646238] exe[791992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e5a889506 cs:33 sp:7f14b50618e8 ax:ffffffffff600000 si:7f14b5061e08 di:ffffffffff600000 [712235.970424] exe[629579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e5a889506 cs:33 sp:7f14b50618e8 ax:ffffffffff600000 si:7f14b5061e08 di:ffffffffff600000 [712236.279044] exe[798100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e5a889506 cs:33 sp:7f14b50618e8 ax:ffffffffff600000 si:7f14b5061e08 di:ffffffffff600000 [712236.559070] exe[629702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e5a889506 cs:33 sp:7f14b50618e8 ax:ffffffffff600000 si:7f14b5061e08 di:ffffffffff600000 [712464.748336] exe[297439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14059f506 cs:33 sp:7f3f4d1108e8 ax:ffffffffff600000 si:7f3f4d110e08 di:ffffffffff600000 [712464.883268] exe[245221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14059f506 cs:33 sp:7f3f4d1108e8 ax:ffffffffff600000 si:7f3f4d110e08 di:ffffffffff600000 [712465.121241] exe[245225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14059f506 cs:33 sp:7f3f4d1108e8 ax:ffffffffff600000 si:7f3f4d110e08 di:ffffffffff600000 [712465.287687] exe[301294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14059f506 cs:33 sp:7f3f4d1108e8 ax:ffffffffff600000 si:7f3f4d110e08 di:ffffffffff600000 [712723.563890] exe[648900] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712724.055345] exe[651480] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712724.474107] exe[650211] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712725.193650] exe[651504] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712725.780948] exe[651480] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712726.416821] exe[650755] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [712726.957868] exe[650211] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [714248.612627] exe[727428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579659ef506 cs:33 sp:7fbc4ab5d8e8 ax:ffffffffff600000 si:7fbc4ab5de08 di:ffffffffff600000 [714249.506102] exe[721714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579659ef506 cs:33 sp:7fbc4ab5d8e8 ax:ffffffffff600000 si:7fbc4ab5de08 di:ffffffffff600000 [714249.849472] exe[945698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579659ef506 cs:33 sp:7fbc4ab5d8e8 ax:ffffffffff600000 si:7fbc4ab5de08 di:ffffffffff600000 [714250.109399] exe[722531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579659ef506 cs:33 sp:7fbc4ab5d8e8 ax:ffffffffff600000 si:7fbc4ab5de08 di:ffffffffff600000 [714442.509195] exe[721181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b87b5c506 cs:33 sp:7fd7650838e8 ax:ffffffffff600000 si:7fd765083e08 di:ffffffffff600000 [715100.883596] exe[236185] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [715101.717021] exe[236185] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [715102.672567] exe[236185] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [715103.461860] exe[236185] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [715233.646919] exe[334783] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [715482.316163] exe[245056] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [715955.468537] exe[83932] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [716082.803037] exe[165733] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [716093.408384] exe[373052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dfca2506 cs:33 sp:7f3d71f0c8e8 ax:ffffffffff600000 si:7f3d71f0ce08 di:ffffffffff600000 [716093.590586] exe[373358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dfca2506 cs:33 sp:7f3d71f0c8e8 ax:ffffffffff600000 si:7f3d71f0ce08 di:ffffffffff600000 [716093.630434] exe[467720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d0246a506 cs:33 sp:7f6bbc7318e8 ax:ffffffffff600000 si:7f6bbc731e08 di:ffffffffff600000 [716093.974949] exe[372845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d0246a506 cs:33 sp:7f6bbc7318e8 ax:ffffffffff600000 si:7f6bbc731e08 di:ffffffffff600000 [716093.985044] exe[435434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dfca2506 cs:33 sp:7f3d71f0c8e8 ax:ffffffffff600000 si:7f3d71f0ce08 di:ffffffffff600000 [716094.000604] exe[435810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa7247506 cs:33 sp:7f74a408c8e8 ax:ffffffffff600000 si:7f74a408ce08 di:ffffffffff600000 [716094.199203] exe[372613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d0246a506 cs:33 sp:7f6bbc7318e8 ax:ffffffffff600000 si:7f6bbc731e08 di:ffffffffff600000 [716094.280478] exe[467501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa7247506 cs:33 sp:7f74a408c8e8 ax:ffffffffff600000 si:7f74a408ce08 di:ffffffffff600000 [716094.284083] exe[416540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dfca2506 cs:33 sp:7f3d71f0c8e8 ax:ffffffffff600000 si:7f3d71f0ce08 di:ffffffffff600000 [716094.467624] exe[435670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa7247506 cs:33 sp:7f74a408c8e8 ax:ffffffffff600000 si:7f74a408ce08 di:ffffffffff600000 [716260.127794] exe[144237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae40d1506 cs:33 sp:7fbef01058e8 ax:ffffffffff600000 si:7fbef0105e08 di:ffffffffff600000 [716449.489435] exe[655584] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [716605.051868] exe[690287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56273dd98378 cs:33 sp:7eb295559f90 ax:7eb29555a020 si:ffffffffff600000 di:56273de62263 [716634.613000] exe[696482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739868b378 cs:33 sp:7ec5e782df90 ax:7ec5e782e020 si:ffffffffff600000 di:557398755263 [716650.468475] exe[591466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316b18a378 cs:33 sp:7fda2ab86f90 ax:7fda2ab87020 si:ffffffffff600000 di:56316b254263 [716657.689008] exe[696562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eda14af378 cs:33 sp:7f92921d1f90 ax:7f92921d2020 si:ffffffffff600000 di:55eda1579263 [716808.814236] exe[145428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643990c6378 cs:33 sp:7f0ced08ff90 ax:7f0ced090020 si:ffffffffff600000 di:564399190263 [716826.080880] exe[741382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a56fe6378 cs:33 sp:7eb19b58df90 ax:7eb19b58e020 si:ffffffffff600000 di:556a570b0263 [716838.781311] exe[712800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e78e324378 cs:33 sp:7f85077c0f90 ax:7f85077c1020 si:ffffffffff600000 di:55e78e3ee263 [717092.949361] exe[792121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e5a882378 cs:33 sp:7fbec5503f90 ax:7fbec5504020 si:ffffffffff600000 di:560e5a94c263 [717106.688973] exe[625523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556835665378 cs:33 sp:7f45ecf1ff90 ax:7f45ecf20020 si:ffffffffff600000 di:55683572f263 [717121.775118] exe[812214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c44303378 cs:33 sp:7ef4d0b6cf90 ax:7ef4d0b6d020 si:ffffffffff600000 di:561c443cd263 [717249.927364] exe[839539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e647d8a378 cs:33 sp:7f5d9ac88f90 ax:7f5d9ac89020 si:ffffffffff600000 di:55e647e54263 [717845.248054] exe[793018] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [717957.521192] exe[346331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562864369506 cs:33 sp:7f851252a8e8 ax:ffffffffff600000 si:7f851252ae08 di:ffffffffff600000 [718586.935052] exe[944203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d3ed4a506 cs:33 sp:7f80c46e08e8 ax:ffffffffff600000 si:7f80c46e0e08 di:ffffffffff600000 [718674.706519] exe[911244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f920723506 cs:33 sp:7fd1965fe8e8 ax:ffffffffff600000 si:7fd1965fee08 di:ffffffffff600000 [719241.592529] exe[217961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde422378 cs:33 sp:7f84eed6df90 ax:7f84eed6e020 si:ffffffffff600000 di:559bde4ec263 [719348.880301] exe[162247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3ce292378 cs:33 sp:7fa259329f90 ax:7fa25932a020 si:ffffffffff600000 di:55b3ce35c263 [719944.215389] exe[225809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4079fd378 cs:33 sp:7efd7507df90 ax:7efd7507e020 si:ffffffffff600000 di:55c407ac7263 [720989.046374] exe[615436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56550b309378 cs:33 sp:7f548322df90 ax:7f548322e020 si:ffffffffff600000 di:56550b3d3263 [720989.301391] exe[528990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600470a6378 cs:33 sp:7fe7dab04f90 ax:7fe7dab05020 si:ffffffffff600000 di:560047170263 [722039.186901] exe[798467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3ce2e1506 cs:33 sp:7fa2593298e8 ax:ffffffffff600000 si:7fa259329e08 di:ffffffffff600000 [722039.768780] exe[437415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3ce2e1506 cs:33 sp:7fa2593298e8 ax:ffffffffff600000 si:7fa259329e08 di:ffffffffff600000 [722039.771199] exe[538773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3ce2e1506 cs:33 sp:7fa2593088e8 ax:ffffffffff600000 si:7fa259308e08 di:ffffffffff600000 [722039.963229] exe[437794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3ce2e1506 cs:33 sp:7fa2593088e8 ax:ffffffffff600000 si:7fa259308e08 di:ffffffffff600000 [729404.819132] exe[299937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df50ee0506 cs:33 sp:7ec1b4d8d8e8 ax:ffffffffff600000 si:7ec1b4d8de08 di:ffffffffff600000 [729405.614497] exe[300097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df50ee0506 cs:33 sp:7ec1b4d8d8e8 ax:ffffffffff600000 si:7ec1b4d8de08 di:ffffffffff600000 [729405.832592] exe[300146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df50ee0506 cs:33 sp:7ec1b4d8d8e8 ax:ffffffffff600000 si:7ec1b4d8de08 di:ffffffffff600000 [729405.888474] exe[300146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df50ee0506 cs:33 sp:7ec1b4d8d8e8 ax:ffffffffff600000 si:7ec1b4d8de08 di:ffffffffff600000 [729408.927014] exe[300746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729409.083834] exe[300775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729409.202178] exe[300802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729409.309897] exe[300825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729409.437952] exe[300855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729409.571158] exe[300878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638f45fc506 cs:33 sp:7ebf4acd28e8 ax:ffffffffff600000 si:7ebf4acd2e08 di:ffffffffff600000 [729669.903022] exe[967447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d72f551506 cs:33 sp:7faf588b18e8 ax:ffffffffff600000 si:7faf588b1e08 di:ffffffffff600000 [729670.300387] exe[969748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d72f551506 cs:33 sp:7faf588908e8 ax:ffffffffff600000 si:7faf58890e08 di:ffffffffff600000 [729670.763859] exe[966987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d72f551506 cs:33 sp:7faf588b18e8 ax:ffffffffff600000 si:7faf588b1e08 di:ffffffffff600000 [730585.264218] exe[515204] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [730585.733471] exe[517672] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [730586.310807] exe[514503] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [731667.781175] exe[384535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.185839] exe[670932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.490669] exe[384906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.515100] exe[384906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.541187] exe[384906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.570387] exe[385618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.661727] exe[387253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.748639] exe[387253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.772952] exe[387253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731668.808911] exe[387253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610c7ee8506 cs:33 sp:7f52f023d8e8 ax:ffffffffff600000 si:7f52f023de08 di:ffffffffff600000 [731732.389775] warn_bad_vsyscall: 25 callbacks suppressed [731732.389778] exe[474801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628d7646506 cs:33 sp:7fccfb0758e8 ax:ffffffffff600000 si:7fccfb075e08 di:ffffffffff600000 [731732.807273] exe[446272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628d7646506 cs:33 sp:7fccfb0758e8 ax:ffffffffff600000 si:7fccfb075e08 di:ffffffffff600000 [731733.090785] exe[691495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628d7646506 cs:33 sp:7fccfb0758e8 ax:ffffffffff600000 si:7fccfb075e08 di:ffffffffff600000 [731747.917422] exe[752016] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [731748.321650] exe[752481] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [731748.391722] exe[748434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [731748.607379] exe[752016] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [732476.917048] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564738e8 ax:ffffffffff600000 si:7fec56473e08 di:ffffffffff600000 [732477.311533] exe[361327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564738e8 ax:ffffffffff600000 si:7fec56473e08 di:ffffffffff600000 [732477.586523] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.620657] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.645814] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.672272] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.713412] exe[361070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.791312] exe[361070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.816413] exe[361070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732477.850610] exe[374070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b94b2f506 cs:33 sp:7fec564528e8 ax:ffffffffff600000 si:7fec56452e08 di:ffffffffff600000 [732791.357372] warn_bad_vsyscall: 25 callbacks suppressed [732791.357375] exe[447939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c993808506 cs:33 sp:7fec7e6f28e8 ax:ffffffffff600000 si:7fec7e6f2e08 di:ffffffffff600000 [732791.883739] exe[444328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c993808506 cs:33 sp:7fec7e6d18e8 ax:ffffffffff600000 si:7fec7e6d1e08 di:ffffffffff600000 [732792.489249] exe[437794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c993808506 cs:33 sp:7fec7e6d18e8 ax:ffffffffff600000 si:7fec7e6d1e08 di:ffffffffff600000 [733753.002545] exe[791211] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [733753.806505] exe[792944] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [733754.113995] exe[792944] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [733754.153456] exe[786321] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [734067.174246] exe[795888] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [734068.654737] exe[791160] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [734069.693572] exe[790539] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [734070.254000] exe[814457] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [735188.634177] exe[91834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647fd54a506 cs:33 sp:7f73075808e8 ax:ffffffffff600000 si:7f7307580e08 di:ffffffffff600000 [735189.237055] exe[89130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647fd54a506 cs:33 sp:7f73075808e8 ax:ffffffffff600000 si:7f7307580e08 di:ffffffffff600000 [735189.659978] exe[980091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647fd54a506 cs:33 sp:7f730755f8e8 ax:ffffffffff600000 si:7f730755fe08 di:ffffffffff600000 [735941.517055] exe[277944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df054b2506 cs:33 sp:7feb8d8ab8e8 ax:ffffffffff600000 si:7feb8d8abe08 di:ffffffffff600000 [735942.413191] exe[281355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df054b2506 cs:33 sp:7feb8d8ab8e8 ax:ffffffffff600000 si:7feb8d8abe08 di:ffffffffff600000 [735942.494034] exe[277845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df054b2506 cs:33 sp:7feb8d8ab8e8 ax:ffffffffff600000 si:7feb8d8abe08 di:ffffffffff600000 [737385.883938] exe[722265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd8bbf88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.415203] exe[717757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.445609] exe[625852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.483837] exe[626562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.510651] exe[625237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.541878] exe[625237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.574690] exe[625237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.600789] exe[625288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.654139] exe[625288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [737386.692821] exe[625288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316811e506 cs:33 sp:7fe9dd89af88 ax:ffffffffff600000 si:20002080 di:ffffffffff600000 [738561.972082] warn_bad_vsyscall: 77 callbacks suppressed [738561.972086] exe[892731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0c4ed3506 cs:33 sp:7eca95b7ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [738564.854635] exe[893085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0c4ed3506 cs:33 sp:7eca95b7ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [738567.891838] exe[893410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0c4ed3506 cs:33 sp:7eca95b7ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [738820.278155] exe[647316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e54c43d378 cs:33 sp:7fbff8b3af90 ax:7fbff8b3b020 si:ffffffffff600000 di:55e54c507263 [738820.813182] exe[711629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e54c43d378 cs:33 sp:7fbff8b3af90 ax:7fbff8b3b020 si:ffffffffff600000 di:55e54c507263 [738821.464289] exe[717017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e54c43d378 cs:33 sp:7fbff8b3af90 ax:7fbff8b3b020 si:ffffffffff600000 di:55e54c507263 [738821.467960] exe[763097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e54c43d378 cs:33 sp:7fbff8b19f90 ax:7fbff8b1a020 si:ffffffffff600000 di:55e54c507263 [740516.104130] device-mapper: uevent: version 1.0.3 [740516.112576] device-mapper: ioctl: 4.42.0-ioctl (2020-02-27) initialised: dm-devel@redhat.com [743556.090014] exe[924643] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743556.619596] exe[867159] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743557.131129] exe[925520] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743557.735354] exe[874371] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743558.219167] exe[869617] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743558.675301] exe[924643] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [743559.245184] exe[868545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [744968.881975] exe[925520] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [744969.367249] exe[978608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [744969.995040] exe[868404] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [744970.560468] exe[978608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [745934.989981] exe[434120] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745935.497873] exe[434120] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745935.803936] exe[461816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745936.417531] exe[432565] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745936.876404] exe[510064] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745937.428236] exe[436596] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [745937.889315] exe[516848] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [746444.916238] exe[606870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31a6b506 cs:33 sp:7f949917d8e8 ax:ffffffffff600000 si:7f949917de08 di:ffffffffff600000 [746445.123918] exe[608194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31a6b506 cs:33 sp:7f949917d8e8 ax:ffffffffff600000 si:7f949917de08 di:ffffffffff600000 [746445.304032] exe[607440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31a6b506 cs:33 sp:7f949917d8e8 ax:ffffffffff600000 si:7f949917de08 di:ffffffffff600000 [746445.435969] exe[578836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af31a6b506 cs:33 sp:7f949917d8e8 ax:ffffffffff600000 si:7f949917de08 di:ffffffffff600000 [746840.034604] exe[621575] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [746840.660914] exe[633338] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [746841.268288] exe[633338] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [746841.765496] exe[624209] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [747648.411692] exe[813138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bf87b3506 cs:33 sp:7f58296618e8 ax:ffffffffff600000 si:7f5829661e08 di:ffffffffff600000 [747648.545318] exe[628296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bf87b3506 cs:33 sp:7f58296618e8 ax:ffffffffff600000 si:7f5829661e08 di:ffffffffff600000 [747648.665741] exe[617800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bf87b3506 cs:33 sp:7f58296618e8 ax:ffffffffff600000 si:7f5829661e08 di:ffffffffff600000 [747648.980432] exe[628296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bf87b3506 cs:33 sp:7f58296618e8 ax:ffffffffff600000 si:7f5829661e08 di:ffffffffff600000 [747820.868625] exe[587459] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [747821.793761] exe[588499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [747822.592081] exe[588081] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [747823.385109] exe[588081] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [748341.399320] exe[616420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bcc714506 cs:33 sp:7f59eb06c8e8 ax:ffffffffff600000 si:7f59eb06ce08 di:ffffffffff600000 [748377.380251] exe[925880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a9394506 cs:33 sp:7f2c09d658e8 ax:ffffffffff600000 si:7f2c09d65e08 di:ffffffffff600000 [748377.794865] exe[925843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a9394506 cs:33 sp:7f2c09d658e8 ax:ffffffffff600000 si:7f2c09d65e08 di:ffffffffff600000 [748378.078262] exe[926003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a9394506 cs:33 sp:7f2c09d658e8 ax:ffffffffff600000 si:7f2c09d65e08 di:ffffffffff600000 [748378.338097] exe[938752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a9394506 cs:33 sp:7f2c09d658e8 ax:ffffffffff600000 si:7f2c09d65e08 di:ffffffffff600000 [748660.872118] exe[788538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559095c78506 cs:33 sp:7f48844988e8 ax:ffffffffff600000 si:7f4884498e08 di:ffffffffff600000 [748661.162671] exe[474557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559095c78506 cs:33 sp:7f48844988e8 ax:ffffffffff600000 si:7f4884498e08 di:ffffffffff600000 [748661.432538] exe[479244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559095c78506 cs:33 sp:7f48844988e8 ax:ffffffffff600000 si:7f4884498e08 di:ffffffffff600000 [748661.522498] exe[918344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e129367506 cs:33 sp:7fab416228e8 ax:ffffffffff600000 si:7fab41622e08 di:ffffffffff600000 [748661.711128] exe[474557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559095c78506 cs:33 sp:7f48844988e8 ax:ffffffffff600000 si:7f4884498e08 di:ffffffffff600000 [748661.777781] exe[537053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e129367506 cs:33 sp:7fab416228e8 ax:ffffffffff600000 si:7fab41622e08 di:ffffffffff600000 [748662.037302] exe[437037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e129367506 cs:33 sp:7fab416228e8 ax:ffffffffff600000 si:7fab41622e08 di:ffffffffff600000 [749202.785134] exe[76377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749202.905218] exe[64880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624defe6506 cs:33 sp:7f7afe77d8e8 ax:ffffffffff600000 si:7f7afe77de08 di:ffffffffff600000 [749203.324425] exe[89447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624defe6506 cs:33 sp:7f7afe77d8e8 ax:ffffffffff600000 si:7f7afe77de08 di:ffffffffff600000 [749203.707063] exe[88788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624defe6506 cs:33 sp:7f7afe77d8e8 ax:ffffffffff600000 si:7f7afe77de08 di:ffffffffff600000 [749204.109339] exe[68179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624defe6506 cs:33 sp:7f7afe77d8e8 ax:ffffffffff600000 si:7f7afe77de08 di:ffffffffff600000 [749301.126179] exe[553804] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749485.604074] exe[924476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd1588b506 cs:33 sp:7efd236a48e8 ax:ffffffffff600000 si:7efd236a4e08 di:ffffffffff600000 [749558.264892] exe[699783] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749559.032349] exe[698553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749559.742556] exe[128123] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749560.687382] exe[698553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [749664.469099] exe[652298] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [749702.829162] exe[165966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7665a506 cs:33 sp:7f567a09f8e8 ax:ffffffffff600000 si:7f567a09fe08 di:ffffffffff600000 [749937.206807] exe[196714] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [750148.748419] exe[57558] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [750328.603052] exe[348663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750329.236039] exe[348801] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750329.468975] exe[348860] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.195101] exe[348801] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.290521] exe[335066] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.364802] exe[348801] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.469298] exe[349117] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.596610] exe[335066] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.673046] exe[335066] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750330.765702] exe[334690] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [750575.548614] warn_bad_vsyscall: 4 callbacks suppressed [750575.548617] exe[403704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e504add506 cs:33 sp:7eebbfd208e8 ax:ffffffffff600000 si:7eebbfd20e08 di:ffffffffff600000 [750575.876696] exe[403772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e504add506 cs:33 sp:7eebbfd208e8 ax:ffffffffff600000 si:7eebbfd20e08 di:ffffffffff600000 [750576.118945] exe[403841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e504add506 cs:33 sp:7eebbfcff8e8 ax:ffffffffff600000 si:7eebbfcffe08 di:ffffffffff600000 [750618.882253] exe[413432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750618.986430] exe[413454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.099530] exe[413481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.203673] exe[413501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.364842] exe[413529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.510498] exe[413563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.709442] exe[413607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.864499] exe[413647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [750619.985212] exe[413672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb08d1e506 cs:33 sp:7ea01c8e08e8 ax:ffffffffff600000 si:7ea01c8e0e08 di:ffffffffff600000 [751084.077593] exe[494697] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [751403.468710] exe[144623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ba532f506 cs:33 sp:7f086f4db8e8 ax:ffffffffff600000 si:7f086f4dbe08 di:ffffffffff600000 [751658.849469] exe[134620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bcb5819506 cs:33 sp:7f10c8a2a8e8 ax:ffffffffff600000 si:7f10c8a2ae08 di:ffffffffff600000 [753697.693377] exe[68972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753700.438576] exe[69549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631458e8 ax:ffffffffff600000 si:7ef663145e08 di:ffffffffff600000 [753700.814115] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753700.866932] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753700.917071] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753700.964701] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753700.999314] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753701.037740] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753701.071969] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [753701.102747] exe[69618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ff130f506 cs:33 sp:7ef6631668e8 ax:ffffffffff600000 si:7ef663166e08 di:ffffffffff600000 [757151.881187] warn_bad_vsyscall: 26 callbacks suppressed [757151.881190] exe[780887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757152.036282] exe[780912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdddf90 ax:7eab6cdde020 si:ffffffffff600000 di:555d5e5ad263 [757152.202373] exe[780944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757168.711718] exe[784557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757168.819408] exe[784595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757168.974125] exe[784625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.101477] exe[784652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.237193] exe[784677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.552676] exe[784710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.707133] exe[784772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.853495] exe[784805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757169.969440] exe[784836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757170.136962] exe[784860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e4e3378 cs:33 sp:7eab6cdfef90 ax:7eab6cdff020 si:ffffffffff600000 di:555d5e5ad263 [757386.647785] warn_bad_vsyscall: 20 callbacks suppressed [757386.647788] exe[798495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4df8af378 cs:33 sp:7f0db2422f90 ax:7f0db2423020 si:ffffffffff600000 di:55c4df979263 [757413.030186] exe[840048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c289c43378 cs:33 sp:7ee9871faf90 ax:7ee9871fb020 si:ffffffffff600000 di:55c289d0d263 [757415.316542] exe[276519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b6cfd2378 cs:33 sp:7f7b6f69af90 ax:7f7b6f69b020 si:ffffffffff600000 di:556b6d09c263 [757473.530571] exe[671020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f71a0378 cs:33 sp:7f9a5e700f90 ax:7f9a5e701020 si:ffffffffff600000 di:55a7f726a263 [757534.854475] exe[853140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d4d8e8 ax:ffffffffff600000 si:7f4850d4de08 di:ffffffffff600000 [757535.553238] exe[853073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.208183] exe[601054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.267291] exe[693066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.310262] exe[693066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.346182] exe[606733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.376058] exe[606733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.411326] exe[606733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.458993] exe[606733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757536.502984] exe[606733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dfe191506 cs:33 sp:7f4850d2c8e8 ax:ffffffffff600000 si:7f4850d2ce08 di:ffffffffff600000 [757585.261206] warn_bad_vsyscall: 24 callbacks suppressed [757585.261209] exe[879454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560969eca378 cs:33 sp:7ed8d1958f90 ax:7ed8d1959020 si:ffffffffff600000 di:560969f94263 [757797.832467] exe[357185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55849ff4e378 cs:33 sp:7fab6adcff90 ax:7fab6add0020 si:ffffffffff600000 di:5584a0018263 [757962.298743] exe[767558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602e3493378 cs:33 sp:7f5b43cc1f90 ax:7f5b43cc2020 si:ffffffffff600000 di:5602e355d263 [758043.638321] exe[870378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555f3ca9378 cs:33 sp:7f7c25c7ef90 ax:7f7c25c7f020 si:ffffffffff600000 di:5555f3d73263 [758065.598719] exe[859957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dddb3378 cs:33 sp:7f7f263d7f90 ax:7f7f263d8020 si:ffffffffff600000 di:5643dde7d263 [758551.715434] exe[92850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758551.860840] exe[92878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758552.003497] exe[92905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758552.026882] exe[92905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758555.614924] exe[93811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758555.835230] exe[93869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758556.091656] exe[93945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758556.272875] exe[93986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758556.519991] exe[94054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758556.716110] exe[94110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758556.890524] exe[94162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758557.041979] exe[94199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [758557.274644] exe[94269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d5e532506 cs:33 sp:7eab6cdfe8e8 ax:ffffffffff600000 si:7eab6cdfee08 di:ffffffffff600000 [759392.544443] exe[257921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac02f13378 cs:33 sp:7f787cffef90 ax:7f787cfff020 si:ffffffffff600000 di:55ac02fdd263 [759405.593414] exe[280251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [759407.577194] exe[280759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69b6a8e8 ax:ffffffffff600000 si:7eae69b6ae08 di:ffffffffff600000 [760642.901937] exe[555921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.051871] exe[555964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd2e38e8 ax:ffffffffff600000 si:7eacfd2e3e08 di:ffffffffff600000 [760643.490057] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.522741] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.548193] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.569258] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.593820] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.620955] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.642599] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [760643.665242] exe[556054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [761998.940212] warn_bad_vsyscall: 8 callbacks suppressed [761998.940216] exe[862808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [761999.125914] exe[862849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [761999.153011] exe[862852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69b8b8e8 ax:ffffffffff600000 si:7eae69b8be08 di:ffffffffff600000 [761999.302132] exe[862886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [762471.962591] exe[973401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [762472.283036] exe[973461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [762472.447240] exe[973504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd39921506 cs:33 sp:7eacfd3258e8 ax:ffffffffff600000 si:7eacfd325e08 di:ffffffffff600000 [762716.223767] exe[26472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [762716.379986] exe[26516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [762716.404856] exe[26516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [762716.518279] exe[26552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2ca2ec506 cs:33 sp:7eae69bac8e8 ax:ffffffffff600000 si:7eae69bace08 di:ffffffffff600000 [764528.770567] exe[133962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563471c94378 cs:33 sp:7f34c213bf90 ax:7f34c213c020 si:ffffffffff600000 di:563471d5e263 [764529.495807] exe[46093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563471c94378 cs:33 sp:7f34c20f9f90 ax:7f34c20fa020 si:ffffffffff600000 di:563471d5e263 [764530.617705] exe[817573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563471c94378 cs:33 sp:7f34c213bf90 ax:7f34c213c020 si:ffffffffff600000 di:563471d5e263 [767565.783980] exe[909020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81553506 cs:33 sp:7f970feb5f88 ax:ffffffffff600000 si:20004900 di:ffffffffff600000 [767566.712760] exe[805692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81553506 cs:33 sp:7f970feb6f88 ax:ffffffffff600000 si:20004900 di:ffffffffff600000 [767567.792403] exe[817418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81553506 cs:33 sp:7f970fe52f88 ax:ffffffffff600000 si:20004900 di:ffffffffff600000 [768338.256247] exe[503571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d859d76506 cs:33 sp:7f1dce9738e8 ax:ffffffffff600000 si:7f1dce973e08 di:ffffffffff600000 [768338.795397] exe[558869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d859d76506 cs:33 sp:7f1dce9738e8 ax:ffffffffff600000 si:7f1dce973e08 di:ffffffffff600000 [768339.119822] exe[558517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d859d76506 cs:33 sp:7f1dce9738e8 ax:ffffffffff600000 si:7f1dce973e08 di:ffffffffff600000 [768339.138196] exe[502986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d859d76506 cs:33 sp:7f1dce9528e8 ax:ffffffffff600000 si:7f1dce952e08 di:ffffffffff600000 [768939.482174] exe[675344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c89df2d506 cs:33 sp:7f070f67a8e8 ax:ffffffffff600000 si:7f070f67ae08 di:ffffffffff600000 [768939.837958] exe[672711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c89df2d506 cs:33 sp:7f070f67a8e8 ax:ffffffffff600000 si:7f070f67ae08 di:ffffffffff600000 [768940.122907] exe[88966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c89df2d506 cs:33 sp:7f070f67a8e8 ax:ffffffffff600000 si:7f070f67ae08 di:ffffffffff600000 [770550.568842] exe[251611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556093a86506 cs:33 sp:7f2e9623a8e8 ax:ffffffffff600000 si:7f2e9623ae08 di:ffffffffff600000 [770551.021503] exe[251323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556093a86506 cs:33 sp:7f2e95ddd8e8 ax:ffffffffff600000 si:7f2e95ddde08 di:ffffffffff600000 [770551.459018] exe[251721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556093a86506 cs:33 sp:7f2e95ddd8e8 ax:ffffffffff600000 si:7f2e95ddde08 di:ffffffffff600000 [770700.342444] exe[88941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0d9261506 cs:33 sp:7f3dd6cab8e8 ax:ffffffffff600000 si:7f3dd6cabe08 di:ffffffffff600000 [770701.430082] exe[447465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0d9261506 cs:33 sp:7f3dd6cab8e8 ax:ffffffffff600000 si:7f3dd6cabe08 di:ffffffffff600000 [770702.097305] exe[427565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0d9261506 cs:33 sp:7f3dd6c8a8e8 ax:ffffffffff600000 si:7f3dd6c8ae08 di:ffffffffff600000 [770702.102259] exe[429771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0d9261506 cs:33 sp:7f3dd6cab8e8 ax:ffffffffff600000 si:7f3dd6cabe08 di:ffffffffff600000 [771945.433928] exe[260258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c511ab1378 cs:33 sp:7f37fb773f90 ax:7f37fb774020 si:ffffffffff600000 di:55c511b7b263 [771945.882186] exe[315713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c511ab1378 cs:33 sp:7f37fb773f90 ax:7f37fb774020 si:ffffffffff600000 di:55c511b7b263 [771946.148007] exe[334007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c511ab1378 cs:33 sp:7f37fb752f90 ax:7f37fb753020 si:ffffffffff600000 di:55c511b7b263 [771946.148096] exe[315713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c511ab1378 cs:33 sp:7f37fb773f90 ax:7f37fb774020 si:ffffffffff600000 di:55c511b7b263 [777035.744506] exe[945645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [777036.469277] exe[946391] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [777036.930148] exe[927571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [777218.969631] exe[666019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619c544b506 cs:33 sp:7f00d1c9b8e8 ax:ffffffffff600000 si:7f00d1c9be08 di:ffffffffff600000 [777219.622579] exe[917385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619c544b506 cs:33 sp:7f00d1c9b8e8 ax:ffffffffff600000 si:7f00d1c9be08 di:ffffffffff600000 [777219.666295] exe[584506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619c544b506 cs:33 sp:7f00d1c9b8e8 ax:ffffffffff600000 si:7f00d1c9be08 di:ffffffffff600000 [777220.093903] exe[872215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619c544b506 cs:33 sp:7f00d1c9b8e8 ax:ffffffffff600000 si:7f00d1c9be08 di:ffffffffff600000 [777222.572826] exe[693115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f898f50506 cs:33 sp:7f6b75dfe8e8 ax:ffffffffff600000 si:7f6b75dfee08 di:ffffffffff600000 [777222.879806] exe[881057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f898f50506 cs:33 sp:7f6b75dbc8e8 ax:ffffffffff600000 si:7f6b75dbce08 di:ffffffffff600000 [777223.300610] exe[584609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f898f50506 cs:33 sp:7f6b75dfe8e8 ax:ffffffffff600000 si:7f6b75dfee08 di:ffffffffff600000 [783168.620288] exe[71011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c09e6506 cs:33 sp:7ffbc08ef8e8 ax:ffffffffff600000 si:7ffbc08efe08 di:ffffffffff600000 [783169.043314] exe[70952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c09e6506 cs:33 sp:7ffbc08ce8e8 ax:ffffffffff600000 si:7ffbc08cee08 di:ffffffffff600000 [783169.551026] exe[70858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c09e6506 cs:33 sp:7ffbc08ef8e8 ax:ffffffffff600000 si:7ffbc08efe08 di:ffffffffff600000 [783169.589551] exe[73268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c09e6506 cs:33 sp:7ffbc08ad8e8 ax:ffffffffff600000 si:7ffbc08ade08 di:ffffffffff600000 [783230.243685] exe[183645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.332038] exe[70769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.401604] exe[72624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.633215] exe[71115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.763835] exe[73268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.883148] exe[83161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783230.985183] exe[83161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783231.705146] exe[72624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783231.959545] exe[183736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [783232.158473] exe[71115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565313eb4506 cs:33 sp:7f8faa07e8e8 ax:ffffffffff600000 si:7f8faa07ee08 di:ffffffffff600000 [784842.777567] exe[574183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f924bab506 cs:33 sp:7f111c6628e8 ax:ffffffffff600000 si:7f111c662e08 di:ffffffffff600000 [784843.066846] exe[637073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f924bab506 cs:33 sp:7f111c6628e8 ax:ffffffffff600000 si:7f111c662e08 di:ffffffffff600000 [784843.292705] exe[601942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f924bab506 cs:33 sp:7f111c6628e8 ax:ffffffffff600000 si:7f111c662e08 di:ffffffffff600000 [784843.603455] exe[636977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f924bab506 cs:33 sp:7f111c6628e8 ax:ffffffffff600000 si:7f111c662e08 di:ffffffffff600000 [784850.150405] exe[677286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dd6ba506 cs:33 sp:7f2057bae8e8 ax:ffffffffff600000 si:7f2057baee08 di:ffffffffff600000 [784850.861756] exe[645501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dd6ba506 cs:33 sp:7f2057bae8e8 ax:ffffffffff600000 si:7f2057baee08 di:ffffffffff600000 [784851.074597] exe[636617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dd6ba506 cs:33 sp:7f2057bae8e8 ax:ffffffffff600000 si:7f2057baee08 di:ffffffffff600000 [784851.726732] exe[636647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dd6ba506 cs:33 sp:7f2057bae8e8 ax:ffffffffff600000 si:7f2057baee08 di:ffffffffff600000 [784927.959061] exe[590980] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784928.353169] exe[597101] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784928.817228] exe[599819] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784929.241443] exe[596531] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784929.899340] exe[599466] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784930.479000] exe[595521] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [784930.952461] exe[664294] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [786686.344236] exe[928943] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786687.027456] exe[622143] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786687.674676] exe[621474] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786688.544671] exe[929319] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786689.505231] exe[928943] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786690.148583] exe[621868] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [786691.135045] exe[644909] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [787775.942373] exe[927760] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [787776.594675] exe[713300] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [787777.338935] exe[927378] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [787778.025452] exe[927760] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [787968.874208] exe[199755] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [787969.443450] exe[984086] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [787970.010710] exe[984086] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [787970.583057] exe[199755] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [788512.322509] exe[422263] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [788512.765645] exe[416519] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [788513.254720] exe[458512] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [788513.824779] exe[423857] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [788766.411838] exe[632802] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [788766.964434] exe[632939] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [788767.422132] exe[633022] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [788767.873921] exe[633116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [789008.854928] exe[416342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562e5557506 cs:33 sp:7f038e7df8e8 ax:ffffffffff600000 si:7f038e7dfe08 di:ffffffffff600000 [789009.213778] exe[440928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562e5557506 cs:33 sp:7f038e7df8e8 ax:ffffffffff600000 si:7f038e7dfe08 di:ffffffffff600000 [789009.562001] exe[652568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562e5557506 cs:33 sp:7f038e7df8e8 ax:ffffffffff600000 si:7f038e7dfe08 di:ffffffffff600000 [789010.147744] exe[652935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562e5557506 cs:33 sp:7f038e7df8e8 ax:ffffffffff600000 si:7f038e7dfe08 di:ffffffffff600000 [789596.332345] exe[398755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f44f2c5506 cs:33 sp:7f220c31c8e8 ax:ffffffffff600000 si:7f220c31ce08 di:ffffffffff600000 [789825.285815] exe[647838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e24901506 cs:33 sp:7f6d8dedf8e8 ax:ffffffffff600000 si:7f6d8dedfe08 di:ffffffffff600000 [789825.438394] exe[647838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e24901506 cs:33 sp:7f6d8dedf8e8 ax:ffffffffff600000 si:7f6d8dedfe08 di:ffffffffff600000 [789825.660813] exe[496477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e24901506 cs:33 sp:7f6d8dedf8e8 ax:ffffffffff600000 si:7f6d8dedfe08 di:ffffffffff600000 [789825.842863] exe[439480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e24901506 cs:33 sp:7f6d8dedf8e8 ax:ffffffffff600000 si:7f6d8dedfe08 di:ffffffffff600000 [790128.802458] exe[397398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56346ff09506 cs:33 sp:7f7da8e9b8e8 ax:ffffffffff600000 si:7f7da8e9be08 di:ffffffffff600000 [790446.114348] exe[597687] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [791913.796238] exe[359239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598ac681506 cs:33 sp:7fd1deb388e8 ax:ffffffffff600000 si:7fd1deb38e08 di:ffffffffff600000 [791913.935367] exe[360364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598ac681506 cs:33 sp:7fd1deb388e8 ax:ffffffffff600000 si:7fd1deb38e08 di:ffffffffff600000 [791914.149530] exe[360376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598ac681506 cs:33 sp:7fd1deb388e8 ax:ffffffffff600000 si:7fd1deb38e08 di:ffffffffff600000 [791914.384466] exe[359337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598ac681506 cs:33 sp:7fd1deb388e8 ax:ffffffffff600000 si:7fd1deb38e08 di:ffffffffff600000 [791960.695649] exe[303386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645d57a0506 cs:33 sp:7f80e44b28e8 ax:ffffffffff600000 si:7f80e44b2e08 di:ffffffffff600000 [791961.048610] exe[325362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645d57a0506 cs:33 sp:7f80e44b28e8 ax:ffffffffff600000 si:7f80e44b2e08 di:ffffffffff600000 [791961.117669] exe[403295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f24d9c506 cs:33 sp:7f900a6d08e8 ax:ffffffffff600000 si:7f900a6d0e08 di:ffffffffff600000 [791961.213042] exe[303253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645d57a0506 cs:33 sp:7f80e44b28e8 ax:ffffffffff600000 si:7f80e44b2e08 di:ffffffffff600000 [791961.310459] exe[302842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f24d9c506 cs:33 sp:7f900a6d08e8 ax:ffffffffff600000 si:7f900a6d0e08 di:ffffffffff600000 [791961.413369] exe[316577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645d57a0506 cs:33 sp:7f80e44b28e8 ax:ffffffffff600000 si:7f80e44b2e08 di:ffffffffff600000 [791961.565505] exe[347282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f24d9c506 cs:33 sp:7f900a6d08e8 ax:ffffffffff600000 si:7f900a6d0e08 di:ffffffffff600000 [792035.992397] exe[456865] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792036.403500] exe[456865] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792036.824957] exe[416171] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792037.255601] exe[457175] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792037.749418] exe[457175] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792038.280036] exe[416651] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [792038.718500] exe[457576] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [793765.950708] exe[871258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793766.593385] exe[872334] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793767.157829] exe[871426] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793767.929926] exe[872334] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793768.647573] exe[864623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793769.248520] exe[864720] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793769.922604] exe[872334] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [793825.493499] exe[762643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560868abb506 cs:33 sp:7fadbd7ef8e8 ax:ffffffffff600000 si:7fadbd7efe08 di:ffffffffff600000 [793825.822322] exe[750137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560868abb506 cs:33 sp:7fadbd7ef8e8 ax:ffffffffff600000 si:7fadbd7efe08 di:ffffffffff600000 [793826.014714] exe[750137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b69152506 cs:33 sp:7f846b29d8e8 ax:ffffffffff600000 si:7f846b29de08 di:ffffffffff600000 [793826.044875] exe[798933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560868abb506 cs:33 sp:7fadbd7ef8e8 ax:ffffffffff600000 si:7fadbd7efe08 di:ffffffffff600000 [793826.231987] exe[496734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b69152506 cs:33 sp:7f846b29d8e8 ax:ffffffffff600000 si:7f846b29de08 di:ffffffffff600000 [793826.339726] exe[762722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560868abb506 cs:33 sp:7fadbd7ef8e8 ax:ffffffffff600000 si:7fadbd7efe08 di:ffffffffff600000 [793826.525216] exe[496552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b69152506 cs:33 sp:7f846b29d8e8 ax:ffffffffff600000 si:7f846b29de08 di:ffffffffff600000 [793826.619108] exe[496474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55717a898506 cs:33 sp:7f52ba8ce8e8 ax:ffffffffff600000 si:7f52ba8cee08 di:ffffffffff600000 [793826.672505] exe[762928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560868abb506 cs:33 sp:7fadbd7ef8e8 ax:ffffffffff600000 si:7fadbd7efe08 di:ffffffffff600000 [793826.920428] exe[496952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55717a898506 cs:33 sp:7f52ba8ce8e8 ax:ffffffffff600000 si:7f52ba8cee08 di:ffffffffff600000 [794980.012146] warn_bad_vsyscall: 3 callbacks suppressed [794980.012150] exe[638511] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [794980.688422] exe[632568] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [794981.289370] exe[634029] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [794982.110271] exe[638812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [795000.910037] exe[667097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795001.469580] exe[667097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795002.131161] exe[666326] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795002.674155] exe[159846] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795544.793705] exe[66194] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795545.483732] exe[195629] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795546.103356] exe[377457] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795546.601744] exe[66194] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [795778.313824] exe[342675] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [795778.882611] exe[339113] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [795779.398481] exe[342950] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [795780.104429] exe[343124] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [795780.429394] exe[335505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559270f82506 cs:33 sp:7f1f470538e8 ax:ffffffffff600000 si:7f1f47053e08 di:ffffffffff600000 [795780.668900] exe[269210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559270f82506 cs:33 sp:7f1f470538e8 ax:ffffffffff600000 si:7f1f47053e08 di:ffffffffff600000 [795780.813342] exe[335480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559270f82506 cs:33 sp:7f1f470538e8 ax:ffffffffff600000 si:7f1f47053e08 di:ffffffffff600000 [795780.948648] exe[269863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559270f82506 cs:33 sp:7f1f470538e8 ax:ffffffffff600000 si:7f1f47053e08 di:ffffffffff600000 [796424.593213] exe[434633] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [796474.427483] exe[985275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [796610.227795] exe[307649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56497e54b506 cs:33 sp:7f8412c538e8 ax:ffffffffff600000 si:7f8412c53e08 di:ffffffffff600000 [796726.834051] exe[397416] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [796808.822601] exe[549378] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [797583.936656] exe[428816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559270f82506 cs:33 sp:7f1f470538e8 ax:ffffffffff600000 si:7f1f47053e08 di:ffffffffff600000 [797657.280077] exe[359308] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [797950.969377] exe[814115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9cf561506 cs:33 sp:7fd9f759e8e8 ax:ffffffffff600000 si:7fd9f759ee08 di:ffffffffff600000 [797951.233493] exe[814115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9cf561506 cs:33 sp:7fd9f759e8e8 ax:ffffffffff600000 si:7fd9f759ee08 di:ffffffffff600000 [797952.228206] exe[268047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9cf561506 cs:33 sp:7fd9f759e8e8 ax:ffffffffff600000 si:7fd9f759ee08 di:ffffffffff600000 [797953.015463] exe[254415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9cf561506 cs:33 sp:7fd9f759e8e8 ax:ffffffffff600000 si:7fd9f759ee08 di:ffffffffff600000 [798319.105360] exe[686136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeaeaa8506 cs:33 sp:7f43d230b8e8 ax:ffffffffff600000 si:7f43d230be08 di:ffffffffff600000 [798319.500692] exe[707675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeaeaa8506 cs:33 sp:7f43d230b8e8 ax:ffffffffff600000 si:7f43d230be08 di:ffffffffff600000 [798319.951764] exe[424592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeaeaa8506 cs:33 sp:7f43d230b8e8 ax:ffffffffff600000 si:7f43d230be08 di:ffffffffff600000 [798320.565546] exe[701808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeaeaa8506 cs:33 sp:7f43d230b8e8 ax:ffffffffff600000 si:7f43d230be08 di:ffffffffff600000 [798438.837776] exe[437657] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [798575.498632] exe[985151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06d5fb506 cs:33 sp:7eb71da1f8e8 ax:ffffffffff600000 si:7eb71da1fe08 di:ffffffffff600000 [798575.837906] exe[985236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06d5fb506 cs:33 sp:7eb71da1f8e8 ax:ffffffffff600000 si:7eb71da1fe08 di:ffffffffff600000 [798576.294909] exe[985339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06d5fb506 cs:33 sp:7eb71da1f8e8 ax:ffffffffff600000 si:7eb71da1fe08 di:ffffffffff600000 [799883.234958] exe[195140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c120347506 cs:33 sp:7efde849f8e8 ax:ffffffffff600000 si:7efde849fe08 di:ffffffffff600000 [799928.417865] exe[226795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c1ca49506 cs:33 sp:7f79313a58e8 ax:ffffffffff600000 si:7f79313a5e08 di:ffffffffff600000 [800504.529597] exe[147502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffee82e506 cs:33 sp:7fb9fa5fe8e8 ax:ffffffffff600000 si:7fb9fa5fee08 di:ffffffffff600000 [804043.561520] exe[178467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c73caf3506 cs:33 sp:7f1bb42f98e8 ax:ffffffffff600000 si:7f1bb42f9e08 di:ffffffffff600000 [804043.889387] exe[250832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c73caf3506 cs:33 sp:7f1bb42f98e8 ax:ffffffffff600000 si:7f1bb42f9e08 di:ffffffffff600000 [804044.408012] exe[167036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c73caf3506 cs:33 sp:7f1bb42f98e8 ax:ffffffffff600000 si:7f1bb42f9e08 di:ffffffffff600000 [804044.500075] exe[167497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c73caf3506 cs:33 sp:7f1bb42d88e8 ax:ffffffffff600000 si:7f1bb42d8e08 di:ffffffffff600000 [809355.054326] exe[544865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc1cf67506 cs:33 sp:7ec580ed08e8 ax:ffffffffff600000 si:7ec580ed0e08 di:ffffffffff600000 [809355.157081] exe[544882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc1cf67506 cs:33 sp:7ec580ed08e8 ax:ffffffffff600000 si:7ec580ed0e08 di:ffffffffff600000 [809355.277045] exe[544904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc1cf67506 cs:33 sp:7ec580ed08e8 ax:ffffffffff600000 si:7ec580ed0e08 di:ffffffffff600000 [812046.668148] exe[939436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812047.080251] exe[939436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecba78e8 ax:ffffffffff600000 si:7f4eecba7e08 di:ffffffffff600000 [812047.278707] exe[939611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecba78e8 ax:ffffffffff600000 si:7f4eecba7e08 di:ffffffffff600000 [812111.487777] exe[941633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812111.698603] exe[941633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812112.357961] exe[939447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812112.566751] exe[939434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812112.832069] exe[939434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812113.233785] exe[939611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [812754.925277] exe[25370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f205e00378 cs:33 sp:7fe0e1ab1f90 ax:7fe0e1ab2020 si:ffffffffff600000 di:55f205eca263 [812755.634341] exe[59234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f205e00378 cs:33 sp:7fe0e1ab1f90 ax:7fe0e1ab2020 si:ffffffffff600000 di:55f205eca263 [812756.809845] exe[221582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f205e00378 cs:33 sp:7fe0e1a90f90 ax:7fe0e1a91020 si:ffffffffff600000 di:55f205eca263 [812756.866805] exe[27430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d90130378 cs:33 sp:7f0210126f90 ax:7f0210127020 si:ffffffffff600000 di:561d901fa263 [813362.305508] exe[291754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [813362.605402] exe[365161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [813362.982581] exe[293385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56474ea53506 cs:33 sp:7f4eecbc88e8 ax:ffffffffff600000 si:7f4eecbc8e08 di:ffffffffff600000 [816161.112296] exe[404105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569033b8e8 ax:ffffffffff600000 si:7f569033be08 di:ffffffffff600000 [816161.294806] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.322380] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.352420] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.395849] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.428208] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.464095] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.502817] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.531232] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [816161.567306] exe[407422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56316366f506 cs:33 sp:7f569031a8e8 ax:ffffffffff600000 si:7f569031ae08 di:ffffffffff600000 [817226.222732] warn_bad_vsyscall: 26 callbacks suppressed [817226.222735] exe[39481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126edb1378 cs:33 sp:7fb904739f90 ax:7fb90473a020 si:ffffffffff600000 di:56126ee7b263 [817226.620255] exe[996244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126edb1378 cs:33 sp:7fb904718f90 ax:7fb904719020 si:ffffffffff600000 di:56126ee7b263 [817227.009250] exe[39461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126edb1378 cs:33 sp:7fb904718f90 ax:7fb904719020 si:ffffffffff600000 di:56126ee7b263 [817244.254933] exe[34769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817244.443875] exe[996300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817244.768760] exe[247447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817245.245836] exe[39477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817245.571635] exe[39477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817245.720542] exe[32836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817245.841961] exe[34773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817245.901122] exe[30289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817246.001559] exe[229763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [817246.096040] exe[32938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [818242.421664] warn_bad_vsyscall: 11 callbacks suppressed [818242.421667] exe[967239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [818242.696229] exe[30511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [818242.871589] exe[367365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708895d378 cs:33 sp:7fe8a4d66f90 ax:7fe8a4d67020 si:ffffffffff600000 di:557088a27263 [818308.118922] exe[484062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.254124] exe[484087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.294242] exe[484094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1ccff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.499153] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.533582] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.565990] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.599193] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.635762] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.665665] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818308.701648] exe[484124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be2cf19506 cs:33 sp:7eeca1cf0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [818849.312283] warn_bad_vsyscall: 50 callbacks suppressed [818849.312286] exe[899085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55634cb23506 cs:33 sp:7f3ab99e78e8 ax:ffffffffff600000 si:7f3ab99e7e08 di:ffffffffff600000 [818850.037125] exe[899078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55634cb23506 cs:33 sp:7f3ab99c68e8 ax:ffffffffff600000 si:7f3ab99c6e08 di:ffffffffff600000 [818850.053897] exe[878021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b336fd506 cs:33 sp:7f39a81178e8 ax:ffffffffff600000 si:7f39a8117e08 di:ffffffffff600000 [818850.627076] exe[899078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55634cb23506 cs:33 sp:7f3ab99e78e8 ax:ffffffffff600000 si:7f3ab99e7e08 di:ffffffffff600000 [824408.363855] exe[699089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a914a506 cs:33 sp:7fbfdcfb68e8 ax:ffffffffff600000 si:7fbfdcfb6e08 di:ffffffffff600000 [824408.799232] exe[694550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a914a506 cs:33 sp:7fbfdcfb68e8 ax:ffffffffff600000 si:7fbfdcfb6e08 di:ffffffffff600000 [824408.800166] exe[694692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a914a506 cs:33 sp:7fbfdcf958e8 ax:ffffffffff600000 si:7fbfdcf95e08 di:ffffffffff600000 [824409.463133] exe[722592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a914a506 cs:33 sp:7fbfdcfb68e8 ax:ffffffffff600000 si:7fbfdcfb6e08 di:ffffffffff600000 [827087.334710] exe[359393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827087.951416] exe[351220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.176284] exe[343579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.554328] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.578036] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.607882] exe[509188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d4970a506 cs:33 sp:7f76325c18e8 ax:ffffffffff600000 si:7f76325c1e08 di:ffffffffff600000 [827088.610188] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.650905] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.680339] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [827088.715949] exe[351365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603fd3fb506 cs:33 sp:7f372f44b8e8 ax:ffffffffff600000 si:7f372f44be08 di:ffffffffff600000 [828320.589652] warn_bad_vsyscall: 59 callbacks suppressed [828320.589654] exe[829154] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828321.059734] exe[774718] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828321.564654] exe[771731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828321.939469] exe[809737] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828322.470429] exe[771737] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828322.916539] exe[771731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828323.414987] exe[771731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [828326.436189] exe[717610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ead8b506 cs:33 sp:7fae49bf48e8 ax:ffffffffff600000 si:7fae49bf4e08 di:ffffffffff600000 [828326.672914] exe[713632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ead8b506 cs:33 sp:7fae49bf48e8 ax:ffffffffff600000 si:7fae49bf4e08 di:ffffffffff600000 [828326.777148] exe[717731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e889d6506 cs:33 sp:7f64033768e8 ax:ffffffffff600000 si:7f6403376e08 di:ffffffffff600000 [828326.889480] exe[714160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c7a19b506 cs:33 sp:7f77179d68e8 ax:ffffffffff600000 si:7f77179d6e08 di:ffffffffff600000 [828326.918938] exe[782446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ead8b506 cs:33 sp:7fae49bf48e8 ax:ffffffffff600000 si:7fae49bf4e08 di:ffffffffff600000 [828326.977278] exe[705199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f122e12506 cs:33 sp:7fb8bcb608e8 ax:ffffffffff600000 si:7fb8bcb60e08 di:ffffffffff600000 [828327.013573] exe[714281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e889d6506 cs:33 sp:7f64033768e8 ax:ffffffffff600000 si:7f6403376e08 di:ffffffffff600000 [828327.099204] exe[713745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c7a19b506 cs:33 sp:7f77179d68e8 ax:ffffffffff600000 si:7f77179d6e08 di:ffffffffff600000 [828327.134066] exe[717610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ead8b506 cs:33 sp:7fae49bf48e8 ax:ffffffffff600000 si:7fae49bf4e08 di:ffffffffff600000 [828327.151030] exe[713632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f122e12506 cs:33 sp:7fb8bcb608e8 ax:ffffffffff600000 si:7fb8bcb60e08 di:ffffffffff600000 [829757.699114] warn_bad_vsyscall: 3 callbacks suppressed [829757.699118] exe[798342] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [829758.324271] exe[928702] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [829758.949255] exe[798228] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [829759.420135] exe[190077] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [829861.929943] exe[163532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56226b4e6506 cs:33 sp:7fd8fd3b48e8 ax:ffffffffff600000 si:7fd8fd3b4e08 di:ffffffffff600000 [829864.165185] exe[170430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56226b4e6506 cs:33 sp:7fd8fd3b48e8 ax:ffffffffff600000 si:7fd8fd3b4e08 di:ffffffffff600000 [829864.350865] exe[163568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56226b4e6506 cs:33 sp:7fd8fd3b48e8 ax:ffffffffff600000 si:7fd8fd3b4e08 di:ffffffffff600000 [829864.537823] exe[162360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56226b4e6506 cs:33 sp:7fd8fd3b48e8 ax:ffffffffff600000 si:7fd8fd3b4e08 di:ffffffffff600000 [830112.753060] exe[999239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [830113.177383] exe[140528] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [830113.784433] exe[999239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [830114.338249] exe[1254] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [830952.489577] exe[456631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd636f7506 cs:33 sp:7ee0a70568e8 ax:ffffffffff600000 si:7ee0a7056e08 di:ffffffffff600000 [830952.627008] exe[456659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd636f7506 cs:33 sp:7ee0a70568e8 ax:ffffffffff600000 si:7ee0a7056e08 di:ffffffffff600000 [830952.849240] exe[456696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd636f7506 cs:33 sp:7ee0a70568e8 ax:ffffffffff600000 si:7ee0a7056e08 di:ffffffffff600000 [831751.466513] exe[538903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b8ea8506 cs:33 sp:7f7445e878e8 ax:ffffffffff600000 si:7f7445e87e08 di:ffffffffff600000 [831752.238017] exe[539424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b8ea8506 cs:33 sp:7f7445e878e8 ax:ffffffffff600000 si:7f7445e87e08 di:ffffffffff600000 [831752.599754] exe[538903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b8ea8506 cs:33 sp:7f7445e878e8 ax:ffffffffff600000 si:7f7445e87e08 di:ffffffffff600000 [831753.198274] exe[574755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b8ea8506 cs:33 sp:7f7445e878e8 ax:ffffffffff600000 si:7f7445e87e08 di:ffffffffff600000 [832394.107777] exe[566826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd62956506 cs:33 sp:7fdaa20638e8 ax:ffffffffff600000 si:7fdaa2063e08 di:ffffffffff600000 [832394.621610] exe[577732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd62956506 cs:33 sp:7fdaa20638e8 ax:ffffffffff600000 si:7fdaa2063e08 di:ffffffffff600000 [832394.940021] exe[577735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd62956506 cs:33 sp:7fdaa20638e8 ax:ffffffffff600000 si:7fdaa2063e08 di:ffffffffff600000 [832395.201284] exe[628789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd62956506 cs:33 sp:7fdaa20638e8 ax:ffffffffff600000 si:7fdaa2063e08 di:ffffffffff600000 [832520.601713] exe[825958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91498e8 ax:ffffffffff600000 si:7ee4b9149e08 di:ffffffffff600000 [832520.880075] exe[581848] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [832521.377447] exe[826112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91288e8 ax:ffffffffff600000 si:7ee4b9128e08 di:ffffffffff600000 [832521.633300] exe[339645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [832521.742575] exe[826175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91288e8 ax:ffffffffff600000 si:7ee4b9128e08 di:ffffffffff600000 [832522.501507] exe[339645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [832523.233427] exe[339645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [832689.168851] exe[861047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91498e8 ax:ffffffffff600000 si:7ee4b9149e08 di:ffffffffff600000 [832690.181219] exe[861223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91288e8 ax:ffffffffff600000 si:7ee4b9128e08 di:ffffffffff600000 [832691.196381] exe[861427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6f4f52506 cs:33 sp:7ee4b91288e8 ax:ffffffffff600000 si:7ee4b9128e08 di:ffffffffff600000 [832792.301707] exe[653879] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [832793.135840] exe[716011] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [832794.166083] exe[760485] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [832795.028973] exe[653505] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [833041.515319] exe[574459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d51b822506 cs:33 sp:7f0d4e6608e8 ax:ffffffffff600000 si:7f0d4e660e08 di:ffffffffff600000 [833556.858141] exe[559056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631236ac506 cs:33 sp:7ff27ddee8e8 ax:ffffffffff600000 si:7ff27ddeee08 di:ffffffffff600000 [833785.630254] exe[621240] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [834020.184021] exe[639083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab36212506 cs:33 sp:7f0ddb33c8e8 ax:ffffffffff600000 si:7f0ddb33ce08 di:ffffffffff600000 [834087.596886] exe[364279] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [834182.265194] exe[687894] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [834183.189227] exe[181266] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [834183.873144] exe[687866] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [834184.708622] exe[687866] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [834198.029295] exe[139799] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [835238.371274] exe[327309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [835678.133434] exe[716693] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [835991.387983] exe[410206] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [836169.732882] exe[396658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646767b0506 cs:33 sp:7fb248bc78e8 ax:ffffffffff600000 si:7fb248bc7e08 di:ffffffffff600000 [836754.448636] exe[692617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c934320506 cs:33 sp:7f4c8fa578e8 ax:ffffffffff600000 si:7f4c8fa57e08 di:ffffffffff600000 [837150.765376] exe[665386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abc81506 cs:33 sp:7f51e2ffe8e8 ax:ffffffffff600000 si:7f51e2ffee08 di:ffffffffff600000 [847055.363253] exe[503469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847055.883964] exe[511677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847056.413171] exe[503683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847056.477792] exe[503490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521af8e8 ax:ffffffffff600000 si:7f73521afe08 di:ffffffffff600000 [847118.281086] exe[503494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847118.704007] exe[574743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847119.187137] exe[514964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847119.768029] exe[574743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847120.172562] exe[574743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847120.481013] exe[503469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847120.885386] exe[511677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c026886506 cs:33 sp:7f73521f18e8 ax:ffffffffff600000 si:7f73521f1e08 di:ffffffffff600000 [847649.932221] exe[710686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6688e8 ax:ffffffffff600000 si:7fa2de668e08 di:ffffffffff600000 [847650.625817] exe[724455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6478e8 ax:ffffffffff600000 si:7fa2de647e08 di:ffffffffff600000 [847651.248830] exe[667503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.290236] exe[667761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.325565] exe[667761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.367344] exe[676919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.407382] exe[667851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.440476] exe[667851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.473488] exe[667851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [847651.506107] exe[668959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a5a484506 cs:33 sp:7fa2de6268e8 ax:ffffffffff600000 si:7fa2de626e08 di:ffffffffff600000 [848857.630672] warn_bad_vsyscall: 26 callbacks suppressed [848857.630675] exe[902629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a7a1b378 cs:33 sp:7fe22e0cbf90 ax:7fe22e0cc020 si:ffffffffff600000 di:5605a7ae5263 [848858.253959] exe[901935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a7a1b378 cs:33 sp:7fe22e0cbf90 ax:7fe22e0cc020 si:ffffffffff600000 di:5605a7ae5263 [848858.918912] exe[776760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a7a1b378 cs:33 sp:7fe22e0cbf90 ax:7fe22e0cc020 si:ffffffffff600000 di:5605a7ae5263 [849670.070023] exe[355027] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [849671.034661] exe[357957] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [849671.629636] exe[357105] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [850212.158278] exe[279645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564daf6d3506 cs:33 sp:7fc869f64f88 ax:ffffffffff600000 si:20006580 di:ffffffffff600000 [850212.575286] exe[283207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564daf6d3506 cs:33 sp:7fc869f64f88 ax:ffffffffff600000 si:20006580 di:ffffffffff600000 [850213.136753] exe[340071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564daf6d3506 cs:33 sp:7fc869f64f88 ax:ffffffffff600000 si:20006580 di:ffffffffff600000 [850299.371595] exe[69493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b9e3b506 cs:33 sp:7f688c1678e8 ax:ffffffffff600000 si:7f688c167e08 di:ffffffffff600000 [850299.735984] exe[92521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b9e3b506 cs:33 sp:7f688c1678e8 ax:ffffffffff600000 si:7f688c167e08 di:ffffffffff600000 [850300.123049] exe[270589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b9e3b506 cs:33 sp:7f688c1678e8 ax:ffffffffff600000 si:7f688c167e08 di:ffffffffff600000 [850300.164246] exe[70103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b9e3b506 cs:33 sp:7f688c1678e8 ax:ffffffffff600000 si:7f688c167e08 di:ffffffffff600000 [850395.805648] exe[288046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650cddde378 cs:33 sp:7fc80288ef90 ax:7fc80288f020 si:ffffffffff600000 di:5650cdea8263 [850396.080585] exe[275336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650cddde378 cs:33 sp:7fc80288ef90 ax:7fc80288f020 si:ffffffffff600000 di:5650cdea8263 [850396.790828] exe[285580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650cddde378 cs:33 sp:7fc80286df90 ax:7fc80286e020 si:ffffffffff600000 di:5650cdea8263 [850940.303853] exe[335617] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [850941.546730] exe[365016] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [850942.222174] exe[365016] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [851466.061955] exe[379985] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [851468.731654] exe[379985] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [851470.352507] exe[502393] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [851470.533788] exe[379985] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [856470.560765] exe[694922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c8daeb506 cs:33 sp:7f0d5d0488e8 ax:ffffffffff600000 si:7f0d5d048e08 di:ffffffffff600000 [856470.910631] exe[694864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c8daeb506 cs:33 sp:7f0d5d0488e8 ax:ffffffffff600000 si:7f0d5d048e08 di:ffffffffff600000 [856471.137581] exe[754254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c8daeb506 cs:33 sp:7f0d5d0278e8 ax:ffffffffff600000 si:7f0d5d027e08 di:ffffffffff600000 [856780.209307] exe[885880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb2e798506 cs:33 sp:7f5117f8c8e8 ax:ffffffffff600000 si:7f5117f8ce08 di:ffffffffff600000 [856780.324079] exe[888251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb2e798506 cs:33 sp:7f5117f8c8e8 ax:ffffffffff600000 si:7f5117f8ce08 di:ffffffffff600000 [856781.644465] exe[891399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb2e798506 cs:33 sp:7f5117f4a8e8 ax:ffffffffff600000 si:7f5117f4ae08 di:ffffffffff600000 [856855.219441] exe[939619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0ae11b506 cs:33 sp:7ebfc7aa28e8 ax:ffffffffff600000 si:7ebfc7aa2e08 di:ffffffffff600000 [856855.372054] exe[939652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0ae11b506 cs:33 sp:7ebfc7aa28e8 ax:ffffffffff600000 si:7ebfc7aa2e08 di:ffffffffff600000 [856855.476252] exe[939677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0ae11b506 cs:33 sp:7ebfc7aa28e8 ax:ffffffffff600000 si:7ebfc7aa2e08 di:ffffffffff600000 [862203.834741] exe[83306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837f42f88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862204.234094] exe[55940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837edff88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862204.989943] exe[638288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.020773] exe[660518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.079464] exe[660518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.105827] exe[660518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.175981] exe[721026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.211256] exe[721026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.252182] exe[721026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [862205.303630] exe[721026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2b24dd506 cs:33 sp:7fa837ebef88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [867345.269181] warn_bad_vsyscall: 8 callbacks suppressed [867345.269185] exe[900265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ff9a74506 cs:33 sp:7f835dbfe8e8 ax:ffffffffff600000 si:7f835dbfee08 di:ffffffffff600000 [867345.715193] exe[71089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ff9a74506 cs:33 sp:7f835dbfe8e8 ax:ffffffffff600000 si:7f835dbfee08 di:ffffffffff600000 [867346.310926] exe[872519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ff9a74506 cs:33 sp:7f835dbfe8e8 ax:ffffffffff600000 si:7f835dbfee08 di:ffffffffff600000 [867346.315172] exe[863744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ff9a74506 cs:33 sp:7f835dbdd8e8 ax:ffffffffff600000 si:7f835dbdde08 di:ffffffffff600000 [867435.813654] exe[176292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7a48e8 ax:ffffffffff600000 si:7fb51f7a4e08 di:ffffffffff600000 [867436.127616] exe[176213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7628e8 ax:ffffffffff600000 si:7fb51f762e08 di:ffffffffff600000 [867436.271832] exe[176040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.295139] exe[176040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.322843] exe[176040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.346815] exe[176080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.371896] exe[176080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.393842] exe[176080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.418471] exe[176080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [867436.440025] exe[176080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557225489506 cs:33 sp:7fb51f7208e8 ax:ffffffffff600000 si:7fb51f720e08 di:ffffffffff600000 [868630.244163] warn_bad_vsyscall: 57 callbacks suppressed [868630.244167] exe[273758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce65463506 cs:33 sp:7f07e33cb8e8 ax:ffffffffff600000 si:7f07e33cbe08 di:ffffffffff600000 [868630.624825] exe[277776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce65463506 cs:33 sp:7f07e33cb8e8 ax:ffffffffff600000 si:7f07e33cbe08 di:ffffffffff600000 [868630.789221] exe[423897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce65463506 cs:33 sp:7f07e33aa8e8 ax:ffffffffff600000 si:7f07e33aae08 di:ffffffffff600000 [868630.898530] exe[179664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b7d7c0506 cs:33 sp:7f8b6ed658e8 ax:ffffffffff600000 si:7f8b6ed65e08 di:ffffffffff600000 [868631.298030] exe[208386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce65463506 cs:33 sp:7f07e33aa8e8 ax:ffffffffff600000 si:7f07e33aae08 di:ffffffffff600000 [869285.244764] exe[278023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612ae31e506 cs:33 sp:7ff564ab78e8 ax:ffffffffff600000 si:7ff564ab7e08 di:ffffffffff600000 [869285.825715] exe[399487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612ae31e506 cs:33 sp:7ff564ab78e8 ax:ffffffffff600000 si:7ff564ab7e08 di:ffffffffff600000 [869286.256275] exe[424413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612ae31e506 cs:33 sp:7ff564ab78e8 ax:ffffffffff600000 si:7ff564ab7e08 di:ffffffffff600000 [870022.464605] exe[199615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae873fe506 cs:33 sp:7f90765fe8e8 ax:ffffffffff600000 si:7f90765fee08 di:ffffffffff600000 [870022.773393] exe[175272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae873fe506 cs:33 sp:7f90765fe8e8 ax:ffffffffff600000 si:7f90765fee08 di:ffffffffff600000 [870022.831320] exe[254194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae873fe506 cs:33 sp:7f90765fe8e8 ax:ffffffffff600000 si:7f90765fee08 di:ffffffffff600000 [870023.122253] exe[662638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae873fe506 cs:33 sp:7f90765fe8e8 ax:ffffffffff600000 si:7f90765fee08 di:ffffffffff600000 [874026.772947] exe[926272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bd1af90 ax:7f046bd1b020 si:ffffffffff600000 di:55903f2c4263 [874026.983086] exe[932603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.017878] exe[932603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.044500] exe[932603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.067341] exe[932603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.094109] exe[926056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.120303] exe[926234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.160183] exe[926303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.183898] exe[424390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874027.208671] exe[424390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55903f1fa378 cs:33 sp:7f046bcf9f90 ax:7f046bcfa020 si:ffffffffff600000 di:55903f2c4263 [874639.984920] warn_bad_vsyscall: 25 callbacks suppressed [874639.984924] exe[433210] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874640.987851] exe[433210] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874641.229517] exe[434732] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.278794] exe[434410] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.370370] exe[434410] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.433765] exe[434410] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.478307] exe[434710] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.563155] exe[433861] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.647852] exe[634356] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [874642.703877] exe[440729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [876068.380519] warn_bad_vsyscall: 26 callbacks suppressed [876068.380527] exe[992515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565aa9da506 cs:33 sp:7ebf1cd388e8 ax:ffffffffff600000 si:7ebf1cd38e08 di:ffffffffff600000 [876068.501795] exe[992531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565aa9da506 cs:33 sp:7ebf1cd388e8 ax:ffffffffff600000 si:7ebf1cd38e08 di:ffffffffff600000 [876068.581438] exe[992546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565aa9da506 cs:33 sp:7ebf1ccf68e8 ax:ffffffffff600000 si:7ebf1ccf6e08 di:ffffffffff600000 [876068.907918] exe[992608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565aa9da506 cs:33 sp:7ebf1cd388e8 ax:ffffffffff600000 si:7ebf1cd38e08 di:ffffffffff600000 [876069.319428] exe[992721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [876069.425603] exe[992741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [876069.627170] exe[992781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [876069.857522] exe[992835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [876070.036469] exe[992880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [876070.394966] exe[992948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555df35c7506 cs:33 sp:7ecfe1d018e8 ax:ffffffffff600000 si:7ecfe1d01e08 di:ffffffffff600000 [877951.105610] warn_bad_vsyscall: 12 callbacks suppressed [877951.105613] exe[509514] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [877951.908292] exe[441803] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [877952.590522] exe[441803] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [882332.414962] exe[258139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b95cde8378 cs:33 sp:7f080b353f90 ax:7f080b354020 si:ffffffffff600000 di:55b95ceb2263 [882333.008741] exe[264264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b95cde8378 cs:33 sp:7f080b353f90 ax:7f080b354020 si:ffffffffff600000 di:55b95ceb2263 [882333.014023] exe[258522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b95cde8378 cs:33 sp:7f080b332f90 ax:7f080b333020 si:ffffffffff600000 di:55b95ceb2263 [882333.430376] exe[277185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b95cde8378 cs:33 sp:7f080b353f90 ax:7f080b354020 si:ffffffffff600000 di:55b95ceb2263 [882852.951337] exe[428477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605df327506 cs:33 sp:7fe7e45fe8e8 ax:ffffffffff600000 si:7fe7e45fee08 di:ffffffffff600000 [882853.529925] exe[342381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605df327506 cs:33 sp:7fe7e45fe8e8 ax:ffffffffff600000 si:7fe7e45fee08 di:ffffffffff600000 [882853.538790] exe[341772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605df327506 cs:33 sp:7fe7e45dd8e8 ax:ffffffffff600000 si:7fe7e45dde08 di:ffffffffff600000 [882853.831095] exe[432220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605df327506 cs:33 sp:7fe7e45fe8e8 ax:ffffffffff600000 si:7fe7e45fee08 di:ffffffffff600000 [882854.014132] exe[424147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605df327506 cs:33 sp:7fe7e45dd8e8 ax:ffffffffff600000 si:7fe7e45dde08 di:ffffffffff600000 [882910.520575] exe[384082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae0929d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:11000000 [882912.141588] exe[384082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae0929d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:11000000 [882912.915574] exe[391848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae0929d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:11000000 [882914.528636] exe[383559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae0929d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:11000000 [886759.190935] exe[15427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c10bf506 cs:33 sp:7ff9fcd1e8e8 ax:ffffffffff600000 si:7ff9fcd1ee08 di:ffffffffff600000 [886759.561523] exe[937022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c10bf506 cs:33 sp:7ff9fccfd8e8 ax:ffffffffff600000 si:7ff9fccfde08 di:ffffffffff600000 [886759.928421] exe[935041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c10bf506 cs:33 sp:7ff9fcd1e8e8 ax:ffffffffff600000 si:7ff9fcd1ee08 di:ffffffffff600000 [892013.584731] exe[995531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca077d8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [892014.469263] exe[995501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca077d8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [892014.955637] exe[116998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca077d8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [892912.996915] exe[396212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f52695c08e8 ax:ffffffffff600000 si:7f52695c0e08 di:ffffffffff600000 [892913.162966] exe[375676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.198023] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.228025] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.261130] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.302634] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.334034] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.364511] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.397620] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [892913.431689] exe[382583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b264a5a506 cs:33 sp:7f526959f8e8 ax:ffffffffff600000 si:7f526959fe08 di:ffffffffff600000 [893146.663378] warn_bad_vsyscall: 52 callbacks suppressed [893146.663383] exe[349675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b60dcb506 cs:33 sp:7fdf9e45b8e8 ax:ffffffffff600000 si:7fdf9e45be08 di:ffffffffff600000 [893147.104444] exe[349809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b60dcb506 cs:33 sp:7fdf9e43a8e8 ax:ffffffffff600000 si:7fdf9e43ae08 di:ffffffffff600000 [893147.950874] exe[354498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b60dcb506 cs:33 sp:7fdf9e45b8e8 ax:ffffffffff600000 si:7fdf9e45be08 di:ffffffffff600000 [893370.214277] exe[412183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557187e08378 cs:33 sp:7fc2c45fef90 ax:7fc2c45ff020 si:ffffffffff600000 di:557187ed2263 [893370.894168] exe[68331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557187e08378 cs:33 sp:7fc2c45bcf90 ax:7fc2c45bd020 si:ffffffffff600000 di:557187ed2263 [893371.526286] exe[296881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557187e08378 cs:33 sp:7fc2c45fef90 ax:7fc2c45ff020 si:ffffffffff600000 di:557187ed2263 [893378.930535] exe[460364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b946fd9506 cs:33 sp:7f1024e9b8e8 ax:ffffffffff600000 si:7f1024e9be08 di:ffffffffff600000 [893379.190261] exe[471950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b946fd9506 cs:33 sp:7f1024e9b8e8 ax:ffffffffff600000 si:7f1024e9be08 di:ffffffffff600000 [893379.619275] exe[460166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b946fd9506 cs:33 sp:7f1024e9b8e8 ax:ffffffffff600000 si:7f1024e9be08 di:ffffffffff600000 [897586.836797] exe[218135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557748dae506 cs:33 sp:7f86c94e18e8 ax:ffffffffff600000 si:7f86c94e1e08 di:ffffffffff600000 [897587.062649] exe[277654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557748dae506 cs:33 sp:7f86c94c08e8 ax:ffffffffff600000 si:7f86c94c0e08 di:ffffffffff600000 [897587.272549] exe[55088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557748dae506 cs:33 sp:7f86c94e18e8 ax:ffffffffff600000 si:7f86c94e1e08 di:ffffffffff600000 [897587.344526] exe[55088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557748dae506 cs:33 sp:7f86c94e18e8 ax:ffffffffff600000 si:7f86c94e1e08 di:ffffffffff600000 [901529.388083] exe[336425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b3bbbf506 cs:33 sp:7eeb5858bf88 ax:ffffffffff600000 si:20005100 di:ffffffffff600000 [901530.189371] exe[336590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b3bbbf506 cs:33 sp:7eeb58549f88 ax:ffffffffff600000 si:20005100 di:ffffffffff600000 [901530.432053] exe[336648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b3bbbf506 cs:33 sp:7eeb5856af88 ax:ffffffffff600000 si:20005100 di:ffffffffff600000 [903151.129324] exe[164138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0b950506 cs:33 sp:7f1ffe846f88 ax:ffffffffff600000 si:20000e40 di:ffffffffff600000 [903151.662572] exe[164728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0b950506 cs:33 sp:7f1ffe3fef88 ax:ffffffffff600000 si:20000e40 di:ffffffffff600000 [903154.227286] exe[259401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0b950506 cs:33 sp:7f1ffe846f88 ax:ffffffffff600000 si:20000e40 di:ffffffffff600000 [903767.178942] exe[86022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf1f7c6101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [903806.188329] exe[815818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c73a3c0101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [903836.155143] exe[110074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591d83d0101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [903838.999472] exe[106118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d71f578101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [903842.241776] exe[823237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01b0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [903920.959385] exe[804729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56255351b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904124.504219] exe[300099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561044110101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904140.006301] exe[407191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590a40e5101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904169.665683] exe[890140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ea724101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904171.093580] exe[890453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d38c72101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904185.786966] exe[177636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e203101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904429.821621] exe[854058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c98b11c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904469.124085] exe[854872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f448caf101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [904546.682690] exe[984963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555947ebb101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [905749.832131] exe[631123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be7ebe8506 cs:33 sp:7fccce74a8e8 ax:ffffffffff600000 si:7fccce74ae08 di:ffffffffff600000 [905750.217790] exe[630962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be7ebe8506 cs:33 sp:7fccce74a8e8 ax:ffffffffff600000 si:7fccce74ae08 di:ffffffffff600000 [905750.261056] exe[209536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556056b17506 cs:33 sp:7f1794a858e8 ax:ffffffffff600000 si:7f1794a85e08 di:ffffffffff600000 [905751.142468] exe[630962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be7ebe8506 cs:33 sp:7fccce74a8e8 ax:ffffffffff600000 si:7fccce74ae08 di:ffffffffff600000 [905751.192427] exe[689493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be7ebe8506 cs:33 sp:7fccce74a8e8 ax:ffffffffff600000 si:7fccce74ae08 di:ffffffffff600000 [906347.650068] exe[377096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648189ee506 cs:33 sp:7f19017fef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [906348.303867] exe[321371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648189ee506 cs:33 sp:7f19017fef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [906348.775916] exe[322259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648189ee506 cs:33 sp:7f19017fef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [906476.642756] exe[1302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6a2ddf506 cs:33 sp:7f138578e8e8 ax:ffffffffff600000 si:7f138578ee08 di:ffffffffff600000 [906477.052746] exe[262137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6a2ddf506 cs:33 sp:7f138576d8e8 ax:ffffffffff600000 si:7f138576de08 di:ffffffffff600000 [906477.412697] exe[966203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6a2ddf506 cs:33 sp:7f138578e8e8 ax:ffffffffff600000 si:7f138578ee08 di:ffffffffff600000 [908569.161993] exe[830037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625a778c506 cs:33 sp:7f1f8ffa5f88 ax:ffffffffff600000 si:20003a00 di:ffffffffff600000 [908569.802936] exe[830037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625a778c506 cs:33 sp:7f1f8ff84f88 ax:ffffffffff600000 si:20003a00 di:ffffffffff600000 [908570.214132] exe[888130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625a778c506 cs:33 sp:7f1f8ffa5f88 ax:ffffffffff600000 si:20003a00 di:ffffffffff600000 [910004.729582] exe[261350] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [910005.339606] exe[266644] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [910005.501149] exe[266644] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [910006.141873] exe[261350] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [910779.922759] exe[873502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597ced89506 cs:33 sp:7f87dd7b38e8 ax:ffffffffff600000 si:7f87dd7b3e08 di:ffffffffff600000 [910780.116181] exe[891999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597ced89506 cs:33 sp:7f87dd7b38e8 ax:ffffffffff600000 si:7f87dd7b3e08 di:ffffffffff600000 [910780.356201] exe[159318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597ced89506 cs:33 sp:7f87dd7b38e8 ax:ffffffffff600000 si:7f87dd7b3e08 di:ffffffffff600000 [911721.149736] exe[599862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140f04e8e8 ax:ffffffffff600000 si:7f140f04ee08 di:ffffffffff600000 [911721.543598] exe[587977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140f04e8e8 ax:ffffffffff600000 si:7f140f04ee08 di:ffffffffff600000 [911721.936534] exe[599862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140ebfe8e8 ax:ffffffffff600000 si:7f140ebfee08 di:ffffffffff600000 [914046.864935] exe[957426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140f04ef88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [914048.428277] exe[777382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140ebfef88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [914049.167228] exe[864213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55960e73f506 cs:33 sp:7f140f02df88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [916948.528416] exe[658731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a90882506 cs:33 sp:7ef7ce17af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [916948.815088] exe[658776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a90882506 cs:33 sp:7ef7ce17af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [916948.851909] exe[658782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a90882506 cs:33 sp:7ef7ce159f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [916949.077087] exe[658827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a90882506 cs:33 sp:7ef7ce17af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [918066.960025] exe[866943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601d2b0b378 cs:33 sp:7eea737bdf90 ax:7eea737be020 si:ffffffffff600000 di:5601d2bd5263 [918067.210312] exe[866976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601d2b0b378 cs:33 sp:7eea737bdf90 ax:7eea737be020 si:ffffffffff600000 di:5601d2bd5263 [918067.521799] exe[867051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601d2b0b378 cs:33 sp:7eea7379cf90 ax:7eea7379d020 si:ffffffffff600000 di:5601d2bd5263 [919218.963786] exe[106822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555716ef6506 cs:33 sp:7f75774cbf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [919219.155841] exe[106735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555716ef6506 cs:33 sp:7f75774aaf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [919219.585735] exe[106829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555716ef6506 cs:33 sp:7f75774cbf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [926063.828620] exe[418538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aa1a2378 cs:33 sp:7f20bca58f90 ax:7f20bca59020 si:ffffffffff600000 di:55e6aa26c263 [926064.029153] exe[418191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aa1a2378 cs:33 sp:7f20bca58f90 ax:7f20bca59020 si:ffffffffff600000 di:55e6aa26c263 [926064.076802] exe[546863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aa1a2378 cs:33 sp:7f20bca37f90 ax:7f20bca38020 si:ffffffffff600000 di:55e6aa26c263 [926064.272422] exe[345852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aa1a2378 cs:33 sp:7f20bca58f90 ax:7f20bca59020 si:ffffffffff600000 di:55e6aa26c263 [926064.310142] exe[343786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aa1a2378 cs:33 sp:7f20bc5fef90 ax:7f20bc5ff020 si:ffffffffff600000 di:55e6aa26c263 [926142.576581] exe[766453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559478699506 cs:33 sp:7f7fdfab6f88 ax:ffffffffff600000 si:20002e00 di:ffffffffff600000 [926143.452224] exe[766449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559478699506 cs:33 sp:7f7fdfa95f88 ax:ffffffffff600000 si:20002e00 di:ffffffffff600000 [926144.218958] exe[780795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559478699506 cs:33 sp:7f7fdfab6f88 ax:ffffffffff600000 si:20002e00 di:ffffffffff600000 [927747.478466] exe[588729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56179051c506 cs:33 sp:7feee069df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [927747.802847] exe[850485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56179051c506 cs:33 sp:7feee069df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [927748.274174] exe[589959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56179051c506 cs:33 sp:7feee069df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [929013.772522] exe[309505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527697506 cs:33 sp:7f0f0ec5a8e8 ax:ffffffffff600000 si:7f0f0ec5ae08 di:ffffffffff600000 [929014.079419] exe[322587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527697506 cs:33 sp:7f0f0ec5a8e8 ax:ffffffffff600000 si:7f0f0ec5ae08 di:ffffffffff600000 [929014.327582] exe[307655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527697506 cs:33 sp:7f0f0ec5a8e8 ax:ffffffffff600000 si:7f0f0ec5ae08 di:ffffffffff600000 [930684.431018] exe[460393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9395d0506 cs:33 sp:7f09c0f1b8e8 ax:ffffffffff600000 si:7f09c0f1be08 di:ffffffffff600000 [930684.634864] exe[422828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9395d0506 cs:33 sp:7f09c0f1b8e8 ax:ffffffffff600000 si:7f09c0f1be08 di:ffffffffff600000 [930684.827348] exe[373956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9395d0506 cs:33 sp:7f09c0f1b8e8 ax:ffffffffff600000 si:7f09c0f1be08 di:ffffffffff600000 [930685.873246] exe[422841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930686.085181] exe[373970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930686.239131] exe[300471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930686.463367] exe[404075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930686.715701] exe[300471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930686.947560] exe[300395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [930687.075701] exe[300503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f1bac8506 cs:33 sp:7f23acdfe8e8 ax:ffffffffff600000 si:7f23acdfee08 di:ffffffffff600000 [931091.609528] warn_bad_vsyscall: 4 callbacks suppressed [931091.609531] exe[300395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a939581378 cs:33 sp:7f09c0f1bf90 ax:7f09c0f1c020 si:ffffffffff600000 di:55a93964b263 [931091.832046] exe[302631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a939581378 cs:33 sp:7f09c0efaf90 ax:7f09c0efb020 si:ffffffffff600000 di:55a93964b263 [931092.153378] exe[300944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a939581378 cs:33 sp:7f09c0f1bf90 ax:7f09c0f1c020 si:ffffffffff600000 di:55a93964b263 [931096.532245] exe[300909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931096.846457] exe[318535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931097.231711] exe[318529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931097.746535] exe[301515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931098.074802] exe[302649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931098.396964] exe[300570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931098.728395] exe[300641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931099.023399] exe[300570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931099.388305] exe[300577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931099.742519] exe[373956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931099.943766] exe[300521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931102.114751] warn_bad_vsyscall: 5 callbacks suppressed [931102.114755] exe[300641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [931103.729099] exe[460376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe6a65a378 cs:33 sp:7f9a76d69f90 ax:7f9a76d6a020 si:ffffffffff600000 di:55fe6a724263 [932327.908678] exe[417909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631b614d506 cs:33 sp:7f00846308e8 ax:ffffffffff600000 si:7f0084630e08 di:ffffffffff600000 [932757.198881] exe[248028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7194d9378 cs:33 sp:7ed6c217af90 ax:7ed6c217b020 si:ffffffffff600000 di:55b7195a3263 [932757.382861] exe[248086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7194d9378 cs:33 sp:7ed6c2138f90 ax:7ed6c2139020 si:ffffffffff600000 di:55b7195a3263 [932757.600042] exe[248133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7194d9378 cs:33 sp:7ed6c217af90 ax:7ed6c217b020 si:ffffffffff600000 di:55b7195a3263 [933296.061053] exe[153440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735b091378 cs:33 sp:7f315eb3af90 ax:7f315eb3b020 si:ffffffffff600000 di:55735b15b263 [933296.386063] exe[221698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735b091378 cs:33 sp:7f315eb3af90 ax:7f315eb3b020 si:ffffffffff600000 di:55735b15b263 [933296.934875] exe[159430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735b091378 cs:33 sp:7f315eb3af90 ax:7f315eb3b020 si:ffffffffff600000 di:55735b15b263 [934803.495605] exe[718247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa90b21506 cs:33 sp:7ea70acfdf88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [934803.794349] exe[718300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa90b21506 cs:33 sp:7ea70acfdf88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [934804.123297] exe[718387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa90b21506 cs:33 sp:7ea70acfdf88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [936418.398804] exe[559354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936418.458957] exe[804491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7ddf90 ax:7f874c7de020 si:ffffffffff600000 di:55e5c9cdd263 [936418.505510] exe[19610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7bcf90 ax:7f874c7bd020 si:ffffffffff600000 di:55e5c9cdd263 [936423.733061] exe[804491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936423.845815] exe[19610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936423.926604] exe[19610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.069615] exe[19610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.215901] exe[559354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.388131] exe[19610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.521986] exe[546757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.671100] exe[804491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.742544] exe[546757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936424.822839] exe[546757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936428.763142] warn_bad_vsyscall: 18 callbacks suppressed [936428.763145] exe[546755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936428.852943] exe[804491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936428.961347] exe[733473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936429.026664] exe[546755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [936429.104482] exe[549678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c9c13378 cs:33 sp:7f874c7fef90 ax:7f874c7ff020 si:ffffffffff600000 di:55e5c9cdd263 [941316.889936] exe[907038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f166e01506 cs:33 sp:7f980591ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [941316.984651] exe[697018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f166e01506 cs:33 sp:7f980591ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [941317.400864] exe[953181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f166e01506 cs:33 sp:7f980591ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [942216.370546] exe[713087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce75b7506 cs:33 sp:7f3d174d18e8 ax:ffffffffff600000 si:7f3d174d1e08 di:ffffffffff600000 [942216.745703] exe[636697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce75b7506 cs:33 sp:7f3d174d18e8 ax:ffffffffff600000 si:7f3d174d1e08 di:ffffffffff600000 [942217.180753] exe[636430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce75b7506 cs:33 sp:7f3d174d18e8 ax:ffffffffff600000 si:7f3d174d1e08 di:ffffffffff600000 [942217.316004] exe[39632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce75b7506 cs:33 sp:7f3d174d18e8 ax:ffffffffff600000 si:7f3d174d1e08 di:ffffffffff600000 [942327.454358] exe[713224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56548365f506 cs:33 sp:7f3c87d7b8e8 ax:ffffffffff600000 si:7f3c87d7be08 di:ffffffffff600000 [942327.853794] exe[669204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56548365f506 cs:33 sp:7f3c87cf78e8 ax:ffffffffff600000 si:7f3c87cf7e08 di:ffffffffff600000 [942328.310537] exe[680466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56548365f506 cs:33 sp:7f3c87d7b8e8 ax:ffffffffff600000 si:7f3c87d7be08 di:ffffffffff600000 [947037.078761] exe[90059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557191a1e506 cs:33 sp:7eac1c6a38e8 ax:ffffffffff600000 si:7eac1c6a3e08 di:ffffffffff600000 [947037.296081] exe[90098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557191a1e506 cs:33 sp:7eac1c6828e8 ax:ffffffffff600000 si:7eac1c682e08 di:ffffffffff600000 [947037.486740] exe[90147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557191a1e506 cs:33 sp:7eac1c6828e8 ax:ffffffffff600000 si:7eac1c682e08 di:ffffffffff600000 [947510.384105] exe[138025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560752296506 cs:33 sp:7faa64d7e8e8 ax:ffffffffff600000 si:7faa64d7ee08 di:ffffffffff600000 [947510.781751] exe[134296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560752296506 cs:33 sp:7faa64d7e8e8 ax:ffffffffff600000 si:7faa64d7ee08 di:ffffffffff600000 [947511.115223] exe[215242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560752296506 cs:33 sp:7faa64d7e8e8 ax:ffffffffff600000 si:7faa64d7ee08 di:ffffffffff600000 [947511.162223] exe[135157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560752296506 cs:33 sp:7faa64d7e8e8 ax:ffffffffff600000 si:7faa64d7ee08 di:ffffffffff600000 [950800.804988] exe[841469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a7bf88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.013035] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.074910] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.096888] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.131845] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.163319] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.196022] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.220070] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.246913] exe[870791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [950801.274662] exe[867165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ef0356506 cs:33 sp:7f0486a5af88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [954925.542960] warn_bad_vsyscall: 57 callbacks suppressed [954925.542964] exe[119139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d24617506 cs:33 sp:7f9b0d7158e8 ax:ffffffffff600000 si:7f9b0d715e08 di:ffffffffff600000 [954925.828559] exe[221210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d24617506 cs:33 sp:7f9b0d6f48e8 ax:ffffffffff600000 si:7f9b0d6f4e08 di:ffffffffff600000 [954926.026591] exe[112484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d24617506 cs:33 sp:7f9b0d7158e8 ax:ffffffffff600000 si:7f9b0d715e08 di:ffffffffff600000 [954926.093486] exe[171376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d24617506 cs:33 sp:7f9b0d6f48e8 ax:ffffffffff600000 si:7f9b0d6f4e08 di:ffffffffff600000 [955788.869436] exe[650887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602bfcd3506 cs:33 sp:7f19fb1d78e8 ax:ffffffffff600000 si:7f19fb1d7e08 di:ffffffffff600000 [955789.201068] exe[576182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602bfcd3506 cs:33 sp:7f19fb1d78e8 ax:ffffffffff600000 si:7f19fb1d7e08 di:ffffffffff600000 [955789.533336] exe[795466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602bfcd3506 cs:33 sp:7f19fb1d78e8 ax:ffffffffff600000 si:7f19fb1d7e08 di:ffffffffff600000 [955789.552571] exe[788913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602bfcd3506 cs:33 sp:7f19fb1b68e8 ax:ffffffffff600000 si:7f19fb1b6e08 di:ffffffffff600000 [956300.310008] exe[964511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563838329506 cs:33 sp:7f7a07ec28e8 ax:ffffffffff600000 si:7f7a07ec2e08 di:ffffffffff600000 [956300.784272] exe[949796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563838329506 cs:33 sp:7f7a07ec28e8 ax:ffffffffff600000 si:7f7a07ec2e08 di:ffffffffff600000 [956301.405128] exe[985548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563838329506 cs:33 sp:7f7a07ec28e8 ax:ffffffffff600000 si:7f7a07ec2e08 di:ffffffffff600000 [957164.548938] exe[234401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d09782506 cs:33 sp:7ec49907b8e8 ax:ffffffffff600000 si:7ec49907be08 di:ffffffffff600000 [957164.819702] exe[234450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d09782506 cs:33 sp:7ec49907b8e8 ax:ffffffffff600000 si:7ec49907be08 di:ffffffffff600000 [957165.625200] exe[234615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d09782506 cs:33 sp:7ec49907b8e8 ax:ffffffffff600000 si:7ec49907be08 di:ffffffffff600000 [960116.724947] exe[888475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562231fe5378 cs:33 sp:7ee28558af90 ax:7ee28558b020 si:ffffffffff600000 di:5622320af263 [960117.215345] exe[888591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562231fe5378 cs:33 sp:7ee285569f90 ax:7ee28556a020 si:ffffffffff600000 di:5622320af263 [960117.426871] exe[888648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562231fe5378 cs:33 sp:7ee285548f90 ax:7ee285549020 si:ffffffffff600000 di:5622320af263 [963379.006476] exe[596691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55969865f378 cs:33 sp:7ef86f07bf90 ax:7ef86f07c020 si:ffffffffff600000 di:559698729263 [963379.355007] exe[596743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55969865f378 cs:33 sp:7ef86f07bf90 ax:7ef86f07c020 si:ffffffffff600000 di:559698729263 [963379.681188] exe[596819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55969865f378 cs:33 sp:7ef86f07bf90 ax:7ef86f07c020 si:ffffffffff600000 di:559698729263 [968235.100294] exe[673563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [968236.268386] exe[658311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [968237.130606] exe[674025] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [968237.488698] exe[658311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [969979.350346] exe[683015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722bddd506 cs:33 sp:7f31700cdf88 ax:ffffffffff600000 si:20002200 di:ffffffffff600000 [969979.571459] exe[682834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722bddd506 cs:33 sp:7f31700cdf88 ax:ffffffffff600000 si:20002200 di:ffffffffff600000 [969979.696775] exe[683263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722bddd506 cs:33 sp:7f317008bf88 ax:ffffffffff600000 si:20002200 di:ffffffffff600000 [969980.044525] exe[683015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722bddd506 cs:33 sp:7f31700cdf88 ax:ffffffffff600000 si:20002200 di:ffffffffff600000 [971002.690752] exe[125345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e80aabb506 cs:33 sp:7fc4a55468e8 ax:ffffffffff600000 si:7fc4a5546e08 di:ffffffffff600000 [971003.185639] exe[200619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971003.190601] exe[149844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e80aabb506 cs:33 sp:7fc4a55468e8 ax:ffffffffff600000 si:7fc4a5546e08 di:ffffffffff600000 [971003.577949] exe[213874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971003.603147] exe[149844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e80aabb506 cs:33 sp:7fc4a55468e8 ax:ffffffffff600000 si:7fc4a5546e08 di:ffffffffff600000 [971003.936515] exe[991021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971004.185086] exe[125345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971004.468496] exe[991021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971004.709257] exe[125309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971005.006951] exe[124895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560718312506 cs:33 sp:7feeeb2ac8e8 ax:ffffffffff600000 si:7feeeb2ace08 di:ffffffffff600000 [971093.029040] warn_bad_vsyscall: 3 callbacks suppressed [971093.029044] exe[990785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971093.387353] exe[125289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971093.833295] exe[990950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971094.201052] exe[125289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971094.572594] exe[990913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971094.986922] exe[199344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971095.308817] exe[200648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971095.747264] exe[990922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971096.068607] exe[124719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971096.386922] exe[990913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971098.304126] warn_bad_vsyscall: 4 callbacks suppressed [971098.304130] exe[157106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971098.642031] exe[126777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55660a830506 cs:33 sp:7fb5899038e8 ax:ffffffffff600000 si:7fb589903e08 di:ffffffffff600000 [971101.629844] exe[200641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d295a42506 cs:33 sp:7fb5b96c48e8 ax:ffffffffff600000 si:7fb5b96c4e08 di:ffffffffff600000 [973001.672909] exe[816261] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973002.441619] exe[817355] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973002.912858] exe[816261] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973003.091713] exe[816261] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973023.577845] exe[697350] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973024.423722] exe[761062] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [973025.125598] exe[941144] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [974591.419501] exe[43184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56255caab378 cs:33 sp:7f56dabfef90 ax:7f56dabff020 si:ffffffffff600000 di:56255cb75263 [974592.094952] exe[30021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56255caab378 cs:33 sp:7f56dabfef90 ax:7f56dabff020 si:ffffffffff600000 di:56255cb75263 [974592.943810] exe[27928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56255caab378 cs:33 sp:7f56dabfef90 ax:7f56dabff020 si:ffffffffff600000 di:56255cb75263 [974953.950395] exe[26109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [974954.061842] exe[29267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [974954.101129] exe[29267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1bc8e8 ax:ffffffffff600000 si:7f316b1bce08 di:ffffffffff600000 [974954.224504] exe[24502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1dd8e8 ax:ffffffffff600000 si:7f316b1dde08 di:ffffffffff600000 [975058.922910] exe[25633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975059.815193] exe[24361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975059.879282] exe[24681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975059.957210] exe[33331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.025832] exe[29294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.140602] exe[29268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.326364] exe[24681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.495642] exe[117472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.614996] exe[25633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [975060.725118] exe[29271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f572b91506 cs:33 sp:7f316b1fe8e8 ax:ffffffffff600000 si:7f316b1fee08 di:ffffffffff600000 [976282.904605] exe[954273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624c6616378 cs:33 sp:7f88847cef90 ax:7f88847cf020 si:ffffffffff600000 di:5624c66e0263 [976283.470852] exe[1912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624c6616378 cs:33 sp:7f88847cef90 ax:7f88847cf020 si:ffffffffff600000 di:5624c66e0263 [976284.342148] exe[931425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624c6616378 cs:33 sp:7f88847cef90 ax:7f88847cf020 si:ffffffffff600000 di:5624c66e0263 [976284.347806] exe[931734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624c6616378 cs:33 sp:7f88847adf90 ax:7f88847ae020 si:ffffffffff600000 di:5624c66e0263 [976445.982795] exe[24414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a83b87f506 cs:33 sp:7f2decfa88e8 ax:ffffffffff600000 si:7f2decfa8e08 di:ffffffffff600000 [976446.460554] exe[120169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a83b87f506 cs:33 sp:7f2decfa88e8 ax:ffffffffff600000 si:7f2decfa8e08 di:ffffffffff600000 [976446.763850] exe[116496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a83b87f506 cs:33 sp:7f2decfa88e8 ax:ffffffffff600000 si:7f2decfa8e08 di:ffffffffff600000 [977108.554464] exe[31295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d250d1378 cs:33 sp:7f037f0e7f90 ax:7f037f0e8020 si:ffffffffff600000 di:560d2519b263 [977109.811462] exe[334501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d250d1378 cs:33 sp:7f037f0c6f90 ax:7f037f0c7020 si:ffffffffff600000 di:560d2519b263 [977109.827336] exe[334495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d250d1378 cs:33 sp:7f037f0a5f90 ax:7f037f0a6020 si:ffffffffff600000 di:560d2519b263 [977111.205267] exe[51235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d250d1378 cs:33 sp:7f037f0c6f90 ax:7f037f0c7020 si:ffffffffff600000 di:560d2519b263 [980892.127827] exe[800150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [980892.628377] exe[799989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [980892.998433] exe[799989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981023.160513] exe[806295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981023.461184] exe[800054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981023.841509] exe[800182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981024.224388] exe[799909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981024.620086] exe[800341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981025.291124] exe[800248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981025.676771] exe[800336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981026.012731] exe[980923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981026.506537] exe[800341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981026.906274] exe[835757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981028.302236] warn_bad_vsyscall: 2 callbacks suppressed [981028.302240] exe[800046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981028.611577] exe[800336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981029.015987] exe[806209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [981029.459416] exe[800069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589b434f378 cs:33 sp:7f921b3fef90 ax:7f921b3ff020 si:ffffffffff600000 di:5589b4419263 [982088.160299] exe[413633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612aacf4506 cs:33 sp:7ff21d0d9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [982088.378576] exe[744161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612aacf4506 cs:33 sp:7ff21d0d9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [982088.578078] exe[692194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612aacf4506 cs:33 sp:7ff21d0d9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [982355.895795] exe[628365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ec28e8 ax:ffffffffff600000 si:7f38e0ec2e08 di:ffffffffff600000 [982356.351425] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.392952] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.418355] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.449733] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.479408] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.528822] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.579840] exe[616688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.613884] exe[641907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [982356.649128] exe[641907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55743b4cd506 cs:33 sp:7f38e0ea18e8 ax:ffffffffff600000 si:7f38e0ea1e08 di:ffffffffff600000 [983843.803960] warn_bad_vsyscall: 26 callbacks suppressed [983843.803963] exe[129302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.212610] exe[129408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.559134] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.617971] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.667511] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.706669] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.742455] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.798045] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.834147] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983844.869385] exe[129482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619fda4e506 cs:33 sp:7ed7b05ec8e8 ax:ffffffffff600000 si:7ed7b05ece08 di:ffffffffff600000 [983858.837538] warn_bad_vsyscall: 25 callbacks suppressed [983858.837541] exe[132158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983859.155656] exe[132223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983859.409868] exe[132281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983859.637349] exe[132321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983859.860838] exe[132368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983860.055398] exe[132407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983860.093629] exe[132416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc105cf506 cs:33 sp:7eccfb53a8e8 ax:ffffffffff600000 si:7eccfb53ae08 di:ffffffffff600000 [983860.235583] exe[132441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983860.384403] exe[132470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [983860.539860] exe[132497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811c02d506 cs:33 sp:7ee7b7b8c8e8 ax:ffffffffff600000 si:7ee7b7b8ce08 di:ffffffffff600000 [987060.475253] warn_bad_vsyscall: 1 callbacks suppressed [987060.475257] exe[797452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c0703506 cs:33 sp:7fa148ffe8e8 ax:ffffffffff600000 si:7fa148ffee08 di:ffffffffff600000 [987060.743447] exe[797482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c0703506 cs:33 sp:7fa148ffe8e8 ax:ffffffffff600000 si:7fa148ffee08 di:ffffffffff600000 [987060.984831] exe[797482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c0703506 cs:33 sp:7fa148ffe8e8 ax:ffffffffff600000 si:7fa148ffee08 di:ffffffffff600000 [987062.225408] exe[801245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987062.421534] exe[859521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987062.778696] exe[818795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987062.949171] exe[801075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987063.115428] exe[857584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987063.310085] exe[818411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987063.528730] exe[797655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987125.412595] warn_bad_vsyscall: 8 callbacks suppressed [987125.412599] exe[857635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987125.785987] exe[885194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987126.074011] exe[885227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987126.350827] exe[797537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987126.691145] exe[797537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987126.956800] exe[885191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987127.260547] exe[797799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987127.605374] exe[799640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987127.973942] exe[801340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987128.407008] exe[843854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560421ba6506 cs:33 sp:7f483306c8e8 ax:ffffffffff600000 si:7f483306ce08 di:ffffffffff600000 [987663.172957] warn_bad_vsyscall: 1 callbacks suppressed [987663.172961] exe[753178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637cb876506 cs:33 sp:7fb4ad5588e8 ax:ffffffffff600000 si:7fb4ad558e08 di:ffffffffff600000 [987663.447128] exe[736297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637cb876506 cs:33 sp:7fb4ad5378e8 ax:ffffffffff600000 si:7fb4ad537e08 di:ffffffffff600000 [987663.795542] exe[753115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637cb876506 cs:33 sp:7fb4ad5378e8 ax:ffffffffff600000 si:7fb4ad537e08 di:ffffffffff600000 [988038.347831] exe[797912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56231c972506 cs:33 sp:7f24a64d9f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988038.742040] exe[797752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56231c972506 cs:33 sp:7f24a64d9f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988038.816954] exe[797752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56231c972506 cs:33 sp:7f24a6497f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988039.083571] exe[886575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56231c972506 cs:33 sp:7f24a64d9f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988052.775066] exe[797702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988053.130300] exe[798773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988053.523271] exe[797700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988053.942304] exe[886694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988054.372103] exe[832715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988054.637742] exe[797769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988054.794211] exe[832106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988055.061763] exe[798592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988055.345742] exe[797574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [988055.586832] exe[798689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8baa98506 cs:33 sp:7f765a02ef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [990932.571366] exe[786190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561958ac7506 cs:33 sp:7ee82efc58e8 ax:ffffffffff600000 si:7ee82efc5e08 di:ffffffffff600000 [990932.877604] exe[786260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561958ac7506 cs:33 sp:7ee82efc58e8 ax:ffffffffff600000 si:7ee82efc5e08 di:ffffffffff600000 [990933.220366] exe[786347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561958ac7506 cs:33 sp:7ee82efc58e8 ax:ffffffffff600000 si:7ee82efc5e08 di:ffffffffff600000 [995902.248279] exe[884911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55791f02d506 cs:33 sp:7f10ca4518e8 ax:ffffffffff600000 si:7f10ca451e08 di:ffffffffff600000 [995902.634095] exe[470654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55791f02d506 cs:33 sp:7f10ca4518e8 ax:ffffffffff600000 si:7f10ca451e08 di:ffffffffff600000 [995902.967566] exe[884972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55791f02d506 cs:33 sp:7f10ca4518e8 ax:ffffffffff600000 si:7f10ca451e08 di:ffffffffff600000 [996775.690744] exe[434894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b472af506 cs:33 sp:7f1d13ba18e8 ax:ffffffffff600000 si:7f1d13ba1e08 di:ffffffffff600000 [996775.937064] exe[890216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b472af506 cs:33 sp:7f1d13ba18e8 ax:ffffffffff600000 si:7f1d13ba1e08 di:ffffffffff600000 [996775.937362] exe[884935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b472af506 cs:33 sp:7f1d13b808e8 ax:ffffffffff600000 si:7f1d13b80e08 di:ffffffffff600000 [996776.510233] exe[427376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b472af506 cs:33 sp:7f1d13ba18e8 ax:ffffffffff600000 si:7f1d13ba1e08 di:ffffffffff600000 [999491.176452] exe[451766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8df643506 cs:33 sp:7f79ee2ca8e8 ax:ffffffffff600000 si:7f79ee2cae08 di:ffffffffff600000 [999491.474312] exe[630792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8df643506 cs:33 sp:7f79ee2ca8e8 ax:ffffffffff600000 si:7f79ee2cae08 di:ffffffffff600000 [999491.716766] exe[451416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8df643506 cs:33 sp:7f79ee2ca8e8 ax:ffffffffff600000 si:7f79ee2cae08 di:ffffffffff600000 [1002430.185883] exe[242349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46504b506 cs:33 sp:7f43b3e6ef88 ax:ffffffffff600000 si:200030c0 di:ffffffffff600000 [1002431.434407] exe[202053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46504b506 cs:33 sp:7f43b3e6ff88 ax:ffffffffff600000 si:200030c0 di:ffffffffff600000 [1002432.344247] exe[200582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46504b506 cs:33 sp:7f43b3e4df88 ax:ffffffffff600000 si:200030c0 di:ffffffffff600000 [1002604.055272] exe[391151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d81715b506 cs:33 sp:7f42222a78e8 ax:ffffffffff600000 si:7f42222a7e08 di:ffffffffff600000 [1002604.994629] exe[365096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d81715b506 cs:33 sp:7f42222a78e8 ax:ffffffffff600000 si:7f42222a7e08 di:ffffffffff600000 [1002605.420218] exe[276272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d81715b506 cs:33 sp:7f42222a78e8 ax:ffffffffff600000 si:7f42222a7e08 di:ffffffffff600000 [1002605.458017] exe[278026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b527ad506 cs:33 sp:7f2c93efe8e8 ax:ffffffffff600000 si:7f2c93efee08 di:ffffffffff600000 [1003226.260518] exe[668830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e60895506 cs:33 sp:7ef0067fe8e8 ax:ffffffffff600000 si:7ef0067fee08 di:ffffffffff600000 [1003226.578050] exe[668897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e60895506 cs:33 sp:7ef0067dd8e8 ax:ffffffffff600000 si:7ef0067dde08 di:ffffffffff600000 [1003226.886873] exe[668958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e60895506 cs:33 sp:7ef0067fe8e8 ax:ffffffffff600000 si:7ef0067fee08 di:ffffffffff600000 [1004525.433508] exe[821335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a1bb25506 cs:33 sp:7fca4d3bc8e8 ax:ffffffffff600000 si:7fca4d3bce08 di:ffffffffff600000 [1004636.228787] exe[244757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c887ef378 cs:33 sp:7f4c889c9f90 ax:7f4c889ca020 si:ffffffffff600000 di:560c888b9263 [1004636.633443] exe[298699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c887ef378 cs:33 sp:7f4c889c9f90 ax:7f4c889ca020 si:ffffffffff600000 di:560c888b9263 [1004637.163239] exe[241585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c887ef378 cs:33 sp:7f4c889c9f90 ax:7f4c889ca020 si:ffffffffff600000 di:560c888b9263